Listen in as we explore the world of safety, security and protection, speaking with practitioners, bestselling authors, and corporate security leaders.
All Episodes
Dr. Treston Wheat is a red team analyst who specializes in TTP (tactics, techniques, procedures) research, threat modeling, and social engineering. Previously, he was a strategic cybersecurity analyst and geopolitical risk analyst. Dr. Wheat is also an adjunct professor at…
When the Little Things Add Up: The Intel Analysts’ Role in Communicating Imminent Risk to Leadership
The geopolitical landscape has become increasingly complex to manage for intel analysts — especially those conducting risk assessments on an international level. They have to be hyper-aware of countries with a more authoritarian regime that can leverage the business relationship…
Security professionals and human resources (HR) professionals share a common goal – fostering a safe and secure workplace – yet they often don’t know how to partner together to make it happen. In this episode, Dr. Marisa Randazzo talks with…
When entering unknown territory, the sound of a barking dog in the distance poses an ominous foreshadowing of the potential violence ahead. Identifying the magnitude of the bite (or threat) and how to mitigate it is pivotal to coming out…
There’s no time like the present to prioritize security within organizations. Mitigating risk protects not only a business’s workforce and property but also its operations, financial stability, and reputation. Despite many leaders understanding this, in many cases, they are still…
“If it’s not documented, it didn’t happen” is a standard that Christine Oliver has stood by for the duration of her career, leading investigations in both the public and private sectors. As a Former FBI Special Agent and current emergency…
Jack Carr’s latest addition to the James Reece series, Only the Dead, is a captivating page-turner that does not disappoint. With meticulous research and attention to detail, he transports readers to the 1980s, immersing them in a volatile and divided…
Oftentimes when concert or sports venues ramp up their security measures, the guest experience is downgraded with longer lines and more processes and rules. This doesn’t have to be the case. A customer-backed model, keeping in mind what’s important to…
In the fields of security and intelligence, where definitive answers and data are often needed immediately to make critical decisions, taking the time to listen can get pushed aside. However, as Mary Hackman argues, looking for the root causes of…
James Bond is one of the most legendary characters in film witnessed over the past several decades. In 1953 when the character of James Bond came to fruition in Ian Fleming’s novels under the code name 007, many were unaware…