ONT_Podcast_Title

Listen in as we explore the world of safety, security, and protection, speaking with practitioners, bestselling authors, and corporate security leaders.

All Episodes

Inside the Mind of the Attacker: Using Red Teaming to Mitigate Business Risk

Dr. Treston Wheat is a red team analyst who specializes in TTP (tactics, techniques, procedures) research, threat modeling, and social engineering. Previously, he was a strategic cybersecurity analyst and geopolitical risk analyst. Dr. Wheat is also an adjunct professor at…

View episode details →

When the Little Things Add Up: The Intel Analysts’ Role in Communicating Imminent Risk to Leadership

The geopolitical landscape has become increasingly complex to manage for intel analysts — especially those conducting risk assessments on an international level. They have to be hyper-aware of countries with a more authoritarian regime that can leverage the business relationship…

View episode details →

Shattering Silos: Getting Security and Human Resources to Partner Together for Safety

Security professionals and human resources (HR) professionals share a common goal – fostering a safe and secure workplace – yet they often don’t know how to partner together to make it happen. In this episode, Dr. Marisa Randazzo talks with…

View episode details →

The Evolution of Targeted Violence and Why the Threats We Don’t See Pose the Most Danger

When entering unknown territory, the sound of a barking dog in the distance poses an ominous foreshadowing of the potential violence ahead. Identifying the magnitude of the bite (or threat) and how to mitigate it is pivotal to coming out…

View episode details →

9 Industry Leading Perspectives on How to Communicate the Value of Corporate Security

There’s no time like the present to prioritize security within organizations. Mitigating risk protects not only a business’s workforce and property but also its operations, financial stability, and reputation. Despite many leaders understanding this, in many cases, they are still…

View episode details →

Former FBI Special Agent Shares What’s Essential to Managing Investigations

“If it’s not documented, it didn’t happen” is a standard that Christine Oliver has stood by for the duration of her career, leading investigations in both the public and private sectors. As a Former FBI Special Agent and current emergency…

View episode details →

Jack Carr Answers All — Questions from the Audience and A Sneak Peek into Only the Dead

Jack Carr’s latest addition to the James Reece series, Only the Dead, is a captivating page-turner that does not disappoint. With meticulous research and attention to detail, he transports readers to the 1980s, immersing them in a volatile and divided…

View episode details →

How a Digitally-Informed Approach to Security Can Revolutionize the Patron Experience

Oftentimes when concert or sports venues ramp up their security measures, the guest experience is downgraded with longer lines and more processes and rules. This doesn’t have to be the case. A customer-backed model, keeping in mind what’s important to…

View episode details →

From OSAC to DSAC to Visa’s GSOC: Identifying the Root Cause of Security Concerns

sub In the fields of security and intelligence, where definitive answers and data are often needed immediately to make critical decisions, taking the time to listen can get pushed aside. However, as Mary Hackman argues, looking for the root causes…

View episode details →

The Real-Life Spy Behind the James Bond 007 Series

James Bond is one of the most legendary characters in film witnessed over the past several decades. In 1953 when the character of James Bond came to fruition in Ian Fleming’s novels under the code name 007, many were unaware…

View episode details →