Listen in as we explore the world of safety, security, and protection, speaking with practitioners, bestselling authors, and corporate security leaders.
All Episodes
The field of threat intelligence has evolved far from the days of interviews and observation around a predator or risk. The uptick in social media activity combined with the post-traumatic stress after COVID-19 has drastically changed the way security professionals…
The feeling of being safe is not one we take for granted; however, it can take on many different forms depending on a person’s risk profile and tolerance. A person can have all the safety measures and technology available, and…
Identifying who could be posing a threat to an organization is far from a one-person job. It takes the right training and a team that represents multiple viewpoints and areas of expertise beyond security. Janet Lawless had a vision to…
If it’s not front of mind, time and time again security measures get pushed aside until an unfortunate event surfaces. What surprises many is that the infrastructure is there for measured risk mitigation practices to occur. It comes down to…
Security professionals have increasingly demanding responsibilities in keeping people and assets safe as new threats arise and old ones loom in the periphery. When you’re charged with protecting nearly 1,000 individuals running towards action – oftentimes high-risk and in remote…
Receiving a call to be notified that there has been violent activity in the middle of the night is every security professional’s worst nightmare. However, when that activity is a bomb in the middle of Centennial Olympic Park, it takes…
It’s no secret that threats often begin in the cyber domain and swiftly move over into the physical. However, connecting the two worlds has yet to be a standard in the protection industry. Today’s threats are too severe to solve…
Whether it’s a SWAT team investigation or organized retail crime, there’s always more to the story than it appears. The simple, but often overlooked skill of taking time to listen to people, versus reacting to surface-level information, allows investigators to…
More often than not, security teams forget to use common operating language when sharing critical risk intel with C-suite leaders, making it challenging for them to take action before threats arise. Bruce McIndoe has been a visionary and serial entrepreneur…
If you’ve attended a concert recently, chances are you noticed routine security screening upon entry and possibly security near the stage to monitor crowd activity and interaction with the performers. However, beneath the surface, there is a web of information…