How to Make Your Security Teams More Effective

Top security managers use the power of research and case management This article was originally published on Securityinfowatch.com. Here’s a true story that many in the security field may find familiar. After an acquisition almost doubled the size of a major grocery wholesaler, the company’s corporate security team started training leaders to identify concerning behaviors…

Read More

Emerging Technology Highlights New Converged Risks and Asymmetric Threats

Protecting high-profile individuals and events as the digital threat landscape evolves This article was originally posted in ASIS Security Management Magazine. The ubiquity of technology companies in daily life today puts them in the security spotlight, with increasing media attention, political scrutiny, and complex, overlapping threats. In November 2023, after visiting with U.S. President Joe…

Read More

Insider Risk: Don’t Ignore the Community Context

When looking to mitigate insider risks, security leaders have to remember the potential causes. This article was originally featured in Security Magazine Just a few months ago, many security professionals confessed concern about a potential economic downturn and how that would impact the security environment around them. Some were troubled about possible layoffs at their company, and…

Read More

A New Breed Of Security Leadership: How the Digital Age Is Transforming the Security Professional

This article was originally featured in Security Informed The importance of data is ever-growing. For every profession, we’re witnessing the increasing reliance on data and its ability to promote efficiency for corporate decision-makers. The security industry is no different. The growing reliance on data and technological tools has allowed for a new breed of professionals…

Read More

The New Information Landscape is Changing How Security Leaders Work

This article was originally featured in Security Magazine Imagine a scenario many security practitioners are familiar with: A bizarre post on an obscure social media account surfaces. It could be construed as a threat against a company executive. But it’s unclear. To further complicate the situation, a different executive at the organization has recently been under public…

Read More

Connected Intelligence: A New Approach to Managing Risk and Enabling Decision-Makers

Ensuring the safety of people and organizations is dynamic, asymmetric, and complex. A sense of permacrisis has driven a need for those tasked with managing risks to constantly perceive imperatives amongst the unyielding view of threat, risk, and problematic issues. Ontic championed the cause of Protective Intelligence and its concepts for collecting and providing information…

Read More

‘Mission First, People Always:’ A Mantra for Security Talent

This article was originally featured in Security Management. The phrase “Mission first, people always” is a common mantra in the military, and it is often borrowed in leadership studies. It’s a vision of success that invests in the success of those around you, a sense of shared mission (the why), no matter your specialty or…

Read More

Corporate Cost-Cutting and Why Security Teams Do Not Need to Compromise on Investigations and Intelligence Solutions

This article was originally featured on IFSEC Insider Every executive’s career will sometimes involve budget cuts that affect their department. Security executives are no strangers to this scenario; about one out of every five security departments experienced budget reductions between 2020 and 2022, according to Security Magazine’s Security Benchmark Report. It’s always a challenging situation.…

Read More

Minimizing IP Theft and Insider Threats During Times of Layoffs

This article was originally featured on Security Today Building out cross-functional collaboration between cyber and physical security teams will create a more unified approach, where a common language is established to better understand each department’s key priorities and processes. Doing so ensures there is collective monitoring of identified risk groups or individuals. It also ensures…

Read More

Red Teaming at Scale to Uncover Your Big Unknowns

This article was originally featured on Dark Reading During the global war on terror, a group of commissioned and noncommissioned officers in the United States military participated in a unique training event. Soldiers of various ranks, all with different specialties, assembled in a remote location where they were stripped of rank and other identifying markers.…

Read More

Proving the Value of Security: How to Avoid the ‘Break Glass Now’ Label

This article was originally featured on Total Security Advisor Keeping employees healthy and safe and property secure is crucial, especially in light of the current geopolitical landscape, ongoing issues stemming from the most recent pandemic, and the tragic events in Highland Park, Uvalde, Buffalo, Tulsa, and many more cities. In a seemingly non-stop threat environment, corporate…

Read More

How Security Teams Have Expanded Their Duties

This article was originally featured on IFSEC Global Regarding gigabytes, physical security units are partnering with cyber security teams to manage the protection of highly valued assets, such as intellectual property. Many cyber security standards, including Payment Card Industry (PCI), have physical security components. But the convergence of physical and cyber security goes well beyond…

Read More

Cyber-Physical Convergence is Happening, But Not Fast Enough

Leaders should drive discussions about triggers that cause decision-making. When and how should analysts escalate an issue? When should the cybersecurity team check in with HR about an employee’s behavior? Answering these questions and putting processes in place to help will increase your ability to respond proactively to threats and create a common operating picture…

Read More

Physical and Digital Executive Protection: Synchronizing Domains

Exploring the relationship between executive cyber protection and physical security teams and some strategies to achieve these goals. Organizations of all sizes continue to face risks from multiple vectors in the digital and physical domains. These domains overlap, and for at least half a decade, organizations have quietly discussed ways to converge these functions. The…

Read More