Posts by Chuck Randolph
How to Make Your Security Teams More Effective
Top security managers use the power of research and case management This article was originally published on Securityinfowatch.com. Here’s a true story that many in the security field may find familiar. After an acquisition almost doubled the size of a major grocery wholesaler, the company’s corporate security team started training leaders to identify concerning behaviors…
Read MoreEmerging Technology Highlights New Converged Risks and Asymmetric Threats
Protecting high-profile individuals and events as the digital threat landscape evolves This article was originally posted in ASIS Security Management Magazine. The ubiquity of technology companies in daily life today puts them in the security spotlight, with increasing media attention, political scrutiny, and complex, overlapping threats. In November 2023, after visiting with U.S. President Joe…
Read MoreInsider Risk: Don’t Ignore the Community Context
When looking to mitigate insider risks, security leaders have to remember the potential causes. This article was originally featured in Security Magazine Just a few months ago, many security professionals confessed concern about a potential economic downturn and how that would impact the security environment around them. Some were troubled about possible layoffs at their company, and…
Read MoreA New Breed Of Security Leadership: How the Digital Age Is Transforming the Security Professional
This article was originally featured in Security Informed The importance of data is ever-growing. For every profession, we’re witnessing the increasing reliance on data and its ability to promote efficiency for corporate decision-makers. The security industry is no different. The growing reliance on data and technological tools has allowed for a new breed of professionals…
Read MoreThe New Information Landscape is Changing How Security Leaders Work
This article was originally featured in Security Magazine Imagine a scenario many security practitioners are familiar with: A bizarre post on an obscure social media account surfaces. It could be construed as a threat against a company executive. But it’s unclear. To further complicate the situation, a different executive at the organization has recently been under public…
Read MoreConnected Intelligence: A New Approach to Managing Risk and Enabling Decision-Makers
Ensuring the safety of people and organizations is dynamic, asymmetric, and complex. A sense of permacrisis has driven a need for those tasked with managing risks to constantly perceive imperatives amongst the unyielding view of threat, risk, and problematic issues. Ontic championed the cause of Protective Intelligence and its concepts for collecting and providing information…
Read More‘Mission First, People Always:’ A Mantra for Security Talent
This article was originally featured in Security Management. The phrase “Mission first, people always” is a common mantra in the military, and it is often borrowed in leadership studies. It’s a vision of success that invests in the success of those around you, a sense of shared mission (the why), no matter your specialty or…
Read MoreCorporate Cost-Cutting and Why Security Teams Do Not Need to Compromise on Investigations and Intelligence Solutions
This article was originally featured on IFSEC Insider Every executive’s career will sometimes involve budget cuts that affect their department. Security executives are no strangers to this scenario; about one out of every five security departments experienced budget reductions between 2020 and 2022, according to Security Magazine’s Security Benchmark Report. It’s always a challenging situation.…
Read MoreMinimizing IP Theft and Insider Threats During Times of Layoffs
This article was originally featured on Security Today Building out cross-functional collaboration between cyber and physical security teams will create a more unified approach, where a common language is established to better understand each department’s key priorities and processes. Doing so ensures there is collective monitoring of identified risk groups or individuals. It also ensures…
Read MoreRed Teaming at Scale to Uncover Your Big Unknowns
This article was originally featured on Dark Reading During the global war on terror, a group of commissioned and noncommissioned officers in the United States military participated in a unique training event. Soldiers of various ranks, all with different specialties, assembled in a remote location where they were stripped of rank and other identifying markers.…
Read MoreProving the Value of Security: How to Avoid the ‘Break Glass Now’ Label
This article was originally featured on Total Security Advisor Keeping employees healthy and safe and property secure is crucial, especially in light of the current geopolitical landscape, ongoing issues stemming from the most recent pandemic, and the tragic events in Highland Park, Uvalde, Buffalo, Tulsa, and many more cities. In a seemingly non-stop threat environment, corporate…
Read MoreHow Security Teams Have Expanded Their Duties
This article was originally featured on IFSEC Global Regarding gigabytes, physical security units are partnering with cyber security teams to manage the protection of highly valued assets, such as intellectual property. Many cyber security standards, including Payment Card Industry (PCI), have physical security components. But the convergence of physical and cyber security goes well beyond…
Read MoreCyber-Physical Convergence is Happening, But Not Fast Enough
Leaders should drive discussions about triggers that cause decision-making. When and how should analysts escalate an issue? When should the cybersecurity team check in with HR about an employee’s behavior? Answering these questions and putting processes in place to help will increase your ability to respond proactively to threats and create a common operating picture…
Read MoreManaging Risk Teams Through Multiple Crises: L.E.A.R.N While You Lead
Security and risk teams continue to be stretched thin, tasked with managing multiple priorities of work within an uncertain environment fueled by the ongoing effects of issues such as COVID-19, civil unrest and Russia’s invasion of Ukraine. They are asked to stay on top of the ancillary effects of all those issues. Still, they are…
Read MorePhysical and Digital Executive Protection: Synchronizing Domains
Exploring the relationship between executive cyber protection and physical security teams and some strategies to achieve these goals. Organizations of all sizes continue to face risks from multiple vectors in the digital and physical domains. These domains overlap, and for at least half a decade, organizations have quietly discussed ways to converge these functions. The…
Read More