Posts by Ontic
A Strong Executive Protection Program Is Now More Important Than Ever — Here’s How To Get Buy-In
The shocking killing of UnitedHealthcare’s CEO highlights the critical importance of corporate executive protection programs The fatal shooting of UnitedHealthcare CEO Brian Thompson was a targeted and shocking act of violence. For many of you in the security field, this news is a stark reminder of two protection tenets: 01 Executives at high-profile corporations have…
Read MoreThe Future of Security: Forecasts for 2025 and Beyond
The Future of Security: Forecasts for 2025 and Beyond
Get insights from security industry experts on what 2025 has in store for key corporate security functions, including:
Read MoreThe Ultimate Guide to Building an Effective Insider Risk Program
The Ultimate Guide to Building an Effective Insider Risk Program
Throughout the steps outlined in this guide, you’ll learn how to:
Read MoreEnhance Your Insider Risk Program with These 6 Systems Integrations
Learn how the right integrations close critical data gaps, helping you gain a more complete view of your organization’s insider risk Cyber Threat Intelligence Systems Human Resources Information Systems Data Loss Prevention Solutions Inventory Management Systems Access Control and Visitor Management Systems License Plate Recognition and Video Management Systems To fully understand and mitigate your…
Read MoreHow to Build Cross-Departmental Alliances to Tackle Insider Risk
Security teams can’t manage insider risk alone — cross-departmental collaboration is key to early risk identification and mitigation The 5 steps to Fostering a Collaborative Insider Risk Approach Align on Common Goals and Objectives Develop Mutual Trust and Communication Implement Joint Policies and Processes Leverage Technology to Create a Common Operating Picture Track and Report…
Read MoreHow to Mitigate Insider Risk Throughout the Employee Lifecycle
This checklist will help you determine the effectiveness of your insider risk management processes throughout these three phases of an employee or contractor’s lifecycle:
Read MoreFrost Radar™: Digital Intelligence Solutions, 2024
Download your free copy of the report to gain insights on:
Read MoreHow to Take Your Investigations Program From Good to Great
Download this guide today to learn:
Read MoreHow to Act Before, During, and After a Crisis
A rise in physical threats requires updated response procedures. Learn what’s behind this increase and what you can do to address crises when they occur. When did you last review your crisis response plan and threat assessment? Do they address how to respond to threats in today’s increasingly volatile environment? More than likely, you’ve seen…
Read MoreThe Guide to Evaluating Case Management Solutions
In this guide, you’ll learn:
Read More4 Executive Travel Vulnerabilities You May be Overlooking
Learn how to minimize the impact of vulnerabilities like social media use, private jet tracking, and more As an executive protection (EP) professional, you’re likely experiencing a rise in physical threats against your principal(s). You’re not alone. According to Ontic’s State of Protective Intelligence Report, 8 out of 9 EPs say their companies are experiencing…
Read MoreThe Path to Modernizing Your Home-Grown Case Management System
Learn how to leverage your current challenges to drive support for a purpose-built case management solution As a corporate security leader responsible for investigations, your primary objective is to keep your people and assets safe. Despite the critical nature of your work, you may be forced to manage investigations with tools that aren’t designed to…
Read MoreKeeping Your Employees Safe at the 2024 Olympic Games
By Chuck Randolph and Fred Burton As the world eagerly anticipates the 2024 Paris Olympics, the event’s grandeur remains a magnet for threats. Like its predecessors, the 33rd Summer Olympics is a target. French media has reported, in the lead-up to the event, that French authorities are on heightened alert due to terror plots thwarted. …
Read MoreAlternative Social Media: What It Means for Threat Intelligence Gathering
Why the rise in alternative social media platforms with less moderation and greater anonymity calls for a more proactive approach to threat monitoring. Early versions of social media platforms began emerging in the late 90s and early 2000s with the intended purpose of connecting users with others based on shared interests, affiliations, or geographic proximity.…
Read More