The Protector’s Guide to Establishing an Intelligence Baseline

Over the years, we’ve recognized a significant lack of process in place that would enable security professionals to gain a better understanding of their Protective Intelligence data. Let’s Get Tactical Defining a “Minimum Viable Process” for Protective Intelligence Resource-Effective Triaging of POI Investigations Workflow Stages Understanding the Bigger Picture We know that organizations are fundamentally…

Read More

Unveiling Insights: How to Boost the Strategic Impact of Your Corporate Investigations Program

As a security professional, you understand the critical importance of staying ahead in an ever-evolving threat landscape. Security teams often face challenges with outdated, manual systems, relying on spreadsheets and labor-intensive processes to manage cases and threats. These outdated systems can be time consuming and hinder your team’s ability to deliver the best results. That’s…

Read More

Driving Innovation to Position Your Security Program as a Strategic Business Advantage

Corporate security teams are facing a pivotal moment where the increasing threat volume is surpassing traditional approaches for mitigation. While it’s clear transformation is now a necessity to keep pace with the threat landscape, security leaders are faced with the challenge of unlocking their team’s capacity for innovation while adding value to their organization. In…

Read More

4 Ways Security Teams Can Holistically Mitigate Risks by Partnering with Human Resources and Legal

Tearing down departmental walls is essential for security teams, especially those tasked with responding to threats of violence or significant security events. Information-sharing silos within organizations hinder fast and effective responses. In extreme cases, poor communication can increase risks to a company’s employees and assets.  Business leaders recognize the value of cross-functional teams in their…

Read More

5 Best Practices to Successfully Connect Systems in Your Technology Ecosystem

Integrating technology-based security solutions with manned guarding has gained significant traction, encompassing a wide range of applications. These include situational awareness and threat intelligence platforms, risk mitigation planning, and remote video and alarm monitoring. Major events such as natural disasters, cyber threats, violent hate crimes, and pandemics have consistently acted as catalysts for technology adoption.…

Read More

How Security Teams Can Leverage Crime Data to Protect Their Assets and Facilities

Whether you’re scouting for a new business location or assessing the safety of an existing one, corporate security professionals focused on keeping facilities, employees, visitors or other assets safe, need a way to better understand the geographical risks surrounding them.  A recent report by the Council on Criminal Justice revealed that robberies affecting businesses increased…

Read More

Tips from the Top: Corporate Security Leaders Share How to Build a Team Today That’s Fit to Tackle Tomorrow’s Risks

Did you know that in 2021 the global estimated shortage of cybersecurity professionals was 2.72 million? Today, according to a study by (ISC)2, the global cybersecurity workforce gap has increased to 3.4 million people.  Staff shortages are an all-to-familiar problem for corporate security teams, which is getting more complicated to solve. The skills needed to…

Read More

5 Essential Metrics and Methods to Prove Your Corporate Security Program’s ROI

Business executives are taking a blade-like approach to stabilize their budgets in today’s challenging economy.  The technology industry is feeling the brunt of the cost-cutting measures. According to the Wall Street Journal, tech giants like Alphabet, Dell, and Meta are cutting an estimated 28,000 jobs combined. Banking behemoths like Goldman Sachs, McKinsey, and PayPal plan…

Read More

6 Things to Consider When Buying a Case Management Solution

Despite the fact that leaders in physical security, cybersecurity, IT, human resources, and legal and compliance all deal with threats and business risks, each department often has a unique method and tool for documenting and managing incidents. These organizational divisions across departments isolate threat intelligence and negatively affect business continuity. In a recent study, 50%…

Read More

A Physical Security Imperative: Critical Infrastructure Security

Critical infrastructure security is an imperative for society to operate properly.

Attacks on critical infrastructure have doubled in the last year, with events such as the attacks on Ukrainian power companies, Colonial Pipeline and JBS Food, that have brought to light the necessity of critical infrastructure security systems and networks to function properly for society to operate. The impact of recent cyber attacks on power grids…

Read More

Securing Budget for Your Corporate Security Program and Earning Your Seat at the Table

While security teams are tasked with securing their business’s people, operations and assets, they’re often faced with resistance from internal stakeholders when establishing their program budget. For security leaders to successfully defend their funding, they must effectively communicate what security vulnerabilities are costing the business, know how their program supports each department, and learn how…

Read More

Using The Indications and Warning (I&W) Analysis to Manage Organizational Risk

The Center for Protective Intelligence partnered with Scott McHugh who works for the Institute for Homeland Security at Sam Houston State University to develop this piece.  One of the key reasons we created the Ontic Center for Protective Intelligence (CPI) was to share industry tools, best practices and lessons learned to help those who protect…

Read More