Posts by Ontic
Creating an Effective Insider Risk Program
With insider incidents on the rise, security leaders are taking a proactive approach to help blunt the negative impacts For most organizations, people are their greatest asset. However, employees with access to information, technology, and facilities can also be your company’s greatest vulnerability — intentionally and unintentionally. In light of recent mass layoffs and the…
Read MoreEnhancing Corporate Security: The Value of Intelligence in Weather Related Threats
How to ensure the safety of corporate assets and personnel amidst increasingly frequent and intense severe weather Due to the increasing severity of destructive weather events — including hurricanes, tornadoes, and wildfires — improved weather monitoring and updated action plans are essential for protecting corporate assets and ensuring the safety of personnel. This requires a…
Read MoreThe Surprising Supporter Behind the Push to Modernize GSOCs: The C-Suite
The increased attention from the C-Suite signals that executives want better alignment between security and the business. Security leaders are seeing enthusiasm, even mounting pressure, from company leaders to upgrade their organizations’ global security operation center’s (GSOC) infrastructure. One reason leadership is eager to update the GSOC is the increasing frequency of threats and the…
Read MoreThree Ways to Build Momentum and Consensus for Your Security Program
Security teams face an uphill battle in securing a budget. Leaders are now leveraging company culture and employee collaboration to change perceptions of security as a cost center. Securing a budget is a significant challenge for many leaders; those charged with security efforts often doubly so. Leaders need to demonstrate the results of their security…
Read MoreOur New “Days of Rage” Protest Activity and Considerations for Corporate Security
3 Takeaways Relentless Risk The world seems to be on fire, fueled by the Hamas attack on Israel and the subsequent Israeli Defense Force (IDF) invasion of Gaza. As a result, protests have taken off like wildfire across many college campuses. As the New York Times reports, “In many students’ eyes, the war in Gaza…
Read MoreNavigating Corporate Security Through Times of Chaos
The threat landscape has been evolving at a rapid rate that has been worsened by matters such as geopolitical conflicts, social justice issues, and economic unrest. So, how can risk leaders best protect their organizations regarding reputational risk? Corporate security groups continue to be stretched thin, juggling multiple priorities within a constantly evolving environment. Risks…
Read MoreHow Exact Sciences, Exlog Global, and Others Protect Their Organizations with Ontic
Healthcare Company Standardizes Their Investigative Process with Ontic
Mastering Global Security and Risk Management: Key Strategies from Exlog’s VP of Global Operations
In this episode of Women Who Protect, host Dr. Marisa Randazzo, Ph.D., sits down with Anna Lepingwell, the Vice President for Global Operations at Exlog Global. Based in London and part of the robust European contingent of the company, Anna brings her extensive expertise to the fore, discussing the intricate world of risk management security…
Read MoreOntic Platform
Exlog Global Streamlines Data Collection with Ontic
How Torchstone Global Consolidates Security Intelligence with Ontic
Streamlining Security Operations Amidst Geopolitical Turmoil
While we’re unsure of the full repercussions global events will have on multinational corporations, there are ways security teams can better predict, assess, and prepare for potential threats. When geostrategic crises erupt, the risks to multinational corporations can be complex andunpredictable. While geopolitical conflict undoubtedly has had major repercussions on theglobal economy that will trickle…
Read MoreHow Goodyear, Anti-Defamation League and Other Clients Keep Their People Safe with Ontic
The Intelligence Cycle in Action
How to apply this timeless approach in the modern world. Contents History Evolution Framework Steps Application Enhancement Security threats have always evolved rapidly in government circles, in the military realm, and in the private sector. Those threats look different in the 21st century than they did decades ago, but the Intelligence Cycle is just as…
Read More