Posts by Ontic
6 Things to Consider When Buying a Case Management Solution
Despite the fact that leaders in physical security, cybersecurity, IT, human resources, and legal and compliance all deal with threats and business risks, each department often has a unique method and tool for documenting and managing incidents. These organizational divisions across departments isolate threat intelligence and negatively affect business continuity. In a recent study, 50%…
Read MoreA Physical Security Imperative: Critical Infrastructure Security
Attacks on critical infrastructure have doubled in the last year, with events such as the attacks on Ukrainian power companies, Colonial Pipeline and JBS Food, that have brought to light the necessity of critical infrastructure security systems and networks to function properly for society to operate. The impact of recent cyber attacks on power grids…
Read MoreSecuring Budget for Your Corporate Security Program and Earning Your Seat at the Table
Corporate Security Strategic Positioning Key Factors to Recieve Financial Backing Placing Monetary Value on a Risk Promoting Cross-team Collaboration Advice for Funding and Resource Conversations While security teams are tasked with securing their business’s people, operations, and assets, they’re often faced with resistance from internal stakeholders when establishing their program budget. For security leaders to…
Read MoreUsing The Indications and Warning (I&W) Analysis to Manage Organizational Risk
The Center for Connected Intelligence partnered with Scott McHugh who works for the Institute for Homeland Security at Sam Houston State University to develop this piece. One of the key reasons we created the Ontic Center for Connected Intelligence (CCI) was to share industry tools, best practices and lessons learned to help those who protect…
Read MoreCase Management Software – A Complete Introduction
In the old days, protective intelligence case management software was very primitive. Typically, files sat on desktop hard drives or local servers. When a person of interest (POI) called to make threatening statements or mailed an unwanted package to an executive, an investigator would respond directly or involve local law enforcement. Then, they’d open the…
Read MoreUsing Insider Threat Awareness as a Risk Management Strategy
Searching for Insider Threat Indicators Insider Threat Awareness Strategies Teamwork Enhances Insider Threat Management Keys to Workforce Engagement for Insider Threat Prevention Effective Insider Threat Awareness Management Does Ontic Offer an Insider Threat Monitoring Solution? Companies are increasing their focus on building insider threat awareness to create more resilient defenses against theft and unauthorized access…
Read More6 Measures Safety, Security and Protection Leaders Can Take To Be Proactive During Volatile Times
In our recent webinar, Leading Corporate Security During Volatile Times, Ontic security experts joined to discuss ways for security leaders to future-proof their programs, prioritize protection and leverage technology to help mitigate risks inflicted by the rapidly-evolving threat landscape. The panel consisted of Chuck Randolph, Executive Director of Strategic Intelligence, Dr. Marisa Randazzo, Executive Director…
Read MoreStrategies for Human Resources and Security to Work as One to Enhance Workplace Safety
Human Resources specialist Melissa Muir joined the Women Who Protect podcast series to share strategies for HR and security to work together more effectively. What is threat assessment? Security is a team sport Nurturing the partnership between security and HR Boosting employee engagement Safety risks returning to office Strategies for leaders feeling burnt out Oftentimes,…
Read MoreHow to Build Situational Awareness Faster in Your Organization
See how modern advancements emphasize the benefits of integrated technology in enhancing faster threat detection and response. Situational awareness is mandatory for the modern security professional. Understanding where threats originate and their vector relative to your principals and assets helps companies mitigate risk and protect their operations. In the past, corporate security teams relied heavily…
Read MoreThe Tail Wagging the Dog
This podcast was originally featured on The Great Conversation CEOs manage risk and opportunity. How well they do that determines their path to value. So, who should be at the table helping the C-level team navigate risk and opportunity? What data should be collected, organized, analyzed, and communicated? How should it be contextualized to meet…
Read MoreLeading Corporate Security During Volatile Times
Watch this webinar with Ontic security experts to learn how to:
Read MoreA Connected Approach to Integrated Research
Corporate security teams need to quickly uncover important information about potential threats for more complete investigations and actionable insights. Whether about people, businesses, assets, locations, vehicles, or relationships, having the right connected data sources to surface relevant information is critical to making informed decisions. But to make these informed decisions, security teams must go through…
Read MoreSecurity Risk Management – A Complete Introduction
Creating and implementing an effective security risk management process and policy prevents operational disruptions, reduces liability, and better supports safety measures. Let’s examine how innovative companies use corporate security risk management solutions to guide their decisions and achieve mission success. The most robust security risk management program lowers risk; however, it’s impossible to eliminate all…
Read MoreThreat Assessment 101 for Corporate Security Teams
Why Is a Threat Assessment so Important to an Organization? How Different Corporate Security Programs Use Assessments Aligning the Risk Assessment Framework with Corporate Values How to Build a Threat Assessment Template Key Elements of a Threat and Risk Assessment Investing in Threat Risk Assessment Software After the Initial Security Threat Assessment Asking for Outside…
Read MoreImprove Business Continuity with Proactive Threat Management
In this whitepaper, we share how to:
Read MoreProving the Value of Corporate Security
In this checklist developed in partnership with the Security Executive Council (SEC), we share how to:
Read More