Posts by Ontic
Ontic Protective Intelligence Podcast Playlist: Corporate Security
From corporate security leaders to the General Counsel of a Fortune 10 company, the Ontic Protective Intelligence Podcast with Fred Burton spotlights the many facets of enterprise security programs. Below we’ve compiled a list of some of our top episodes focused on the field of corporate security. Give them a listen to gain unique points…
Read MoreInsider Threats: Protecting Against the Enemy Within
This checklist will help you determine the effectiveness of your insider threat awareness processes in three categories:
Read MoreSecurity at Sporting Events — What Goes Into Protecting Fans, Athletes, and Stadiums
If you’ve ever been to a sporting event, you’ve experienced the age-old somewhat thorough bag check and metal detector walk through. I’ve often gotten to the other side of those security checks and thought to myself, “did they even look in my bag?” In reality, this “protocol” only breaks the surface of entertainment and sports…
Read MoreLevel Up Your Threat Hunting Game: Creating Intelligence from Anomalies and Patterns
What threats might you be missing by focusing too much on individual details rather than the full picture? Because we tend to have more information than time to make sense of it all, it’s important to consider methods for digesting data, including some less obvious sources. In this whitepaper, learn the elements of threat hunting,…
Read MoreDigital Transformation and the Evolution of Corporate Security
Practicalities for Security Teams in the Information Age Protective intelligence has always been focused on the future — seeking to prevent risk events from impacting the organization. With a focus on proactive synchronization across channels and landscapes, security teams bring a preemptive approach to managing threats. Tactically speaking, how do we take that same type…
Read MoreHow-To Guide: Assessing an Executive’s Digital Footprint
A key element involved in understanding the threats, vulnerabilities, and associated risk to an executive is the assessment of their digital footprint. The ultimate goal is to surface what information is available online for a savvy adversary to exploit. This information could range from details about the executive’s travel movements, satellite imagery of their home(s)…
Read MoreWhat It Means to Be an Executive Protection Agent
The instinct to step forward and protect leaders when danger is on the horizon has been around since the beginning of mankind. It has evolved into the field of executive protection, or close protection, to keep corporate leaders and high-net-worth individuals and their families safe. In movies, we see agents wearing black suits, disrupting threats…
Read MoreGaining Deeper Insights Beyond Social Media Threat Intelligence
When we zoom out and think about corporate threat assessment investigations holistically, it’s clear that social media threat intelligence plays a significant role — but how significant is it? In this article, we’d like to explore the benefits of using social media threat monitoring when conducting investigative research, as well as the pitfalls of relying…
Read MoreWhat is Executive Protection? A Complete Introduction
Executive Protection (EP), also called Close Protection (CP) or executive personal protection, refers to private risk mitigation and security measures designed to ensure the safety of individuals (principals) and their families. Principals may require executive protection services due to higher personal risk related to their employment, geographic location, net worth, affiliations, or status. Classic attack…
Read MoreInside the Mind of a Protective Intelligence Thought Leader
This podcast was originally featured on The Great Conversation. Listen in as Ron Worman, Founder and Managing Director of The Sage Group, gets inside the mind of Ontic’s Fred Burton, a former police officer, special agent and New York Times best-selling author who has the history and credentials to provide thought leadership around protective intelligence;…
Read MoreLevel Up Your Threat Hunting Game: Creating Intelligence from Anomalies and Patterns
In this whitepaper, learn the elements of threat hunting, including:
Read MoreTop 5 Security Analyst Interview Questions to Prepare For
When you are inspired to apply everything you learned in your university programs to protect people and assets, a Security Analyst position is a common starting point. It is also an area that companies plan to further invest in — in Ontic’s recent study on the State of Protective Intelligence, 66% of security leaders plan…
Read MoreThe 2021 State of Protective Intelligence Report
Download the report for insights on:
Read MoreHow to Identify Those Who Pose a Threat from Those Who Make a Threat
In this on-demand webinar with WAVR-21, you’ll learn how to distinguish those who pose a threat from those who make a threat, including why it’s important to:
Read MoreWhat is “Protective Intelligence?”
To the security intelligence analyst plugging away in a 24-hour operations center, protective intelligence is one thing. To the security consultant with an MA or MS in psychology, protective intelligence means something else.And to the United States Department of Justice or the U.S. Secret Service, it takes on another meaning. While the term protective intelligence…
Read MoreHow to Identify Those Who Pose a Threat From Those Who Make a Threat
Searching for threats that are made with violent intent from the thousands of threats that are made every day can often amount to searching for a needle in a haystack. Limited resources mean that threat assessors must be able to identify the factors and warning signs of a potentially serious risk without escalating non-threatening concerns.…
Read More