Ontic Protective Intelligence Podcast Playlist: Corporate Security

From corporate security leaders to the General Counsel of a Fortune 10 company, the Ontic Protective Intelligence Podcast with Fred Burton spotlights the many facets of enterprise security programs. Below we’ve compiled a list of some of our top episodes focused on the field of corporate security. Give them a listen to gain unique points…

Read More

Digital Transformation and the Evolution of Corporate Security

Practicalities for Security Teams in the Information Age Protective intelligence has always been focused on the future — seeking to prevent risk events from impacting the organization. With a focus on proactive synchronization across channels and landscapes, security teams bring a preemptive approach to managing threats. Tactically speaking, how do we take that same type…

Read More

How-To Guide: Assessing an Executive’s Digital Footprint

A key element involved in understanding the threats, vulnerabilities, and associated risk to an executive is the assessment of their digital footprint. The ultimate goal is to surface what information is available online for a savvy adversary to exploit. This information could range from details about the executive’s travel movements, satellite imagery of their home(s)…

Read More

What It Means to Be an Executive Protection Agent

The instinct to step forward and protect leaders when danger is on the horizon has been around since the beginning of mankind. It has evolved into the field of executive protection, or close protection, to keep corporate leaders and high-net-worth individuals and their families safe. In movies, we see agents wearing black suits, disrupting threats…

Read More

Gaining Deeper Insights Beyond Social Media Threat Intelligence

Social Media Threat Intelligence Hero Banner

When we zoom out and think about corporate threat assessment investigations holistically, it’s clear that social media threat intelligence plays a significant role — but how significant is it? In this article, we’d like to explore the benefits of using social media threat monitoring when conducting investigative research, as well as the pitfalls of relying…

Read More

What is Executive Protection? A Complete Introduction

Executive Protection (EP), also called Close Protection (CP) or executive personal protection, refers to private risk mitigation and security measures designed to ensure the safety of individuals (principals) and their families. Principals may require executive protection services due to higher personal risk related to their employment, geographic location, net worth, affiliations, or status. Classic attack…

Read More

Inside the Mind of a Protective Intelligence Thought Leader

This podcast was originally featured on The Great Conversation. Listen in as Ron Worman, Founder and Managing Director of The Sage Group, gets inside the mind of Ontic’s Fred Burton, a former police officer, special agent and New York Times best-selling author who has the history and credentials to provide thought leadership around protective intelligence;…

Read More

Top 5 Security Analyst Interview Questions to Prepare For

When you are inspired to apply everything you learned in your university programs to protect people and assets, a Security Analyst position is a common starting point. It is also an area that companies plan to further invest in — in Ontic’s recent study on the State of Protective Intelligence, 66% of security leaders plan…

Read More

What is “Protective Intelligence?”

To the security intelligence analyst plugging away in a 24-hour operations center, protective intelligence is one thing. To the security consultant with an MA or MS in psychology, protective intelligence means something else.And to the United States Department of Justice or the U.S. Secret Service, it takes on another meaning. While the term protective intelligence…

Read More

How to Identify Those Who Pose a Threat From Those Who Make a Threat

Searching for threats that are made with violent intent from the thousands of threats that are made every day can often amount to searching for a needle in a haystack. Limited resources mean that threat assessors must be able to identify the factors and warning signs of a potentially serious risk without escalating non-threatening concerns.…

Read More