Posts by Tom Kopecky
Proven Methods for the Quiet Security Professional To Own Their Narrative
Hear from Ontic Co-Founder, Tom Kopecky, and President of Exlog Global, George Taylor, on how security leaders can articulate the bigger picture to the rest of the business. Having worked with many men and women in the security profession who have dedicated their entire careers to keeping others safe, a common theme emerges when discussing…
Read MoreThe Enemy of My Enemy is My Friend: Strengthening Insider Threat Resilience with Cyber-Physical Integration
A tactical approach to blending cyber and physical security intelligence operations A Strategic Mindset Getting Tactical MITRE Converged Integrated Defense Framework In part one of this two-part overview, I addressed many of the key themes and priorities required to mitigate insider risk properly. There has been a great deal of discourse relating to how an…
Read MoreHow to Measure Your Risk Monitoring Activities
This article was originally featured in ASIS International Ideally, businesses should use data to inform and contextualize their most important decisions, both inside and outside the security function. But obtaining accurate data to measure the value and effectiveness of security services such as risk monitoring or threat mitigation—which can be inherently less tangible—is often much…
Read MoreThe Enemy of My Enemy is My Friend: The Unification of the CSO and CISO
Don’t be surprised by what can be accomplished when a CSO and CISO join forces to mitigate insider risk How Do We Unify the Approach? What Does a Collaborative Approach Look Like? How to Define an Insider Threat Pre-Incident Indicators of Compromise The Common Insider Incident Investigation Scenario A Typical Genesis of a SIEM Alert…
Read MoreBalancing Data, Leading By Experience
This article was originally featured in Security Magazine Just over a decade ago, I got my first glimpse into how digital technology would significantly change the security industry. I was working with a Fortune 500 company as an embedded contractor, and my job was to build its protective intelligence program. A seemingly innocuous comment on…
Read MoreLegal and compliance teams: Where do they fit in the physical security picture?
Legal and compliance teams engage with nearly every aspect of the organization, from labor law to contracts, to cybersecurity. The role they play to reduce workplace violence and other security risks often go unnoticed and are seldom discussed. It’s worth having those discussions, because legal and compliance teams often set workplace violence policies, interpret regulations…
Read MorePhysical Security Teams’ Impact Is Far-Reaching
This article was originally featured on Dark Reading The responsibilities of physical security teams have expanded well beyond traditional security roles. However, these security teams all too often are seen only as a cost center instead of being recognized as risk management professionals who can help move the business forward in areas far beyond “guns,…
Read MoreNew Physical Security Tools, Information Overload, And The Big Picture For Corporate Teams
This article was originally featured on SecurityInformed.com Technology continues to transform the physical security industry, helping companies become more aware of the full spectrum of risks their organization faces. Our new survey provides strong evidence that the use of these tools is solving some problems, but their implementation may create new challenges. In our 2022…
Read MoreCompanies Are Adopting New Security Tools, but Could Still Miss the Big Picture
We all know that nearly every industry is being transformed by technology. The security and protection sector, which has long lagged behind others, has been gaining traction on this front for years as new tools are created to assist global security teams in identifying and monitoring a variety of threats. The pandemic has accelerated this…
Read MoreWorking Smarter to Protect Family Offices and High-Profile Individuals
No detail is too small when evaluating the activity that surrounds high-profile individuals and their families. Whether it be their morning coffee shop routine, their children’s activity level on social media, or how to keep an appropriate distance from crowds at philanthropic events, there is a great deal of risk to mitigate on a day-to-day…
Read MoreA Commitment to Disrupting the Top Physical Security Threats
This article was originally featured in American Security Today A quiet day in the life of a physical security professional is an accomplishment in every sense of the word. Working tirelessly to ward off any unwanted surprises, one can only hope they are covering all bases as the categories of threats continue to expand and…
Read MoreManaging Increased Cyber-Physical Security Threats in a Hyper-Connected World
This article was originally featured in Dark Reading. When it comes to enterprise security, the physical world and the cyber domain have long been treated as separate — like a Venn diagram whose circles don’t overlap. Those days are over. Companies are facing an enormous increase in threats, with physical exposures interacting with the cyber…
Read MoreDiscovering Important Security Lessons in Unexpected Places
This article originally appeared on LinkedIn I was flying solo in a single engine Cessna 172, departing from Austin Bergstrom International Airport (ABIA) to two small airports 20 miles away. This trip was categorized as a mini cross country flight as I was gearing up for my final check-ride to get my private pilot license…
Read MoreWhen Hiring Drivers, Proper Vetting Is Vital For Safety And Compliance
This article was originally featured on securityinformed.com. Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in…
Read More