Separating Signals From Noise: The Biggest Security Challenge Moving Forward
See how generative artificial intelligence is revolutionizing threat detection and risk mitigation. This article was originally featured in Forbes When I started my career as a counterterrorism investigator, information was much harder to come by. A single clue was hard-earned and often involved following breadcrumbs and retracing steps. Real-time data was even rarer since the…
Read More5 Things California Employers Should Consider to Comply with Senate Bill 553
If you are an employer in California, you’ve probably heard about Senate Bill 553, the legislation requiring most California employers to take steps to prevent and respond to workplace violence and threats. After opposition from various business groups and labor unions prompted the removal of some controversial provisions, the bill passed the California legislature and…
Read MoreCollections from a Lifetime in Protection
Anyone who has read my memoir Ghost: Confessions of a Counterterrorism Agent (Random House, 2008) knows I grew up in the Washington, D.C. area in the 1960s and 1970s. It was a different era when blue-collar families like mine could afford to co-mingle with the Washington power brokers and elite. Geography is always important, and…
Read More‘Mission First, People Always:’ A Mantra for Security Talent
This article was originally featured in Security Management. The phrase “Mission first, people always” is a common mantra in the military, and it is often borrowed in leadership studies. It’s a vision of success that invests in the success of those around you, a sense of shared mission (the why), no matter your specialty or…
Read MoreHow Empathy Can Help Prevent Violence in the Workplace and in Schools
This article was originally featured in Security Magazine. Over the past year, security personnel across a wide swath of sectors have reported that threats are increasing in volume, severity and/or in urgency. And many organizations are trying to figure out how best to handle this spike in threats. For some supervisors and C-suite leadership, their inclination is…
Read MoreInside the Mind of the Attacker: Using Red Teaming to Mitigate Business Risk
Dr. Treston Wheat is a red team analyst who specializes in TTP (tactics, techniques, procedures) research, threat modeling, and social engineering. Previously, he was a strategic cybersecurity analyst and geopolitical risk analyst. Dr. Wheat is also an adjunct professor at Georgetown University teaching about intelligence analysis, and he is the editor-in-chief of IPSB’s The Close…
Read MoreThe Enemy of My Enemy is My Friend: Strengthening Insider Threat Resilience with Cyber-Physical Integration
This article was also written in partnership with Josh Massey, Director of Enterprise Risk of The MITRE Corporation’s Enterprise Security Assurance department. As such, Mr. Massey is responsible for establishing, executing, supervising, and directing the implementation and oversight of MITRE’s insider threat program and strategic protection initiatives across MITRE’s six federally funded research and development…
Read MoreWhen the Little Things Add Up: The Intel Analysts’ Role in Communicating Imminent Risk to Leadership
The geopolitical landscape has become increasingly complex to manage for intel analysts — especially those conducting risk assessments on an international level. They have to be hyper-aware of countries with a more authoritarian regime that can leverage the business relationship in their best interest, putting the company at risk. However, it’s not always easy to…
Read MoreShattering Silos: Getting Security and Human Resources to Partner Together for Safety
Security professionals and human resources (HR) professionals share a common goal – fostering a safe and secure workplace – yet they often don’t know how to partner together to make it happen. In this episode, Dr. Marisa Randazzo talks with Nici McLean and Melissa Muir, two HR professionals who are passionate about bridging this divide…
Read MoreThe Evolution of Targeted Violence and Why the Threats We Don’t See Pose the Most Danger
When entering unknown territory, the sound of a barking dog in the distance poses an ominous foreshadowing of the potential violence ahead. Identifying the magnitude of the bite (or threat) and how to mitigate it is pivotal to coming out unscathed, and is a mission that Mike Roche, former Secret Service Special Agent and author,…
Read MoreFrom the Field: Strategies for Upgrading Your Corporate Investigations Program
Register to learn more about how to:
Read More9 Industry Leading Perspectives on How to Communicate the Value of Corporate Security
There’s no time like the present to prioritize security within organizations. Mitigating risk protects not only a business’s workforce and property but also its operations, financial stability, and reputation. Despite many leaders understanding this, in many cases, they are still leaving security in the dark, pulling away funds for critical programs, team members, and technology.…
Read MoreDangerous Admirers: How to Protect Public Figures From Harassers As Legal Protections Are in Jeopardy
In 2010, country-music singer Coles Whalen began receiving messages from a fan on her Facebook account. While Ms. Whalen ignored the relatively benign messages at first, the fan kept sending her messages—thousands over the course of several years. The fan praised her talents but also alluded to following her and knowing the whereabouts of her…
Read MoreFormer FBI Special Agent Shares What’s Essential to Managing Investigations
“If it’s not documented, it didn’t happen” is a standard that Christine Oliver has stood by for the duration of her career, leading investigations in both the public and private sectors. As a Former FBI Special Agent and current emergency response and security leader, she prides herself in developing and implementing a thorough incidents, investigations…
Read MoreJack Carr Answers All — Questions from the Audience and A Sneak Peek into Only the Dead
Jack Carr’s latest addition to the James Reece series, Only the Dead, is a captivating page-turner that does not disappoint. With meticulous research and attention to detail, he transports readers to the 1980s, immersing them in a volatile and divided political environment. Jack is a former Navy SEAL who led special operations teams as a…
Read MoreMinimizing IP Theft and Insider Threats During Times of Layoffs
This article was originally featured on Security Today Building out cross-functional collaboration between cyber and physical security teams will create a more unified approach, where a common language is established to better understand each department’s key priorities and processes. Doing so ensures there is collective monitoring of identified risk groups or individuals. It also ensures…
Read More