Separating Signals From Noise: The Biggest Security Challenge Moving Forward

See how generative artificial intelligence is revolutionizing threat detection and risk mitigation. This article was originally featured in Forbes When I started my career as a counterterrorism investigator, information was much harder to come by. A single clue was hard-earned and often involved following breadcrumbs and retracing steps. Real-time data was even rarer since the…

Read More

5 Things California Employers Should Consider to Comply with Senate Bill 553

If you are an employer in California, you’ve probably heard about Senate Bill 553, the legislation requiring most California employers to take steps to prevent and respond to workplace violence and threats. After opposition from various business groups and labor unions prompted the removal of some controversial provisions, the bill passed the California legislature and…

Read More

Collections from a Lifetime in Protection 

Anyone who has read my memoir Ghost: Confessions of a Counterterrorism Agent (Random House, 2008) knows I grew up in the Washington, D.C. area in the 1960s and 1970s. It was a different era when blue-collar families like mine could afford to co-mingle with the Washington power brokers and elite. Geography is always important, and…

Read More

‘Mission First, People Always:’ A Mantra for Security Talent

This article was originally featured in Security Management. The phrase “Mission first, people always” is a common mantra in the military, and it is often borrowed in leadership studies. It’s a vision of success that invests in the success of those around you, a sense of shared mission (the why), no matter your specialty or…

Read More

Inside the Mind of the Attacker: Using Red Teaming to Mitigate Business Risk

Dr. Treston Wheat is a red team analyst who specializes in TTP (tactics, techniques, procedures) research, threat modeling, and social engineering. Previously, he was a strategic cybersecurity analyst and geopolitical risk analyst. Dr. Wheat is also an adjunct professor at Georgetown University teaching about intelligence analysis, and he is the editor-in-chief of IPSB’s The Close…

Read More

The Enemy of My Enemy is My Friend: Strengthening Insider Threat Resilience with Cyber-Physical Integration

This article was also written in partnership with Josh Massey, Director of Enterprise Risk of The MITRE Corporation’s Enterprise Security Assurance department. As such, Mr. Massey is responsible for establishing, executing, supervising, and directing the implementation and oversight of MITRE’s insider threat program and strategic protection initiatives across MITRE’s six federally funded research and development…

Read More

When the Little Things Add Up: The Intel Analysts’ Role in Communicating Imminent Risk to Leadership

The geopolitical landscape has become increasingly complex to manage for intel analysts — especially those conducting risk assessments on an international level. They have to be hyper-aware of countries with a more authoritarian regime that can leverage the business relationship in their best interest, putting the company at risk. However, it’s not always easy to…

Read More

9 Industry Leading Perspectives on How to Communicate the Value of Corporate Security

There’s no time like the present to prioritize security within organizations. Mitigating risk protects not only a business’s workforce and property but also its operations, financial stability, and reputation. Despite many leaders understanding this, in many cases, they are still leaving security in the dark, pulling away funds for critical programs, team members, and technology.…

Read More

Minimizing IP Theft and Insider Threats During Times of Layoffs

This article was originally featured on Security Today Building out cross-functional collaboration between cyber and physical security teams will create a more unified approach, where a common language is established to better understand each department’s key priorities and processes. Doing so ensures there is collective monitoring of identified risk groups or individuals. It also ensures…

Read More