From the Field: Strategies for Upgrading Your Corporate Investigations Program
Register to learn more about how to:
Read More9 Industry Leading Perspectives on How to Communicate the Value of Corporate Security
There’s no time like the present to prioritize security within organizations. Mitigating risk protects not only a business’s workforce and property but also its operations, financial stability, and reputation. Despite many leaders understanding this, in many cases, they are still leaving security in the dark, pulling away funds for critical programs, team members, and technology.…
Read MoreDangerous Admirers: How to Protect Public Figures From Harassers As Legal Protections Are in Jeopardy
In 2010, country-music singer Coles Whalen began receiving messages from a fan on her Facebook account. While Ms. Whalen ignored the relatively benign messages at first, the fan kept sending her messages—thousands over the course of several years. The fan praised her talents but also alluded to following her and knowing the whereabouts of her…
Read MoreFormer FBI Special Agent Shares What’s Essential to Managing Investigations
“If it’s not documented, it didn’t happen” is a standard that Christine Oliver has stood by for the duration of her career, leading investigations in both the public and private sectors. As a Former FBI Special Agent and current emergency response and security leader, she prides herself in developing and implementing a thorough incidents, investigations…
Read MoreJack Carr Answers All — Questions from the Audience and A Sneak Peek into Only the Dead
Jack Carr’s latest addition to the James Reece series, Only the Dead, is a captivating page-turner that does not disappoint. With meticulous research and attention to detail, he transports readers to the 1980s, immersing them in a volatile and divided political environment. Jack is a former Navy SEAL who led special operations teams as a…
Read MoreMinimizing IP Theft and Insider Threats During Times of Layoffs
This article was originally featured on Security Today Building out cross-functional collaboration between cyber and physical security teams will create a more unified approach, where a common language is established to better understand each department’s key priorities and processes. Doing so ensures there is collective monitoring of identified risk groups or individuals. It also ensures…
Read MoreHow a Digitally-Informed Approach to Security Can Revolutionize the Patron Experience
Oftentimes when concert or sports venues ramp up their security measures, the guest experience is downgraded with longer lines and more processes and rules. This doesn’t have to be the case. A customer-backed model, keeping in mind what’s important to the patron and what information the GSOC needs to know, can transform the patron experience…
Read MoreFrom Coronations to Corporations: The Hidden Nuts and Bolts of Major Event Security Planning
This article was originally featured on IFSEC Insider When Queen Elizabeth was crowned in June 1953, the procession of dignitaries that followed numbered 16,000 people. It took the procession approximately 45 minutes to pass any one point along the route. When she died nearly 70 years later, London’s Metropolitan Police Service said her funeral was…
Read MoreFrom OSAC to DSAC to Visa’s GSOC: Identifying the Root Cause of Security Concerns
In the fields of security and intelligence, where definitive answers and data are often needed immediately to make critical decisions, taking the time to listen can get pushed aside. However, as Mary Hackman argues, looking for the root causes of security problems and finding time to ask for the opinions of others may be the…
Read MoreThe Real-Life Spy Behind the James Bond 007 Series
James Bond is one of the most legendary characters in film witnessed over the past several decades. In 1953 when the character of James Bond came to fruition in Ian Fleming’s novels under the code name 007, many were unaware that the inspiration for the character came from Serbian double agent, Duško Popov. Author Larry…
Read MoreDHS Senior Medical Officer Shares Expertise on the Level of Medical Training Needed From Today’s Security Professionals
Training for failure versus success is game changing when it comes to responding to a worst-case scenario. However, today’s threat landscape has shown us that being prepared extends far beyond typical protection responsibilities. Basic medical training for security professionals is becoming more and more necessary to fulfill one’s duty of care. Dr. Alex Eastman is…
Read MoreBeneath the Surface of Fraud, Corruption, and Compliance Risk Investigations
Identifying the most imminent threats are often far beneath what surfaces in the headlines. They take the expertise and perspectives of a team to ensure answers are sought collectively to minimize bias. This all-encompassing approach is especially important when dealing with cases involving fraud, corruption, and compliance risk. James Tunkey is the Chief Operating Officer…
Read MoreSpotlighting the One Year Anniversary of Women Who Protect with Dr. Marisa Randazzo
Dr. Marisa Randazzo, PhD joins the podcast for a special round-up episode to celebrate the one-year mark on our Protective Intelligence Podcast series, Women Who Protect. This series spotlights women working in a wide range of positions within security, protection, and law enforcement. We’ve compiled highlights from some of our episodes featuring guests ranging from…
Read MoreRed Teaming at Scale to Uncover Your Big Unknowns
This article was originally featured on Dark Reading During the global war on terror, a group of commissioned and noncommissioned officers in the United States military participated in a unique training event. Soldiers of various ranks, all with different specialties, assembled in a remote location where they were stripped of rank and other identifying markers.…
Read MoreA Constant State of Crisis: How Corporate Security Teams Are Adapting to the New Normal
Corporate security teams face a new normal, and it’s called permacrisis – a state where instability and insecurity are constant. While many security teams already operate in this mindset, the difference is that the security department is one of many teams in constant vigilance. As a result, departments across organizations are becoming aware of permacrisis…
Read MoreMaking it Easier to Have Conversations About Mental Health and Victimization on Campus
Content Warning: This episode contains content pertaining to sexual assault, which some may find difficult to listen to. This episode is not recommended for young children. While we often hear that it is important to be able to have discussions about mental health, addiction, and victimization, it can be incredibly difficult to do so. Talking…
Read More