Using The Indications and Warning (I&W) Analysis to Manage Organizational Risk

The Center for Connected Intelligence partnered with Scott McHugh who works for the Institute for Homeland Security at Sam Houston State University to develop this piece.  One of the key reasons we created the Ontic Center for Connected Intelligence (CCI) was to share industry tools, best practices and lessons learned to help those who protect…

Read More

Running Towards Fire — How to Mitigate Threats for Journalists in High-Risk Areas

Security professionals have increasingly demanding responsibilities in keeping people and assets safe as new threats arise and old ones loom in the periphery. When you’re charged with protecting nearly 1,000 individuals running towards action – oftentimes high-risk and in remote locations – it takes a certain type of individual to mitigate risk. Matt Bohatch is…

Read More

Soft Skills That Set Security Professionals Apart When Moving From Public to Private Sectors

Whether it’s a SWAT team investigation or organized retail crime, there’s always more to the story than it appears. The simple, but often overlooked skill of taking time to listen to people, versus reacting to surface-level information, allows investigators to understand the complete picture of what is happening and how it’s connected to surrounding events.…

Read More

The Need for Nuance in Protective Intelligence Part 4: Extinction Rebellion

This is the fourth installment in an occasional series examining threat actors from a protective intelligence perspective. Earlier articles in this series examined the Islamic State pole of jihadism, Antifa, and the Boogaloo movement. This article discusses the background of some of the activists behind the Extinction Rebellion campaign (XR), their ideology, their past activities, and the implications of this…

Read More

Why an Objective-Centric Security Strategy Matters

More often than not, security teams forget to use common operating language when sharing critical risk intel with C-suite leaders, making it challenging for them to take action before threats arise. Bruce McIndoe has been a visionary and serial entrepreneur in the national security, intelligence, and operational risk management space for global organizations over the…

Read More

Why Rock Bands Demand a Unique Security Strategy

If you’ve attended a concert recently, chances are you noticed routine security screening upon entry and possibly security near the stage to monitor crowd activity and interaction with the performers. However, beneath the surface, there is a web of information and advanced work that takes place – from monitoring hotel rooms for stalkers to online…

Read More

Proving the Value of Security: How to Avoid the ‘Break Glass Now’ Label

This article was originally featured on Total Security Advisor Keeping employees healthy and safe and property secure is crucial, especially in light of the current geopolitical landscape, ongoing issues stemming from the most recent pandemic, and the tragic events in Highland Park, Uvalde, Buffalo, Tulsa, and many more cities. In a seemingly non-stop threat environment, corporate…

Read More

The Art of Turning Information into Intelligence

Straight from the floor of GSX 2022, George Taylor, Chief Operating Officer of Exlog Global, joins host Chuck Randolph to discuss why approaching intelligence as an art versus a science is a plan for success. Surprises are never met with open arms in the world of a security professional. Scenarios – both good and bad…

Read More

Where Strategic Intelligence Fits Into a Company’s Global Operations

Thinking beyond tactical day-to-day security operations is a goal we’ve heard time and time again. However, in today’s threat landscape it’s a choice we can’t ignore. Reading changes around the world that occur outside the boundaries of business operations is growing in importance to both corporations and non-government organizations alike. Rodger Baker joins host Fred…

Read More

The Value of Storytelling to Prove Security’s Company-Wide Impact

Straight from the floor of GSX 2022, Jim Bernhardt, Corporate Security Leader at the Nikola Motor Company, joins host Chuck Randolph to discuss the impact of storytelling to demonstrate the value of scenario planning and addressing risk before it becomes a larger issue. Thinking about what could go wrong is innate in nearly every security…

Read More

How Security Teams Have Expanded Their Duties

This article was originally featured on IFSEC Global Regarding gigabytes, physical security units are partnering with cyber security teams to manage the protection of highly valued assets, such as intellectual property. Many cyber security standards, including Payment Card Industry (PCI), have physical security components. But the convergence of physical and cyber security goes well beyond…

Read More

Legal and compliance teams: Where do they fit in the physical security picture?

Legal and compliance teams engage with nearly every aspect of the organization, from labor law to contracts, to cybersecurity. The role they play to reduce workplace violence and other security risks often go unnoticed and are seldom discussed. It’s worth having those discussions, because legal and compliance teams often set workplace violence policies, interpret regulations…

Read More

What Does Your C-Suite Need to Know? The Role of Data-Informed Decisions in Corporate Security

Straight from the floor of GSX 2022, Ken White, Expedia Group’s Senior Manager of Physical Risk, Intelligence, & Investigations, joins host Chuck Randolph to discuss the role of data-informed decisions and their effect on how information is addressed and dispersed. In a climate of distractions and information coming in from every angle, knowing what matters…

Read More