Using The Indications and Warning (I&W) Analysis to Manage Organizational Risk
The Center for Connected Intelligence partnered with Scott McHugh who works for the Institute for Homeland Security at Sam Houston State University to develop this piece. One of the key reasons we created the Ontic Center for Connected Intelligence (CCI) was to share industry tools, best practices and lessons learned to help those who protect…
Read MoreRunning Towards Fire — How to Mitigate Threats for Journalists in High-Risk Areas
Security professionals have increasingly demanding responsibilities in keeping people and assets safe as new threats arise and old ones loom in the periphery. When you’re charged with protecting nearly 1,000 individuals running towards action – oftentimes high-risk and in remote locations – it takes a certain type of individual to mitigate risk. Matt Bohatch is…
Read MoreThe Evolution of Addressing Targeted Violence Since the 1996 Centennial Olympic Park Bombing
Receiving a call to be notified that there has been violent activity in the middle of the night is every security professional’s worst nightmare. However, when that activity is a bomb in the middle of Centennial Olympic Park, it takes on much broader implications. Dave Benson speaks of his experience as a Special Agent for…
Read MoreThe All-Encompassing Meaning of “Risk” — Acknowledging Protection Beyond Physical Barriers
It’s no secret that threats often begin in the cyber domain and swiftly move over into the physical. However, connecting the two worlds has yet to be a standard in the protection industry. Today’s threats are too severe to solve with guards, gates, and guns — the domestic and global threat landscape demands a holistic…
Read MoreSoft Skills That Set Security Professionals Apart When Moving From Public to Private Sectors
Whether it’s a SWAT team investigation or organized retail crime, there’s always more to the story than it appears. The simple, but often overlooked skill of taking time to listen to people, versus reacting to surface-level information, allows investigators to understand the complete picture of what is happening and how it’s connected to surrounding events.…
Read MoreThe Need for Nuance in Protective Intelligence Part 4: Extinction Rebellion
This is the fourth installment in an occasional series examining threat actors from a protective intelligence perspective. Earlier articles in this series examined the Islamic State pole of jihadism, Antifa, and the Boogaloo movement. This article discusses the background of some of the activists behind the Extinction Rebellion campaign (XR), their ideology, their past activities, and the implications of this…
Read MoreWhy an Objective-Centric Security Strategy Matters
More often than not, security teams forget to use common operating language when sharing critical risk intel with C-suite leaders, making it challenging for them to take action before threats arise. Bruce McIndoe has been a visionary and serial entrepreneur in the national security, intelligence, and operational risk management space for global organizations over the…
Read MoreWhy Rock Bands Demand a Unique Security Strategy
If you’ve attended a concert recently, chances are you noticed routine security screening upon entry and possibly security near the stage to monitor crowd activity and interaction with the performers. However, beneath the surface, there is a web of information and advanced work that takes place – from monitoring hotel rooms for stalkers to online…
Read MoreProving the Value of Security: How to Avoid the ‘Break Glass Now’ Label
This article was originally featured on Total Security Advisor Keeping employees healthy and safe and property secure is crucial, especially in light of the current geopolitical landscape, ongoing issues stemming from the most recent pandemic, and the tragic events in Highland Park, Uvalde, Buffalo, Tulsa, and many more cities. In a seemingly non-stop threat environment, corporate…
Read MoreThe Art of Turning Information into Intelligence
Straight from the floor of GSX 2022, George Taylor, Chief Operating Officer of Exlog Global, joins host Chuck Randolph to discuss why approaching intelligence as an art versus a science is a plan for success. Surprises are never met with open arms in the world of a security professional. Scenarios – both good and bad…
Read MoreThe Evolution of OSINT: Managing Privacy When It’s Nearly Impossible to Hide
Straight from the floor of GSX 2022, Don Sortor, Senior Vice President of Global Integrity, Inc, joins host Chuck Randolph to discuss the evolution of open source intelligence. There was a time in the security profession when practitioners were fed intelligence informing them about how to approach (or avoid) a threat. Fast forward a few…
Read MoreWhere Strategic Intelligence Fits Into a Company’s Global Operations
Thinking beyond tactical day-to-day security operations is a goal we’ve heard time and time again. However, in today’s threat landscape it’s a choice we can’t ignore. Reading changes around the world that occur outside the boundaries of business operations is growing in importance to both corporations and non-government organizations alike. Rodger Baker joins host Fred…
Read MoreThe Value of Storytelling to Prove Security’s Company-Wide Impact
Straight from the floor of GSX 2022, Jim Bernhardt, Corporate Security Leader at the Nikola Motor Company, joins host Chuck Randolph to discuss the impact of storytelling to demonstrate the value of scenario planning and addressing risk before it becomes a larger issue. Thinking about what could go wrong is innate in nearly every security…
Read MoreHow Security Teams Have Expanded Their Duties
This article was originally featured on IFSEC Global Regarding gigabytes, physical security units are partnering with cyber security teams to manage the protection of highly valued assets, such as intellectual property. Many cyber security standards, including Payment Card Industry (PCI), have physical security components. But the convergence of physical and cyber security goes well beyond…
Read MoreLegal and compliance teams: Where do they fit in the physical security picture?
Legal and compliance teams engage with nearly every aspect of the organization, from labor law to contracts, to cybersecurity. The role they play to reduce workplace violence and other security risks often go unnoticed and are seldom discussed. It’s worth having those discussions, because legal and compliance teams often set workplace violence policies, interpret regulations…
Read MoreWhat Does Your C-Suite Need to Know? The Role of Data-Informed Decisions in Corporate Security
Straight from the floor of GSX 2022, Ken White, Expedia Group’s Senior Manager of Physical Risk, Intelligence, & Investigations, joins host Chuck Randolph to discuss the role of data-informed decisions and their effect on how information is addressed and dispersed. In a climate of distractions and information coming in from every angle, knowing what matters…
Read More