Addressing the Cracks to Build a Comprehensive Security Program

Straight from the floor of GSX 2022, Bryan Flannery, President of Foresight Consulting, LLC and Protective Intelligence Honors recipient, joins host Chuck Randolph to discuss the state of violence and the importance of building a comprehensive program to effectively address it. Bryan and Chuck discuss how protection has evolved far beyond a person standing next…

Read More

Cyber-Physical Convergence is Happening, But Not Fast Enough

Leaders should drive discussions about triggers that cause decision-making. When and how should analysts escalate an issue? When should the cybersecurity team check in with HR about an employee’s behavior? Answering these questions and putting processes in place to help will increase your ability to respond proactively to threats and create a common operating picture…

Read More

Messing With Their Heads: Manipulating and Detecting Hostile Surveillance

One of the fundamentals of TorchStone’s approach to understanding and countering criminal behavior is that attacks “don’t just happen.” Crimes of all types are the result of processes and behaviors that can be understood and detected. One of these key bellwether behaviors is pre-operational surveillance. Almost every criminal act, from a purse-snatching to a terrorist bombing,…

Read More

What’s a Threat? That Depends on What Your Job Is

Extreme weather can stop trucks on the road and prevent key personnel from getting in the office, disruptions that can cost millions. Failure to comply with regulations can damage a company’s reputation and drive up operational costs.  These situations present real risks to the business.  Too often, executives in charge of managing one type of…

Read More

The Crucial Role of Critical Infrastructure Protection in Security

Many listeners remember where they were on 9/11. For Lt. Charnele Sanders, Special Projects Manager (Security and Integrity) at Great Lakes Water Authority, her career in protection was inspired by the events of 9/11 and the repercussions of securing assets in critical infrastructure. In her discussion with host Dr. Marisa Randazzo, Lt. Sanders discusses how…

Read More

The Intersection of Privacy, Compliance, and Security — Why a Unified Front Minimizes Risk

Karen Moore, Chief Compliance and Privacy Officer at Unisys, is responsible for the design and implementation of Unisys’ global compliance program and is charged with oversight of its cross-functional privacy program. She reports to the General Counsel and the Board Audit & Finance and Security & Risk Committees. When individuals with malicious intent have access…

Read More

When You Have Two Seconds to Make a Decision in the Line of Fire — Stories from President Reagan’s Former Protective Detail

On March 30th, 1981 Danny Spriggs had a career-defining moment that has stayed with him ever since he left the Washington Hilton Hotel. His instinctive move in a matter of seconds ensured that President Reagan, one of his assignments during his nearly three decades in the Secret Service, was safe from harm when shots were…

Read More

Corporate Stances, Potential Blowback and Security Strategies

This article was originally featured on Security Info Watch The drumbeat of bad news for corporate security and risk management seems to be endless: blowback from the U.S. Supreme Court’s decision to overturn Roe v. Wade, the mass shooting in Uvalde, Russia’s war in Ukraine, the upcoming 2022 midterm elections, the ongoing investigation and hearings…

Read More

The Tail Wagging the Dog

This podcast was originally featured on The Great Conversation CEOs manage risk and opportunity. How well they do that determines their path to value. So, who should be at the table helping the C-level team navigate risk and opportunity? What data should be collected, organized, analyzed, and communicated? How should it be contextualized to meet…

Read More