Perspectives on the Shinzo Abe Assassination
Download this whitepaper to help your organization understand:
Read MoreHow to Get in Front of Threats at a Global Scale from Verizon’s CSO
When you have a retail footprint in nearly 40 countries around the globe, having the same security plan in each region is a straight path to chaos — or worse, harm to employees, customers, or assets. Dan Maloney, Chief Security Officer (CSO) and Senior Vice President of Global Corporate Security with Verizon Communications, knows a…
Read MoreAddressing the Cracks to Build a Comprehensive Security Program
Straight from the floor of GSX 2022, Bryan Flannery, President of Foresight Consulting, LLC and Protective Intelligence Honors recipient, joins host Chuck Randolph to discuss the state of violence and the importance of building a comprehensive program to effectively address it. Bryan and Chuck discuss how protection has evolved far beyond a person standing next…
Read MoreCyber-Physical Convergence is Happening, But Not Fast Enough
Leaders should drive discussions about triggers that cause decision-making. When and how should analysts escalate an issue? When should the cybersecurity team check in with HR about an employee’s behavior? Answering these questions and putting processes in place to help will increase your ability to respond proactively to threats and create a common operating picture…
Read MoreMessing With Their Heads: Manipulating and Detecting Hostile Surveillance
One of the fundamentals of TorchStone’s approach to understanding and countering criminal behavior is that attacks “don’t just happen.” Crimes of all types are the result of processes and behaviors that can be understood and detected. One of these key bellwether behaviors is pre-operational surveillance. Almost every criminal act, from a purse-snatching to a terrorist bombing,…
Read MoreWhat’s a Threat? That Depends on What Your Job Is
Extreme weather can stop trucks on the road and prevent key personnel from getting in the office, disruptions that can cost millions. Failure to comply with regulations can damage a company’s reputation and drive up operational costs. These situations present real risks to the business. Too often, executives in charge of managing one type of…
Read MoreThe Crucial Role of Critical Infrastructure Protection in Security
Many listeners remember where they were on 9/11. For Lt. Charnele Sanders, Special Projects Manager (Security and Integrity) at Great Lakes Water Authority, her career in protection was inspired by the events of 9/11 and the repercussions of securing assets in critical infrastructure. In her discussion with host Dr. Marisa Randazzo, Lt. Sanders discusses how…
Read MoreA Preview of WISE GALS: The Spies Who Built the CIA and Changed the Future of Espionage
Any good historian knows that often the best stories are the ones that haven’t been shared yet. When it comes to the Central Intelligence Agency (CIA), which recently celebrated its 75th anniversary, there are many fascinating stories of women that have been lost in history. Thanks to author Nathalia Holt, these stories will come to…
Read MoreThe Intersection of Privacy, Compliance, and Security — Why a Unified Front Minimizes Risk
Karen Moore, Chief Compliance and Privacy Officer at Unisys, is responsible for the design and implementation of Unisys’ global compliance program and is charged with oversight of its cross-functional privacy program. She reports to the General Counsel and the Board Audit & Finance and Security & Risk Committees. When individuals with malicious intent have access…
Read More2022 Mid-Year Outlook State of Protective Intelligence Report
Ontic surveyed 400 executives across four different departments at U.S. enterprises who have responsibilities for protecting businesses: physical security, cybersecurity and IT, human resources, and legal and compliance. Download the report to gain new insights into:
Read MoreWhen You Have Two Seconds to Make a Decision in the Line of Fire — Stories from President Reagan’s Former Protective Detail
On March 30th, 1981 Danny Spriggs had a career-defining moment that has stayed with him ever since he left the Washington Hilton Hotel. His instinctive move in a matter of seconds ensured that President Reagan, one of his assignments during his nearly three decades in the Secret Service, was safe from harm when shots were…
Read MoreSecurity Robots: A New Frontier in Protection — and Why You Shouldn’t Be Afraid
When you’re on the highway and you notice a patrol officer up ahead, your instinct is to pump the brakes no matter what speed you’re going. The same caution prevails for seeing a five-foot, 400-pound security robot monitoring a corporate campus — an unwanted visitor is far more likely to take their actions elsewhere when…
Read MoreIt’s More Than Just Mail – How Corporations Can Avoid Risk Before it Materializes
When a CEO receives a threatening letter it’s rarely just a one-off incident. However, it’s surprising to realize how frequently these notes are tossed in the trash and treated without concern. Will Plummer, Chief Security Officer of RaySecur, knows first-hand how mail is a bellwether to many other security events, and when ignored, can cause…
Read MoreBridging the Gap Between Human Resources and Security: Strategies for Partnership
Sometimes it takes an unfortunate event to inspire change. For Melissa Muir, a Human Resources (HR) professional committed to bridging the gap between security and HR, this realization came to her as she was about to embark on an employee termination – but one that was potentially very dangerous. From this incident, she was drawn…
Read MoreCorporate Stances, Potential Blowback and Security Strategies
This article was originally featured on Security Info Watch The drumbeat of bad news for corporate security and risk management seems to be endless: blowback from the U.S. Supreme Court’s decision to overturn Roe v. Wade, the mass shooting in Uvalde, Russia’s war in Ukraine, the upcoming 2022 midterm elections, the ongoing investigation and hearings…
Read MoreThe Tail Wagging the Dog
This podcast was originally featured on The Great Conversation CEOs manage risk and opportunity. How well they do that determines their path to value. So, who should be at the table helping the C-level team navigate risk and opportunity? What data should be collected, organized, analyzed, and communicated? How should it be contextualized to meet…
Read More