Creating a Culture of Safety: Strategies for Effective Workplace Violence Prevention
In this episode What does it take to create a truly safe workplace? On this episode of the Connected Intelligence Podcast, Chuck sits down with Hector Alvarez, a nationally recognized expert in workplace violence prevention. With over 30 years of experience, Hector offers clear, actionable strategies for implementing proactive workplace safety measures. Similar episodes: What…
Read MoreBuilding Next-Gen GSOCs with Visa’s Niall Herlehy
In this episode Join Fred Burton as he interviews Niall Herlehy, Visa’s lead for Protective Intelligence, about building world-class Global Security Operations Centers (GSOCs). Learn how forward-thinking companies like Visa are addressing complex threats and protecting their teams in an unpredictable world. This episode dives into practical advice and actionable strategies for professionals building or…
Read MoreUnderstanding the True Scope of Insider Risk for Modern Enterprises
In this episode Fred Burton speaks with Robin Welch-Stearns about understanding the true extent of insider risk for modern corporate security teams. Robin shares her insights from her time at the CIA and Google, highlighting the differences between insider risk in public and private sectors, as well as what led her to starting Pacific Resilience…
Read MoreMetrics That Matter: How Security Professionals Can Show Value
Build a metrics program tailored to your organization’s strategic goals This article was originally published in Security Magazine. Think back to your early days in the security industry. Perhaps, like many others, you spent years in law enforcement or the military before transitioning to the private sector. The business jargon you encountered — ROI, KPI,…
Read MoreBalancing Privacy and Protection: Building an Effective Insider Risk Program
In this episode Mike Smith explores the intricate balance between safeguarding personal privacy and ensuring robust security measures within organizations. His discussion with Fred covers the strategies for developing an effective insider risk program that both anticipates threats and respects individual rights. Through expert insights and real-world examples, you’ll gain a comprehensive understanding of how…
Read MoreFrom Reaction to Proaction: Transforming Corporate Security Leadership with Dave Komendat
In this episode Join us as we explore the dynamic shift from reactive to proactive corporate security leadership with Dave Komendat, former Vice President and Chief Security Officer for Boeing. In this episode, Dave shares his insights on building trust with business leaders through proactive risk management and the importance of employee safety in shaping…
Read MoreThe Ultimate Guide to Building an Effective Insider Risk Program
Throughout the steps outlined in this guide, you’ll learn how to:
Read MoreStrategies for Effective Insider Risk Programs with Honeywell’s Mike Pierce and Kevin Renwick
In this episode In this episode, Manish dives into the dynamic world of corporate security through the firsthand experiences of Honeywell’s seasoned professionals, Mike Pierce and Kevin Renwick, transitioning from law enforcement. Their conversation emphasizes the critical role of relationship-building in mitigating insider risks while highlighting innovative strategies for breaking down organizational silos. Listen in…
Read MoreHow to Elevate Your GSOC’s Impact in a World of Rising Threats
Keep your organization safe and drive real business impact with better situational awareness, threat monitoring, and communication As a student of protection history and former counter-terrorism special agent who investigated countless embassy bombings, kidnappings, hijackings, and assassinations, I know all too well that the threat landscape has always been dynamic. It ebbs and flows, primarily…
Read MorePrioritizing Protection: Integrating GSOCs with Organizational Security
In this episode Mike Gilbert discusses his extensive experience in product management and the evolution of Global Security Operations Centers (GSOCs) in this podcast episode. He highlights the crucial role GSOCs play as the central nervous system of an organization, managing complex security operations and evolving from reactive to proactive functions. Mike also touches on…
Read MoreConnected Intelligence and the Future of Security: Manish Mehta’s Perspective
In this episode In this episode, Manish Mehta, Ontic’s Chief Product Officer, sits down with hosts Chuck Randolph and Fred Burton to discuss the evolution of security and the importance of Connected Intelligence in modern protective practices. Manish also shares his insights on technological disruptions and how they shape industries beyond just security. The conversation…
Read MoreEnhance Your Insider Risk Program with These 6 Systems Integrations
Learn how the right integrations close critical data gaps, helping you gain a more complete view of your organization’s insider risk Cyber Threat Intelligence Systems Human Resources Information Systems Data Loss Prevention Solutions Inventory Management Systems Access Control and Visitor Management Systems License Plate Recognition and Video Management Systems To fully understand and mitigate your…
Read MoreAligning Security with Business Goals: Insights from Scott Lindahl
In this episode Scott Lindahl, Vice President Corporate Services and Chief Security Officer at Kellanova, shares his insights on aligning security with business goals. Scott explores the evolving role of security professionals in risk management and the importance of partnership and active listening within organizations. His conversation with Chuck provides practical guidance on balancing multiple…
Read MoreApplying the Intelligence Cycle in our New Days of Rage
Learn how the time-tested framework can help you understand and manage threats that may arise during this election cycle Former President Donald Trump survived a second assassination attempt by a sniper, this one on his golf course. In Springfield, Ohio, Gov. Mike DeWine has sent in state troopers after extremists began marching through town, and…
Read MoreHow to Build Cross-Departmental Alliances to Tackle Insider Risk
Security teams can’t manage insider risk alone — cross-departmental collaboration is key to early risk identification and mitigation The 5 steps to Fostering a Collaborative Insider Risk Approach Align on Common Goals and Objectives Develop Mutual Trust and Communication Implement Joint Policies and Processes Leverage Technology to Create a Common Operating Picture Track and Report…
Read MoreHow to Mitigate Insider Risk Throughout the Employee Lifecycle
This checklist will help you determine the effectiveness of your insider risk management processes throughout these three phases of an employee or contractor’s lifecycle:
Read More