Gaining Stakeholder and Employee Support for Your Insider Risk Program
How to build trust with your employees and stakeholders through training, empathy, and effective communication What’s in a name? We have all heard, been involved in, or led conversations regarding what to name our insider threat program. The industry standard has always been “Insider Threat,” yet many in the corporate setting find this term too…
Read MoreSetting Up Your Insider Risk Program for Success
Register for our webinar to learn the critical elements of establishing a successful insider risk program, including:
Read MoreWho Owns Implementation of California’s New Workplace Violence Prevention Law?
Managing compliance takes a collaborative effort from several different departments, but security teams are uniquely positioned to lead the collaboration This article was originally posted in ASIS Security Management Magazine. Employers in California had a 1 July deadline to comply with SB 553, the state law mandating that employers establish workplace violence prevention programs. The question…
Read MoreFrost Radar™: Digital Intelligence Solutions, 2024
Download your free copy of the report to gain insights on:
Read MoreHow to Take Your Investigations Program From Good to Great
Download this guide today to learn:
Read MoreHow to Act Before, During, and After a Crisis
A rise in physical threats requires updated response procedures. Learn what’s behind this increase and what you can do to address crises when they occur. When did you last review your crisis response plan and threat assessment? Do they address how to respond to threats in today’s increasingly volatile environment? More than likely, you’ve seen…
Read MoreA Guide to Evaluating Case Management Solutions
In this guide, you’ll learn:
Read More4 Executive Travel Vulnerabilities You May be Overlooking
Learn how to minimize the impact of vulnerabilities like social media use, private jet tracking, and more As an executive protection (EP) professional, you’re likely experiencing a rise in physical threats against your principal(s). You’re not alone. According to Ontic’s State of Protective Intelligence Report, 8 out of 9 EPs say their companies are experiencing…
Read MoreEnhancing the Intelligence Cycle: How to Leverage Feedback to Provide More Valuable Intelligence
Learn why intelligence feedback is so important and uncover strategies for getting the insights you need The Role of Feedback in the Intelligence Cycle When Feedback Fails What This Means for Corporate Teams So Feedback is Useful; How Do We Get It? “The best intelligence goes to the best clients.” This statement by Paul Kolbe,…
Read MoreHow to Elevate Your Investigations Program by Addressing Common Gaps
Learn key steps security experts have taken to address common weak points, including how to:
Read MoreThe Path to Modernizing Your Home-Grown Case Management System
Learn how to leverage your current challenges to drive support for a purpose-built case management solution As a corporate security leader responsible for investigations, your primary objective is to keep your people and assets safe. Despite the critical nature of your work, you may be forced to manage investigations with tools that aren’t designed to…
Read MoreKeeping Your Employees Safe at the 2024 Olympic Games
By Chuck Randolph and Fred Burton As the world eagerly anticipates the 2024 Paris Olympics, the event’s grandeur remains a magnet for threats. Like its predecessors, the 33rd Summer Olympics is a target. French media has reported, in the lead-up to the event, that French authorities are on heightened alert due to terror plots thwarted. …
Read MoreEmerging Technology Highlights New Converged Risks and Asymmetric Threats
Protecting high-profile individuals and events as the digital threat landscape evolves This article was originally posted in ASIS Security Management Magazine. The ubiquity of technology companies in daily life today puts them in the security spotlight, with increasing media attention, political scrutiny, and complex, overlapping threats. In November 2023, after visiting with U.S. President Joe…
Read MoreAlternative Social Media: What It Means for Threat Intelligence Gathering
Why the rise in alternative social media platforms with less moderation and greater anonymity calls for a more proactive approach to threat monitoring. Early versions of social media platforms began emerging in the late 90s and early 2000s with the intended purpose of connecting users with others based on shared interests, affiliations, or geographic proximity.…
Read MoreCreating an Effective Insider Risk Program
With insider incidents on the rise, security leaders are taking a proactive approach to help blunt the negative impacts For most organizations, people are their greatest asset. However, employees with access to information, technology, and facilities can also be your company’s greatest vulnerability — intentionally and unintentionally. In light of recent mass layoffs and the…
Read MoreEnhancing Corporate Security: The Value of Intelligence in Weather Related Threats
How to ensure the safety of corporate assets and personnel amidst increasingly frequent and intense severe weather Due to the increasing severity of destructive weather events — including hurricanes, tornadoes, and wildfires — improved weather monitoring and updated action plans are essential for protecting corporate assets and ensuring the safety of personnel. This requires a…
Read More