The Intelligence Cycle in Action

How to apply this timeless approach in the modern world. Contents History Evolution Framework Steps Application Enhancement Security threats have always evolved rapidly in government circles, in the military realm, and in the private sector. Those threats look different in the 21st century than they did decades ago, but the Intelligence Cycle is just as…

Read More

5 Strategies to Prepare Organizations for Presidential Election Disruption

The countdown to the US presidential election is well underway, and concerns about election-related violence and disruption are on the rise. For the first time ever, the Council on Foreign Relations’ Preventive Priorities Survey has identified a domestic threat – the growing risk of political violence around the U.S. –  rather than an international conflict…

Read More

Structuring the Unstructured: Consolidating Reports into One Cohesive Record 

Discover how combining your investigative research into a configurable, cohesive report can help surface more from your findings. Over the past few articles, I’ve shared my perspective on why building the right data structure matters. I’ve also emphasized the importance of finding security solutions that can surface critical information fast. Next, I want to touch…

Read More

Prioritizing Threat Actors: 3 Steps to Uncovering and Concentrating on Your Most Significant Risks

Learn how to sift through the noise and focus on the threats likely to significantly impact your organization. Contents The Growing Challenge of Accurate Prioritization Gather Information on Persons of Interest (POI) Conduct Threat Assessments Determining Risk Bringing it All Together: The Power of Connected Intelligence Via a Centralized Platform The ever-expanding threat landscape and…

Read More

The New Information Landscape is Changing How Security Leaders Work

This article was originally featured in Security Magazine Imagine a scenario many security practitioners are familiar with: A bizarre post on an obscure social media account surfaces. It could be construed as a threat against a company executive. But it’s unclear. To further complicate the situation, a different executive at the organization has recently been under public…

Read More

How to Create a Comprehensive Investigative Research Process

Get insights from security leaders from Capital One, Qualcomm, and Ontic. In an increasingly digital world, staying informed is not just an option for security teams; it’s a necessity. Corporate security teams can easily be overwhelmed by the sheer amount of threats pouring in, not to mention the variety of sources they’re coming from. As…

Read More

Organized Retail Crime in Focus

Fighting ORC is possible, but without a holistic view and fully resourced corporate security teams and law enforcement partners, it can be an uphill battle. This article was originally featured in Security Magazine We’ve become all too familiar with the social media videos capturing a shoplifter running out of the store with a haul of…

Read More

5 Things California Employers Should Consider to Comply with Senate Bill 553

If you are an employer in California, you’ve probably heard about Senate Bill 553, the legislation requiring most California employers to take steps to prevent and respond to workplace violence and threats. After opposition from various business groups and labor unions prompted the removal of some controversial provisions, the bill passed the California legislature and…

Read More

‘Mission First, People Always:’ A Mantra for Security Talent

This article was originally featured in Security Management. The phrase “Mission first, people always” is a common mantra in the military, and it is often borrowed in leadership studies. It’s a vision of success that invests in the success of those around you, a sense of shared mission (the why), no matter your specialty or…

Read More