The Cyber-Physical Threat Connection Demands Attention
On a daily basis companies experience minor and major cyber violations that range from phishing for individual login passwords to significant ransomware attacks that can disrupt entire industries. No matter what the level of cyber infraction, these are security issues hyper connected to physical threats. This cyber-physical linkage — and the large-scale potential business continuity…
Read MoreHow Companies Stop Insider Threats Before They Occur
Discover proactive strategies to prevent insider threats at the crucial intersection of security measures and human behavior. With insider threats on the rise (up 47% in the last two years), a thorough screening process has become imperative for any new hire. Expanding well beyond a simple ‘check-the-box task,’ screening demands a comprehensive process that uncovers…
Read MoreHow-To Guide: Assessing an Executive’s Digital Footprint
A key element involved in understanding the threats, vulnerabilities, and associated risk to an executive is the assessment of their digital footprint. The ultimate goal is to surface what information is available online for a savvy adversary to exploit. This information could range from details about the executive’s travel movements, satellite imagery of their home(s)…
Read MoreHow to Assess Your Executive’s Digital Footprint to Identify Threats
This checklist will help you enhance your understanding of:
Read MoreHow to Mitigate Insider Threats with Continuous Monitoring
In this 45-minute webinar, you’ll learn valuable insights including how to:
Read MoreWhat It Means to Be an Executive Protection Agent
The instinct to step forward and protect leaders when danger is on the horizon has been around since the beginning of mankind. It has evolved into the field of executive protection, or close protection, to keep corporate leaders and high-net-worth individuals and their families safe. In movies, we see agents wearing black suits, disrupting threats…
Read More
How to Assess Your
Executive’s Digital Footprint
to Identify Threats
In this 45-minute webinar, you’ll learn valuable insights about:
Read MoreContinuous Monitoring in the Intelligence Cycle
In this whitepaper, learn the elements of continuous monitoring, including:
Read MoreHow to Create Intelligence from Anomalies and Patterns
In this 45-minute webinar, hear from security leaders from Ontic share the core elements of threat hunting, including:
Read MoreGaining Deeper Insights Beyond Social Media Threat Intelligence
When we zoom out and think about corporate threat assessment investigations holistically, it’s clear that social media threat intelligence plays a significant role — but how significant is it? In this article, we’d like to explore the benefits of using social media threat monitoring when conducting investigative research, as well as the pitfalls of relying…
Read MoreBefore the IPO: When to Think About Security
Most CEOs of companies undergoing an IPO don’t know what they need. Understand the holistic threat before buying security software and systems. When it comes to physical security systems and programs, many get sold a Cadillac when all they need is a Chevrolet, so work with a trusted vendor. Over the years, I’ve been asked…
Read MoreWhat is Executive Protection? A Complete Introduction
Executive Protection (EP), also called Close Protection (CP) or executive personal protection, refers to private risk mitigation and security measures designed to ensure the safety of individuals (principals) and their families. Principals may require executive protection services due to higher personal risk related to their employment, geographic location, net worth, affiliations, or status. Classic attack…
Read MoreHostile Termination Preparedness
Get a checklist of criteria to consider as you assess your level of preparedness when it comes to terminations, including:
Read MoreWhen Hiring Drivers, Proper Vetting Is Vital For Safety And Compliance
This article was originally featured on securityinformed.com. Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in…
Read MoreTop 5 Security Analyst Interview Questions to Prepare For
When you are inspired to apply everything you learned in your university programs to protect people and assets, a Security Analyst position is a common starting point. It is also an area that companies plan to further invest in — in Ontic’s recent study on the State of Protective Intelligence, 66% of security leaders plan…
Read MoreThe 2021 State of Protective Intelligence Report
Download the report for insights on:
Read More