Connected Corporate Security: How to Manage Threats and Risks with a Unified Model
In this report developed in partnership with The Clarity Factory, we share how security teams can:
Read MoreStructuring the Unstructured: Consolidating Reports into One Cohesive Record
Discover how combining your investigative research into a configurable, cohesive report can help surface more from your findings. Over the past few articles, I’ve shared my perspective on why building the right data structure matters. I’ve also emphasized the importance of finding security solutions that can surface critical information fast. Next, I want to touch…
Read MorePrioritizing Threat Actors: 3 Steps to Uncovering and Concentrating on Your Most Significant Risks
Learn how to sift through the noise and focus on the threats likely to significantly impact your organization. The Growing Challenge of Accurate Prioritization Gather Information on Persons of Interest (POI) Conduct Threat Assessments Determining Risk Bringing it All Together: The Power of Connected Intelligence Via a Centralized Platform The ever-expanding threat landscape and data…
Read MoreThe Guide to Conducting Risk-Based Vendor Due Diligence
Download this guide to boost the effectiveness of your vendor due diligence process in three categories:
Read MoreThe New Information Landscape is Changing How Security Leaders Work
This article was originally featured in Security Magazine Imagine a scenario many security practitioners are familiar with: A bizarre post on an obscure social media account surfaces. It could be construed as a threat against a company executive. But it’s unclear. To further complicate the situation, a different executive at the organization has recently been under public…
Read MoreSecurity Industry Forecasts for 2024 and Beyond
Download this report for an exclusive look at 2024 forecasts from top security and safety leaders covering:
Read MoreHow to Create a Comprehensive Investigative Research Process
Get insights from security leaders from Capital One, Qualcomm, and Ontic. In an increasingly digital world, staying informed is not just an option for security teams; it’s a necessity. Corporate security teams can easily be overwhelmed by the sheer amount of threats pouring in, not to mention the variety of sources they’re coming from. As…
Read MoreStrategies to Prevent and Address Workplace Violence
Register for this webinar to hear security leaders from The University of Mississippi Medical Center, Tomahawk Strategic Solutions, and Ontic share the value of:
Read MoreOrganized Retail Crime in Focus
Fighting ORC is possible, but without a holistic view and fully resourced corporate security teams and law enforcement partners, it can be an uphill battle. This article was originally featured in Security Magazine We’ve become all too familiar with the social media videos capturing a shoplifter running out of the store with a haul of…
Read MoreHow to Run Effective Workplace Violence Investigations
This checklist will help you boost the effectiveness of your workplace violence investigations in three categories:
Read More5 Things California Employers Should Consider to Comply with Senate Bill 553
If you are an employer in California, you’ve probably heard about Senate Bill 553, the legislation requiring most California employers to take steps to prevent and respond to workplace violence and threats. After opposition from various business groups and labor unions prompted the removal of some controversial provisions, the bill passed the California legislature and…
Read More‘Mission First, People Always:’ A Mantra for Security Talent
This article was originally featured in Security Management. The phrase “Mission first, people always” is a common mantra in the military, and it is often borrowed in leadership studies. It’s a vision of success that invests in the success of those around you, a sense of shared mission (the why), no matter your specialty or…
Read MoreForrester’s Q3 2023 Landscape Report: Ontic Recognized Among Critical Event Management Providers
If you think back over the past couple of decades, the corporate security function at large companies has undergone a massive evolution. It’s become more proactive, less siloed, and more centralized. There’s an ongoing emphasis on intelligence and threat management across the board. This evolution is in full view in a new research report from…
Read MoreHow to Run Effective Insider Threat Investigations
This checklist will help you boost the effectiveness of your insider threat investigations in three categories:
Read MoreWhat Security Teams Miss When Researching Known (and Unknown) Threats
Hear about how to strengthen your intelligence program through:
Read MoreThe Guide to Establishing an Intelligence Baseline
Over the years, we’ve recognized a significant lack of processes in place that would enable security professionals to gain a better understanding of their data. Defining an Intelligence Baseline MVP Applying an MVP to Your POI Investigations Investigative Workflow Stages Connecting Data to Get a More Holistic View of Threats Putting It All Together We…
Read More