Why Corporate Execs Should Prepare For Heightened Polarization

This article was originally featured on Forbes This year alone, the Department of Homeland Security has issued over half a dozen National Terrorism Advisory Bulletins. The latest warned that the U.S. remains in a heightened threat environment. Sadly, the DHS’s bulletins aren’t a new development. For the past few years, domestic extremists and foreign adversaries alike…

Read More

Growing Role of HR in Enhancing Workplace Security

Explore how Human Resources is partnering with security to foster a safer workplace culture. About a decade ago, one of my colleagues, Melissa Muir, was working in the courts as a young human resources (HR) manager and was preparing to terminate an employee.  In her effort to minimize embarrassment to the employee, she agreed to…

Read More

Case Management Software – A Complete Introduction

In the old days, protective intelligence case management software was very primitive. Typically, files sat on desktop hard drives or local servers. When a person of interest (POI) called to make threatening statements or mailed an unwanted package to an executive, an investigator would respond directly or involve local law enforcement. Then, they’d open the…

Read More

Legal and compliance teams: Where do they fit in the physical security picture?

Legal and compliance teams engage with nearly every aspect of the organization, from labor law to contracts, to cybersecurity. The role they play to reduce workplace violence and other security risks often go unnoticed and are seldom discussed. It’s worth having those discussions, because legal and compliance teams often set workplace violence policies, interpret regulations…

Read More

Using Insider Threat Awareness as a Risk Management Strategy

Insider Threat Awareness header image

Searching for Insider Threat Indicators Insider Threat Awareness Strategies Teamwork Enhances Insider Threat Management Keys to Workforce Engagement for Insider Threat Prevention Effective Insider Threat Awareness Management Does Ontic Offer an Insider Threat Monitoring Solution? Companies are increasing their focus on building insider threat awareness to create more resilient defenses against theft and unauthorized access…

Read More

Implementing Modern Investigations and Case Management Software

Robust, unified platforms can help security teams see around corners and anticipate threats This article was originally featured on Security Info Watch Many industries today are embracing software to help them modernize their operations and eliminate manual, outdated processes. The security industry has begun to embrace technology, but the solutions created for security teams are…

Read More

6 Measures Safety, Security and Protection Leaders Can Take To Be Proactive During Volatile Times

In our recent webinar, Leading Corporate Security During Volatile Times, Ontic security experts joined to discuss ways for security leaders to future-proof their programs, prioritize protection and leverage technology to help mitigate risks inflicted by the rapidly-evolving threat landscape. The panel consisted of Chuck Randolph, Executive Director of Strategic Intelligence, Dr. Marisa Randazzo, Executive Director…

Read More

Strategies for Human Resources and Security to Work as One to Enhance Workplace Safety

Human Resources specialist Melissa Muir joined the Women Who Protect podcast series to share strategies for HR and security to work together more effectively. What is threat assessment? Security is a team sport Nurturing the partnership between security and HR Boosting employee engagement Safety risks returning to office Strategies for leaders feeling burnt out Oftentimes,…

Read More

How to Build Situational Awareness Faster in Your Organization

Situational awareness header image

See how modern advancements emphasize the benefits of integrated technology in enhancing faster threat detection and response. Situational awareness is mandatory for the modern security professional. Understanding where threats originate and their vector relative to your principals and assets helps companies mitigate risk and protect their operations. In the past, corporate security teams relied heavily…

Read More

A Connected Approach to Integrated Research

Corporate security teams need to quickly uncover important information about potential threats for more complete investigations and actionable insights. Whether about people, businesses, assets, locations, vehicles, or relationships, having the right connected data sources to surface relevant information is critical to making informed decisions. But to make these informed decisions, security teams must go through…

Read More