Posts Tagged ‘Executive Protection’
How to Run Thorough Investigations on Threats to Executives
Download this checklist to ensure your current investigation process is up to par across three categories:
Read MoreDangerous Admirers: How to Protect Public Figures From Harassers As Legal Protections Are in Jeopardy
In 2010, country-music singer Coles Whalen began receiving messages from a fan on her Facebook account. While Ms. Whalen ignored the relatively benign messages at first, the fan kept sending her messages—thousands over the course of several years. The fan praised her talents but also alluded to following her and knowing the whereabouts of her…
Read More3 Critical Areas Technology is Influencing The Latest Executive Protection Strategies
Physical and cyberattacks are on the rise. According to the FBI, the most recent data shows an 82% rise in violent crimes from 2017 to 2021. Another study from the FBI reports a 52% increase in active shooter incidents in the same four years, and cybercrimes are also increasing. In the FBI’s 2022 Internet Crime…
Read MoreFrom Coronations to Corporations: The Hidden Nuts and Bolts of Major Event Security Planning
This article was originally featured on IFSEC Insider When Queen Elizabeth was crowned in June 1953, the procession of dignitaries that followed numbered 16,000 people. It took the procession approximately 45 minutes to pass any one point along the route. When she died nearly 70 years later, London’s Metropolitan Police Service said her funeral was…
Read MoreFamily Offices: What They Get Right About Security, and What Companies Can Learn from Them
This article was originally featured on ASIS Security Management Family offices are privately held companies that often handle wealth management and investments for heads of companies, executives, and high-profile individuals—many of whom are quite wealthy. But these organizations often have broader responsibilities. Over the years, they’ve become among the best when it comes to protective intelligence and…
Read MorePerspectives on the Shinzo Abe Assassination
Download this whitepaper to help your organization understand:
Read MorePersonal Observations on the Evolution of Protective Intelligence
“We memorized them and if they were in the crowd they were brought to everyone’s attention.” – Former U.S. Secret Service agent Jerry Blaine, The LANCER (JFK) Detail (email exchange on January 29, 2021) Author’s Note: Special thanks to Scott Stewart and Mike Parks, protective intelligence professionals who were with me in the trenches from…
Read MoreWhat Does It Mean to be a Next-Generation Executive Protection Program?
The duty of protecting executives has progressed to a whole new level in recent years. With an increase in remote work, the predictability of routines, and refamiliarizing ourselves with our surroundings and communication both in person and online, it has made the job of executive protection professionals increasingly complex. “Today, executive protection has advanced far…
Read MoreLessons Learned from the Nonprofit Approach to Actionable Threat Intelligence
Nonprofit organizations worldwide know that actionable threat intelligence is critical—they are among the top targets for threat actors. Threats to nonprofit organizations aren’t just against the at-risk communities they serve but are also against their facilities, executives, and employees. Three of the country’s largest nonprofit organizations came together at Summit to dive deeper into their…
Read MorePhysical and Digital Executive Protection: Synchronizing Domains
Exploring the relationship between executive cyber protection and physical security teams and some strategies to achieve these goals. Organizations of all sizes continue to face risks from multiple vectors in the digital and physical domains. These domains overlap, and for at least half a decade, organizations have quietly discussed ways to converge these functions. The…
Read MoreApplying Security Trainings in Real Life: How Preparing for Hostage Situations Saves Lives
One of the first lessons I learned as a young member of the rescue squad is that training saves lives. Stopping the bleeding, CPR, protection from smoke inhalation and other training we practiced saved lives every day. Later, as a police officer and special agent, that mindset was consistently reinforced in different situations, but especially…
Read MoreStructuring the Unstructured: Using a Converged Security Operations Console and Integrated Research to Better Evaluate Threats
In my last post I discussed why it’s important for security teams to have the right data structure in place to gain more visibility of potential threat signals. Whether you’re missing information because of not knowing where to look, not having the right tools in place, or because you’re inundated with noise, it’s easy for…
Read MoreStudy Finds Increase in Cybersecurity and Physical Security Attacks Against Executives
In the art of protective and tactical intelligence, trends and analytics matter. Information and intelligence feed “living” threat assessments and should drive your cybersecurity and physical security strategy, coverages, and resources. Protection resources cannot be logically allocated to protect executives and companies without first understanding the holistic threat landscape. In the executive protection security space,…
Read MoreExecutive Targeting: Analysis into the Protection of Corporate Business Leaders
In this research study, you will learn about:
Read MoreOf Kidnappings, Lions, and Crocodiles
The October 16 kidnapping of 17 expatriate missionaries in Haiti has generated a great deal of press attention. Among the victims were 16 American citizens and one Canadian. The group is comprised of five men, seven women, and five children—including a toddler. The gang that conducted the abduction, 400 Mawozo, is no stranger to kidnapping.…
Read MoreStructuring the Unstructured to Better Evaluate Known and Unknown Threats
Known threats can be easy to identify. They’re the pieces of information already on your radar: Employee-related incident reports, information obtained from open or closed investigations, events being planned, and known persons of interest (POIs). Unknown threats can be much harder to uncover, especially if you don’t know where to look or if you don’t…
Read More