Family Offices: What They Get Right About Security, and What Companies Can Learn from Them

This article was originally featured on ASIS Security Management Family offices are privately held companies that often handle wealth management and investments for heads of companies, executives, and high-profile individuals—many of whom are quite wealthy. But these organizations often have broader responsibilities. Over the years, they’ve become among the best when it comes to protective intelligence and…

Read More

Personal Observations on the Evolution of Protective Intelligence

“We memorized them and if they were in the crowd they were brought to everyone’s attention.”  – Former U.S. Secret Service agent Jerry Blaine, The LANCER (JFK) Detail (email exchange on January 29, 2021) Author’s Note: Special thanks to Scott Stewart and Mike Parks, protective intelligence professionals who were with me in the trenches from…

Read More

What Does It Mean to be a Next-Generation Executive Protection Program?

The duty of protecting executives has progressed to a whole new level in recent years. With an increase in remote work, the predictability of routines, and refamiliarizing ourselves with our surroundings and communication both in person and online, it has made the job of executive protection professionals increasingly complex.  “Today, executive protection has advanced far…

Read More

Lessons Learned from the Nonprofit Approach to Actionable Threat Intelligence

Nonprofit organizations worldwide know that actionable threat intelligence is critical—they are among the top targets for threat actors. Threats to nonprofit organizations aren’t just against the at-risk communities they serve but are also against their facilities, executives, and employees.  Three of the country’s largest nonprofit organizations came together at Summit to dive deeper into their…

Read More

Physical and Digital Executive Protection: Synchronizing Domains

Exploring the relationship between executive cyber protection and physical security teams and some strategies to achieve these goals. Organizations of all sizes continue to face risks from multiple vectors in the digital and physical domains. These domains overlap, and for at least half a decade, organizations have quietly discussed ways to converge these functions. The…

Read More

Structuring the Unstructured: Using a Converged Security Operations Console and Integrated Research to Better Evaluate Threats

In my last post I discussed why it’s important for security teams to have the right data structure in place to gain more visibility of potential threat signals. Whether you’re missing information because of not knowing where to look, not having the right tools in place, or because you’re inundated with noise, it’s easy for…

Read More

Study Finds Increase in Cybersecurity and Physical Security Attacks Against Executives

Cybersecurity and physical security to prevent executive attacks

In the art of protective and tactical intelligence, trends and analytics matter. Information and intelligence feed “living” threat assessments and should drive your cybersecurity and physical security strategy, coverages, and resources. Protection resources cannot be logically allocated to protect executives and companies without first understanding the holistic threat landscape. In the executive protection security space,…

Read More

Of Kidnappings, Lions, and Crocodiles

The October 16 kidnapping of 17 expatriate missionaries in Haiti has generated a great deal of press attention. Among the victims were 16 American citizens and one Canadian. The group is comprised of five men, seven women, and five children—including a toddler. The gang that conducted the abduction, 400 Mawozo, is no stranger to kidnapping.…

Read More