5 Things California Employers Should Consider to Comply with Senate Bill 553
If you are an employer in California, you’ve probably heard about Senate Bill 553, the legislation requiring most California employers to take steps to prevent and respond to workplace violence and threats. After opposition from various business groups and labor unions prompted the removal of some controversial provisions, the bill passed the California legislature and…
Read More‘Mission First, People Always:’ A Mantra for Security Talent
This article was originally featured in Security Management. The phrase “Mission first, people always” is a common mantra in the military, and it is often borrowed in leadership studies. It’s a vision of success that invests in the success of those around you, a sense of shared mission (the why), no matter your specialty or…
Read MoreHow Empathy Can Help Prevent Violence in the Workplace and in Schools
This article was originally featured in Security Magazine. Over the past year, security personnel across a wide swath of sectors have reported that threats are increasing in volume, severity and/or in urgency. And many organizations are trying to figure out how best to handle this spike in threats. For some supervisors and C-suite leadership, their inclination is…
Read MoreThe Enemy of My Enemy is My Friend: Strengthening Insider Threat Resilience with Cyber-Physical Integration
This article was also written in partnership with Josh Massey, Director of Enterprise Risk of The MITRE Corporation’s Enterprise Security Assurance department. As such, Mr. Massey is responsible for establishing, executing, supervising, and directing the implementation and oversight of MITRE’s insider threat program and strategic protection initiatives across MITRE’s six federally funded research and development…
Read MoreMinimizing IP Theft and Insider Threats During Times of Layoffs
This article was originally featured on Security Today Building out cross-functional collaboration between cyber and physical security teams will create a more unified approach, where a common language is established to better understand each department’s key priorities and processes. Doing so ensures there is collective monitoring of identified risk groups or individuals. It also ensures…
Read MoreFrom Coronations to Corporations: The Hidden Nuts and Bolts of Major Event Security Planning
This article was originally featured on IFSEC Insider When Queen Elizabeth was crowned in June 1953, the procession of dignitaries that followed numbered 16,000 people. It took the procession approximately 45 minutes to pass any one point along the route. When she died nearly 70 years later, London’s Metropolitan Police Service said her funeral was…
Read MoreRed Teaming at Scale to Uncover Your Big Unknowns
This article was originally featured on Dark Reading During the global war on terror, a group of commissioned and noncommissioned officers in the United States military participated in a unique training event. Soldiers of various ranks, all with different specialties, assembled in a remote location where they were stripped of rank and other identifying markers.…
Read MoreA Constant State of Crisis: How Corporate Security Teams Are Adapting to the New Normal
Corporate security teams face a new normal, and it’s called permacrisis – a state where instability and insecurity are constant. While many security teams already operate in this mindset, the difference is that the security department is one of many teams in constant vigilance. As a result, departments across organizations are becoming aware of permacrisis…
Read MoreA Physical Security Imperative: Critical Infrastructure Security
Attacks on critical infrastructure have doubled in the last year, with events such as the attacks on Ukrainian power companies, Colonial Pipeline and JBS Food, that have brought to light the necessity of critical infrastructure security systems and networks to function properly for society to operate. The impact of recent cyber attacks on power grids…
Read MoreDeveloping a “Corporate Foreign Policy”: The Urgent Need for Boardroom Geopolitics Strategies
An era of pervasive geopolitical tumult means that companies, and the executives who run them, must begin formulating and following coherent strategies for global engagement. In the first piece of a series on the intersectionality of geopolitics and global business, Colin Reed explores this growing need, and poses early recommendations for companies seeking to develop…
Read MoreUsing The Indications and Warning (I&W) Analysis to Manage Organizational Risk
The Center for Protective Intelligence partnered with Scott McHugh who works for the Institute for Homeland Security at Sam Houston State University to develop this piece. One of the key reasons we created the Ontic Center for Protective Intelligence (CPI) was to share industry tools, best practices and lessons learned to help those who protect…
Read MoreStreamlining Security Operations Amidst Geopolitical Turmoil
Download this whitepaper to see:
Read MoreProving the Value of Security: How to Avoid the ‘Break Glass Now’ Label
This article was originally featured on Total Security Advisor Keeping employees healthy and safe and property secure is crucial, especially in light of the current geopolitical landscape, ongoing issues stemming from the most recent pandemic, and the tragic events in Highland Park, Uvalde, Buffalo, Tulsa, and many more cities. In a seemingly non-stop threat environment, corporate…
Read MoreHow Security Teams Have Expanded Their Duties
This article was originally featured on IFSEC Global Regarding gigabytes, physical security units are partnering with cyber security teams to manage the protection of highly valued assets, such as intellectual property. Many cyber security standards, including Payment Card Industry (PCI), have physical security components. But the convergence of physical and cyber security goes well beyond…
Read MoreLegal and compliance teams: Where do they fit in the physical security picture?
Legal and compliance teams engage with nearly every aspect of the organization, from labor law to contracts, to cybersecurity. The role they play to reduce workplace violence and other security risks often go unnoticed and are seldom discussed. It’s worth having those discussions, because legal and compliance teams often set workplace violence policies, interpret regulations…
Read More2022 Mid-Year Outlook State of Protective Intelligence Report
Ontic surveyed 400 executives across four different departments at U.S. enterprises who have responsibilities for protecting businesses: physical security, cybersecurity and IT, human resources, and legal and compliance. Download the report to gain new insights into:
Read More