Podcast
The Real-Life Spy Behind the James Bond 007 Series
James Bond is one of the most legendary characters in film witnessed over the past several decades. In 1953 when the character of James Bond came to fruition in Ian Fleming’s novels under the code name 007, many were unaware that the inspiration for the character came from Serbian double agent, Duško Popov. Author Larry…
Read MoreDHS Senior Medical Officer Shares Expertise on the Level of Medical Training Needed From Today’s Security Professionals
Training for failure versus success is game changing when it comes to responding to a worst-case scenario. However, today’s threat landscape has shown us that being prepared extends far beyond typical protection responsibilities. Basic medical training for security professionals is becoming more and more necessary to fulfill one’s duty of care. Dr. Alex Eastman is…
Read MoreBeneath the Surface of Fraud, Corruption, and Compliance Risk Investigations
Identifying the most imminent threats are often far beneath what surfaces in the headlines. They take the expertise and perspectives of a team to ensure answers are sought collectively to minimize bias. This all-encompassing approach is especially important when dealing with cases involving fraud, corruption, and compliance risk. James Tunkey is the Chief Operating Officer…
Read MoreSpotlighting the One Year Anniversary of Women Who Protect with Dr. Marisa Randazzo
Dr. Marisa Randazzo, PhD joins the podcast for a special round-up episode to celebrate the one-year mark on our Protective Intelligence Podcast series, Women Who Protect. This series spotlights women working in a wide range of positions within security, protection, and law enforcement. We’ve compiled highlights from some of our episodes featuring guests ranging from…
Read MoreMaking it Easier to Have Conversations About Mental Health and Victimization on Campus
Content Warning: This episode contains content pertaining to sexual assault, which some may find difficult to listen to. This episode is not recommended for young children. While we often hear that it is important to be able to have discussions about mental health, addiction, and victimization, it can be incredibly difficult to do so. Talking…
Read MoreWhy Red Teaming Maximizes Resources and Minimizes Biases in the Face of Complex Security Decisions
If you’ve ever presented a recommendation and wished you had hard facts and logic to back up your reasoning, you’ll want to hear why red teaming is critical to not only solving this dilemma but maximizing time and resources that are often spent going back to the drawing board to think of alternate solutions for…
Read MoreHow Netflix is the Best Commercial for Mark Greaney’s Gray Man Series
We’re fortunate to have bestselling author Mark Greaney back on our show to share a preview of BURNER — the latest Gray Man novel that goes out on shelves on February 21, 2023. His research for the #1 New York Times bestselling Gray Man novels has taken him to more than thirty-five countries and given…
Read MoreTrust Through Transparency — MITRE’s Enterprise Security Philosophy to Being a Trusted Advisor
Being vulnerable and identifying what you don’t know sets great leaders apart from the mediocre. However, setting your ego aside and being transparent in your communication is not a standard practice among many security practitioners. Josh Massey, Department Manager of The MITRE Corporation’s Enterprise Security Assurance department, has relied on this approach during his career,…
Read MoreThink Like an Intelligence Analyst – Deciding What Matters and How to Share It
When a superior in your career tells you “so what?” in response to the presentation of an idea, it can either break you or motivate you to prove your point further. For Sandy Perez, Lead Intelligence Analyst for Alcon, this response drove her to do the latter and inspired her career where she is responsible…
Read MoreMailroom Security — The Unfortunate Impact of Overlooking Screening Protocols
The corporate mailroom is often pushed down on the priority list for security concerns, with eyes on visitor management, events, and other high-traffic areas. However, the hard truth is that the logistics of mail screening, or failure to do so, impacts almost every aspect of the business — from business continuity to insider threats to…
Read MoreWhat it Takes to Modernize Your Threat Management Approach
The field of threat intelligence has evolved far from the days of interviews and observation around a predator or risk. The uptick in social media activity combined with the post-traumatic stress after COVID-19 has drastically changed the way security professionals approach a threat and prioritize information, and it’s critical to stay current on the discussion.…
Read MoreBritish Intelligence Expert Shares the Greatest Threat Facing Public Figures
The feeling of being safe is not one we take for granted; however, it can take on many different forms depending on a person’s risk profile and tolerance. A person can have all the safety measures and technology available, and still not feel completely at ease. The psychology behind this is why Philip Grindell began…
Read MoreForging Her Own Path: Creating a Threat Intelligence Company from Scratch
Identifying who could be posing a threat to an organization is far from a one-person job. It takes the right training and a team that represents multiple viewpoints and areas of expertise beyond security. Janet Lawless had a vision to create a company to provide that training and help organizations to build a threat intelligence…
Read MoreWhere to Start When Building a School Safety Plan
If it’s not front of mind, time and time again security measures get pushed aside until an unfortunate event surfaces. What surprises many is that the infrastructure is there for measured risk mitigation practices to occur. It comes down to the small group that all eyes are watching — the leadership team. Creating this unified…
Read MoreRunning Towards Fire — How to Mitigate Threats for Journalists in High-Risk Areas
Security professionals have increasingly demanding responsibilities in keeping people and assets safe as new threats arise and old ones loom in the periphery. When you’re charged with protecting nearly 1,000 individuals running towards action – oftentimes high-risk and in remote locations – it takes a certain type of individual to mitigate risk. Matt Bohatch is…
Read MoreThe Evolution of Addressing Targeted Violence Since the 1996 Centennial Olympic Park Bombing
Receiving a call to be notified that there has been violent activity in the middle of the night is every security professional’s worst nightmare. However, when that activity is a bomb in the middle of Centennial Olympic Park, it takes on much broader implications. Dave Benson speaks of his experience as a Special Agent for…
Read More