A New Breed Of Security Leadership: How the Digital Age Is Transforming the Security Professional

A New Breed Of Security Leadership: How the Digital Age Is Transforming the Security Professional

| | article
This article was originally featured in Security Informed The importance of data is ever-growing. For every profession, we’re witnessing the increasing reliance on data and its ability to promote efficiency for corporate decision-makers. The security industry is no different. The growing reliance on data and technological tools has allowed for ... Read More
The New Information Landscape is Changing How Security Leaders Work

The New Information Landscape is Changing How Security Leaders Work

| | article
This article was originally featured in Security Magazine Imagine a scenario many security practitioners are familiar with: A bizarre post on an obscure social media account surfaces. It could be construed as a threat against a company executive. But it’s unclear. To further complicate the situation, a different executive at the organization ... Read More
Connected Intelligence: A New Approach to Managing Risk and Enabling Decision-Makers

Connected Intelligence: A New Approach to Managing Risk and Enabling Decision-Makers

| | article
Ensuring the safety of people and organizations is dynamic, asymmetric, and complex. A sense of permacrisis has driven a need for those tasked with managing risks to constantly perceive imperatives amongst the unyielding view of threat, risk, and problematic issues. Ontic championed the cause of Protective Intelligence and its concepts ... Read More
‘Mission First, People Always:’ A Mantra for Security Talent

‘Mission First, People Always:’ A Mantra for Security Talent

| | article
This article was originally featured in Security Management. The phrase “Mission first, people always” is a common mantra in the military, and it is often borrowed in leadership studies. It’s a vision of success that invests in the success of those around you, a sense of shared mission (the why), ... Read More

Minimizing IP Theft and Insider Threats During Times of Layoffs

This article was originally featured on Security Today Building out cross-functional collaboration between cyber and physical security teams will create a more unified approach, where a common language is established to better understand each department’s key priorities and processes. Doing so ensures there is collective monitoring of identified risk groups ... Read More

Red Teaming at Scale to Uncover Your Big Unknowns

This article was originally featured on Dark Reading During the global war on terror, a group of commissioned and noncommissioned officers in the United States military participated in a unique training event. Soldiers of various ranks, all with different specialties, assembled in a remote location where they were stripped of ... Read More

Proving the Value of Security: How to Avoid the ‘Break Glass Now’ Label

| | Blog Posts
This article was originally featured in Total Security Advisor Keeping employees healthy and safe and property secure is crucial, especially in light of the current geopolitical landscape, ongoing issues stemming from the most recent pandemic, and the tragic events in Highland Park, Uvalde, Buffalo, Tulsa, and many more cities. In ... Read More

Legal and compliance teams: Where do they fit in the physical security picture?

| | Blog Posts
Legal and compliance teams engage with nearly every aspect of the organization, from labor law to contracts, to cybersecurity. The role they play to reduce workplace violence and other security risks often go unnoticed and are seldom discussed. It’s worth having those discussions, because legal and compliance teams often set ... Read More

Cyber-Physical Convergence is Happening, But Not Fast Enough

| | Blog Posts
A common sentiment amongst risk professionals is that employees and institutions would be safer if their groups carried closer working relationships with other departments. Recent data suggests that this belief is widespread across organizations, not just those in physical security.  Executives in cybersecurity, IT, human resources, physical security, and legal ... Read More

Casualties of War: Global Conflict’s Threat to Business Is a Call to Arms for Cross-Functional Teams

This article was originally featured on Corporate Compliance Insights Since the Cold War, military conflicts have usually been regional disputes, often involving smaller nations. And when global “great powers” were engaged in conflicts, they were usually asymmetrical in nature and involved adversaries who weren’t peer nation-states. Perspective: Read the U.N.’s ... Read More

Secure Guardrails