Navigating the Workplace Violence Threat Management Process 

Navigating the Workplace Violence Threat Management Process 

| | article
An overview of how to investigate workplace violence incidents, make an assessment, and intervene when necessary  The purpose of the threat management process is to evaluate threatening or alarming behavior, determine whether ...
How to Modernize Security Operations Centers

How to Modernize Security Operations Centers

| | article
GSOC modernization is a journey that starts with understanding your unique business needs This article was originally published in ASIS Security Management Magazine. In the past decade, global security operations centers (GSOCs) ...
Gaining Stakeholder and Employee Support for Your Insider Risk Program

Gaining Stakeholder and Employee Support for Your Insider Risk Program

| | article
How to build trust with your employees and stakeholders through training, empathy, and effective communication What’s in a name? We have all heard, been involved in, or led conversations regarding what to ...
Summit 2025 Business Justification Email

Summit 2025 Business Justification Email

| | article
Thanks for your interest in attending Ontic Summit 2025! To make sure you’re able to attend, we have put together this template that outlines the benefits — for you and your team ...
Who Owns Implementation of California’s New Workplace Violence Prevention Law?

Who Owns Implementation of California’s New Workplace Violence Prevention Law?

| | article
Managing compliance takes a collaborative effort from several different departments, but security teams are uniquely positioned to lead the collaboration This article was originally posted in ASIS Security Management Magazine. Employers in ...
How to Act Before, During, and After a Crisis

How to Act Before, During, and After a Crisis

| | article
A rise in physical threats requires updated response procedures. Learn what’s behind this increase and what you can do to address crises when they occur. When did you last review your crisis ...
4 Executive Travel Vulnerabilities You May be Overlooking

4 Executive Travel Vulnerabilities You May be Overlooking

| | article
Learn how to minimize the impact of vulnerabilities like social media use, private jet tracking, and more As an executive protection (EP) professional, you’re likely experiencing a rise in physical threats against ...
Enhancing the Intelligence Cycle: How to Leverage Feedback to Provide More Valuable Intelligence

Enhancing the Intelligence Cycle: How to Leverage Feedback to Provide More Valuable Intelligence

| | article
Learn why intelligence feedback is so important and uncover strategies for getting the insights you need The Role of Feedback in the Intelligence Cycle When Feedback Fails What This Means for Corporate ...
The Path to Modernizing Your Home-Grown Case Management System 

The Path to Modernizing Your Home-Grown Case Management System 

| | article
Learn how to leverage your current challenges to drive support for a purpose-built case management solution As a corporate security leader responsible for investigations, your primary objective is to keep your people ...
Keeping Your Employees Safe at the 2024 Olympic Games

Keeping Your Employees Safe at the 2024 Olympic Games

| | article
Practical tips for travel logistics, communication protocols, risk mitigation, and more By Chuck Randolph and Fred Burton As the world eagerly anticipates the 2024 Paris Olympics, the event’s grandeur remains a magnet ...

Application Security Check Up