Sign in
Technology
Business
Ontic
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton, Chuck Randolph, and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organization effectively. Whether you're looking to enhance your intelligence-gathering capabilities, build a robust security team, or stay updated on the latest industry trends, this podcast empowers you to make informed decisions and lead with confidence.
Tune in and join us on our mission to keep people safe and make organizations stronger. Subscribe now and never miss an episode.
Honoring Those Who Served — Spotlighting Veterans on the Ontic Protective Intelligence Podcast
As we take time to celebrate the Veterans who have served and currently serve our country, it’s important to remember the unwavering thread that unites all branches of service— the commitment to protect. This same commitment has helped fuel successful security careers and build skillsets in ways that extend beyond protection — from putting others first to being comfortable with discomfort to moving forward and finding a new approach. Chuck Randolph, Chief Security Officer at Ontic and former Infantry and Information Operations Officer in the US Army, shares a selection of clips that feature guests on our series who have served in the military and use those experiences to influence successful security careers in corporations, family offices, and other environments in the private sector.To hear more from the guests featured in this special round-up episode, check out their full recordings here:The Art of Turning Information into Intelligence (George Taylor, President - Exlog Global)Running Towards Fire — How to Mitigate Threats for Journalists in High-Risk Areas (Matt Bohatch, Director of Global Corporate Security and Site Operations for The Washington Post)What it Takes to Detect Insider Threats from Ford Motor Company’s Senior Analyst (Dave Holder, Senior Analyst, Insider Threat Program at Ford Motor Company)How Security Teams Enable Decision-Making in Times of Crisis (Major General Richard Lake, Former CSO of Booz Allen Hamilton and the Melinda and Richard Gates Foundation)Former Marine Infantry Officer Shares Why Strategic Assessments Precede Tactical Mitigation (Jack Stradley, Founder and CEO of Exlog Global)Thank you for listening to Ontic’s Protective Intelligence Podcast. Please subscribe to hear our future episodes. If you have any suggestions for guests, email us at [email protected].
15:5510/11/2023
What it Takes to Detect Insider Threats from Ford Motor Company’s Senior Analyst
Leading an insider threat program at a Fortune 100 company takes a certain skill set that can’t be molded into a single program or training certification. It takes a combination of capabilities and motivations to detect risk in some of the most challenging, unassuming places.Dave Holder is a senior analyst with Ford Motor Company where he helps lead their insider risk program. He is a decorated former counterintelligence officer with expertise in national security investigations and operations, as well as corporate workforce investigations. His national-level awards include the National Counterintelligence Executive’s Investigative Team Award in 2014 and the Department of Defense Counterintelligence Team Award in 2009.Key topics of Holder’s discussion with host Fred Burton include:How his experience as a Security Officer in the National Security Investigations Program of the US Army shaped him into the leader he is today. The most important skills needed to stand up an insider threat unit and the critical importance of understanding the importance of the human mind amid technological advancements (employees must feel empowered to report behaviors!)How technology has impacted the insider threat space and resources Holder recommends for those interested in exploring a career in this area. Here are the ones mentioned within the episode:Borderless Behavior Analytics - Second Edition: Who's Inside? What're They Doing?Inside Jobs: Why Insider Risk Is the Biggest Cyber Threat You Can't IgnoreOffice of the Director of National Intelligence’s National Insider Threat TaskforceKey takeaways:01:23: Dave Holder: There are a lot of things in the military that carry directly over. Most of us coming out of these types of environments struggle with that balance a little bit. And with leadership, generally speaking, I learned you can't leave from behind. You have to be good at what you do as a practitioner. Have to be good with your people you've got to empower everyone and let them lead and innovate.14:00: Dave Holder: When I think about the horizon I guess I could think about it in terms of where I think the enemy threat picture is going to use military terminology — defensively, I have to react to what the adversary is doing, but offensively, can I create a framework that puts all of the odds in my favor. On the program-building side of things, I think we need to put more focus into that and hopefully, some of the work MITRE is doing to build out an insider threat framework similar to MITRE attack for cyber defense will produce some of the applied research findings that will help us to get ahead of the curve. In the meantime, we have to continue to professionalize this field that we're calling Insider threat or insider risk along the main core competencies. I think without those we're not fluent enough with compliance professionals, privacy professionals, offices of general counsel, etc. We have to be able to converse with them in terms they ah that they understand and that they care about.
23:1001/11/2023
What Today's Permacrisis Means for Corporate Security Teams
With multiple crises happening around the globe, it’s impossible for organizations to ignore the threat of geopolitics to their business. Security teams are forced to think beyond what’s happening now and consider what’s around the corner. Many understand the duty of care to keep employees safe; however not all realize that this extends to the geopolitical landscape. It is the duty of security leaders to help their organization make sense of what’s happening and be a calm voice in the midst of permacrisis.Ross Hill, Founder of Insight Forward, is that calm voice for many as he helps businesses understand risk. He applies his background leading intelligence analysis for prominent risk management organizations such as AT-RISK International and Pinkerton, and has acquired an in-depth knowledge of core processes, programme design and management, fulfilling senior management positions in global security and risk consultancies, and gaining exposure to renowned multinationals and driving their intelligence needs. He began his career as a Forensic DNA Analyst and as an Intelligence Analyst for the Metropolitan Police.Check out Insight Forward’s latest report: Top 10 Geopolitical Risks for Businesses in 2024 and the latest geopolitical news by subscribing to Pestle & Mortar.Key topics of Hill’s discussion with hosts Chuck Randolph and Fred Burton include:Why global and national companies alike cannot escape the impact of geopolitics on their business, and why it’s critical to look beyond the threats you face today.Why security leaders have a responsibility to help the people they protect make sense of the crises abroad and how misinformation (most notably with the Hamas War) has the ability to cause unwarranted concern and mistrust.The top three things corporate security teams can do right now in light of multiple crises happening around the globe.
35:2725/10/2023
What Happens When You Take On the Cases That Everyone Avoids
With a knack for problem solving and an unwavering willingness to tackle some of the most challenging and emotionally demanding assignments, success isn't always guaranteed. However, for Katie Hall, these qualities have defined her career as a trusted investigator and executive protection professional.Hall is a retired law enforcement officer with 21 years of experience first working patrol, then as a detective, followed by digital forensics. She specialized in investigations into child exploitation and served on the Internet Crimes Against Children Task Force. Hall also has private sector experience in executive protection and overseeing background investigations, intelligence investigations, and risk and crisis management.Key topics of Hall’s discussion with host Dr. Marisa Randazzo include:How her aspirations of being a game warden evolved into her career today overseeing security for an executive office conducting background investigations, intelligence, investigations, and risk and crisis management.Why she felt fulfilled by cases that were most difficult to assess and how she built her resume by saying ‘yes’ to the cases no one else wanted to take on.Why law enforcement experience translates effectively into private sector investigative work and skills you need to adapt.
41:4818/10/2023
Looking for What You Don’t Know — An Inside Look into Security Details for Presidential Candidates
With a presidential election around the corner, many wonder what level of Secret Service protection is provided to hopeful candidates, when it is an option to receive, and what resources are used. After serving as a senior supervisor on the Secret Service Presidential Protective Division during her 26 year career with the U.S. Secret Service, Cynthia Marble shares what she knows on the topic.Cynthia Marble is a nationally recognized leader in the fields of threat assessment and threat management, protective intelligence, investigations, national security, executive protection, and global security operations. She has extensive experience conducting as well as supervising threat assessment and protective intelligence investigations on high-profile public officials and public figures. Marble currently serves as Senior Director of Threat Management Operations for Ontic. Key topics of Marble’s discussion with host Fred Burton include:Timing for assigning Secret Service protection to presidential candidates, and how long former presidents receive protectionChallenging aspects of her work and the unimaginable parts of securing even the smallest event to ensure every day is zero failThe most critical thing to look for when conducting a threat assessmentKey takeaways:03:14: Cindy Marble: In general the committees look at the the viability of the candidates. It is threat-driven as far as the extent of the protection and exactly what type of resources are involved — those candidates that are deemed viable within that year are going to get protection.07:35: Fred: Cindy, what worried you the most when it comes to just working a crowd or working an event?07:57: Cindy Marble: What always worries us is what we don't know. It's honestly looking for that one thing that is out of place - out of the ordinary. Just being vigilant - things don't worry me, but they do concern me and to me, there's a difference. The way to alleviate the concern is to be educated and open to new information. It helps inform how we work an event. So I was definitely worried about the things that I didn't know and I think being comfortable with understanding that you don't sometimes know what you don't know and just being open to all possibilities. 19:21: Cindy Marble: We know that oftentimes there's not a direct threat to a person or to an entity to a place but it's the behavior. It's statements that are concerning and opening up our minds and saying ‘okay, I'm not looking for that direct threat - what I'm looking at is that concerning behavior’ that that is easy to understand if I know that that's what I'm looking for if that makes sense. You may walk out of an interview and say I'm not 100 % sure that this person is a threat, but what I can do is I can manage the situation and I can say okay I do know that there's something that needs to be done.
27:5212/10/2023
The Meticulous Eye Demanded by High Profile Investigations
As a Special Agent, McKenzie was assigned to several high-profile investigations including the September 11th investigation, and the Amerithrax case. He also successfully investigated numerous Bank, Wire and Health Care fraud as well as Money Laundering cases which exposed critical flaws in banking systems.Key topics of McKenzie’s discussion with host Chuck Randolph include:Why the desire to solve problems is at the heart of every skilled investigatorSkills he learned as a Special Agent in the FBI that carried over into the private sectorThe role of relationships and building networks in his work and why it’s important to surround yourself with people who challenge youKey takeaways:05:50: Kurt McKenzie: I looked at investigations with the same obsessive compulsive behavior that I had when I was a scientist — I'm not being funny about that. It's when you work DNA analysis — the thing you understand is that you're dealing with crime at a molecular level.06:07: Kurt McKenzie: You cannot make mistakes because when the Dna results come back, somebody could go to jail or potentially be executed because these are all very serious crimes. So you learn a meticulous approach to your job that you will take with you forever.08:41: Kurt McKenzie: You don't want to surround yourself with yes men or like-minded people — you want to surround yourself with people who will tell you ‘hey you're screwing up’ or ‘hey, let's do this together hey you're on the right track’ or ‘hey, have you thought about this.’09:00: Chuck Randolph: Yeah I love that too because we can get caught up in our own echo chamber and before we know it.10:11: Chuck Randolph: Kurt you were in the bureau for over 24 years and you did everything — financial crimes, narcotics, trafficking, terrorism, organized crime. This meticulous obsession on critical thinking as a cornerstone to your to your job — did you have to pause and consider how am I going to approach this problem?10:59: Kurt McKenzie: The first thing is to learn what you don't know, and the second thing is to apply basic investigative techniques that the FBI teaches you. You don't want to break the law trying to stop somebody from breaking the law, so you have to educate yourself. Not only about the law but about the group that you're looking at and the people you're looking at. You need to learn everything about them, learn who their associates are, and learn how they move money.17:59: Kurt McKenzie: The two key takeaways that I developed over the years of building liaisons and building teams is that you have to take yourself down a peg at times. Because you may need somebody else more than they need you, so you need to be willing to compromise to an extent to get their cooperation.The second thing you have to be able to make friends, and I don't mean to be fake. I had at least one friend in almost every police department and every federal agency in South Florida that I could call on to assist and I prided myself on that.
36:5005/10/2023
How Security Teams Enable Decision-Making in Times of Crisis
Key topics of Lake’s discussion with host Chuck Randolph include:Lessons in risk management Lake has learned that translate between his government and private sector experience.The importance of knowing your business and where security can add value to better support strategy and decision-making.Decision-making in times of crisis and the importance of knowing who has the authority to make certain decisions before an event occurs.Key takeaways:06:57: Chuck Randolph: How did you translate or how would you recommend people translating the ability to say ‘hey, here's some tenets that we have from say being in the military into the private with corporate world.’07:45: Dick Lake: I would push back just a little on you Chuck when you said you kind of have it handed to you in the military. That's not always the case. What I had to do in the military is similar to what I had to do in the corporate world which is sell my product. Convince people that I had a product that was worth using and why it was in their interest and to their benefit to use that product.12:45: Dick Lake: Part of it is what's my value proposition to the organization and one of the key ways you establish your value is you have an in-depth understanding of the business of the business and look for it look to identify ways that you can contribute.21:50: Dick Lake: It’s critical to understand what the organization's crisis management, crisis response, and business continuity policies and procedures are. Most organizations will have somebody that has been identified that will have that role. The second thing is understanding who has the decision authority for certain things and who can make a decision to close an office.That's something you need to decide before there's a crisis because a crisis is business that is not normal. So as as a chief security officer, I may not have that authority to close the office but I might be able to make a recommendation to the chief operating officer. People need to understand that — not just the chief operating officer and the chief security officer, but the chief financial officer, the CEO — everyone needs to underst
38:5827/09/2023
You See Me, You Can Be Me — UMMC’s Chief of Polices Shares the Value of Mentorship on Her Career and Future Leaders
As a fourth generation Chicago Police officer (and first female), Chief Mary Eileen Paradis had the instinct to protect ingrained in her life early on. Despite the complex task of protecting 10,000 employees in a high-crime urban area like Jackson, Mississippi, her unwavering dedication and energy toward her role are just some of the qualities that have propelled her to excel in her career.Key topics of Chief Paradis’ discussion with host Dr. Marisa Randazzo include:The challenges she faces amidst the growing reports of workplace violence in the healthcare sector generally and how she takes care of her team.Addressing the complexities of both the university and healthcare side of her role and the importance of relationships with local police and other areas on campus.Advice for women/girls pursuing a career in protection and her involvement in NAWLEE (National Association of Women Law Enforcement Executives).Chief Paradis possesses a combination of 30 plus years of law enforcement, higher education public safety and emergency management experience. She currently serves as the Chief of Police and the Executive Director of Public Safety for the University of Mississippi Police Department and the Office of Public Safety. In addition to higher education, Chief Paradis has worked in museums, hospitality, and retail, and was a sworn member of the Chicago Police Department’s Intelligence Section for over 11 years. Follow her on LinkedIn.
39:1220/09/2023
Till Death Do Us Part — Security at High-Profile Funerals
William Villanova knows this all too well, as he has been managing events of this nature for over three decades. He is the President of Frank E. Campbell – The Funeral Chapel in New York City, which has a rich history and is arguably the most well-known funeral home in Manhattan, if not the Nation. He is well known for implementing and promoting the highest standards in funeral service, of which security and privacy are paramount to a successful event. Key topics of Villanova’s discussion with host Fred Burton include:The preparation and contingency planning that goes into a celebrity funeral in the days/weeks leading up to the event.The variety of teams involved to orchastrate a high profile funeral – from NYPD to multiple private security teams to Secret Service.The extent of contingency planning, represented by the collaboration between medical teams and local hospitals on standby.
23:4213/09/2023
Empowering Security Professionals to Impact the Bottom Line with HiveWatch CEO Ryan Schonfeld
Ryan Schonfeld’s pushback to age-old security processes and refusing to settle for the way it’s always been done has helped him enable security teams to position their department as a business enabler, while protecting people and assets.Key topics of Schonfeld’s discussion with host Chuck Randolph include:Why security teams need to understand the needs of the business and how their work can impact the success of the company.The cultural challenge of security viewing technology as a risk, instead of a force multiplier that enhances the irreplaceable value of human intel.Trends he's observing in the physical security industry and what’s on the horizon.Key takeaways:Ryan Schonfeld: It’s pretty incredible the amount of data that's out there. I think people, by and large, are more aware of the data today than they certainly were back in the early days of social media and smart devices, and as connected homes were becoming more relevant, and just more and more electronics becoming a part of everyday life. But one of the pieces in slow industries, like physical security, is lack of data isn't the issue, and it's really never been the issue. It's how data is effectively collected and operationalized. That's always what slowed things down.Chuck Randolph: It strikes me, you're talking as much about change management and cultural change as you are operational change. Or, as you said, "Operationalizing the way that we manage the data." I think about it again, we have all these massive bureaucracies, whether it's the military, law enforcement, big corporation, or security provider, you're dealing with a lineage of culture change. You're going to walk in and say, "Hey, we're going to help you manage. We need to look and manage data in different ways." What obstacles have you come up with in your career to change management?Ryan Schonfeld: I think fear of the unknown's probably the biggest one. As a former cop myself, there's a lot of people in our space that are maybe great security leaders, but don't have deep technology backgrounds. Sometimes, rather than surrounding themselves with domain experts, and people who can help understand the technology, and how that technology can be leveraged to improve the program, that technology starts getting seen as a risk to their job, to their program, to whatever it is that they've been building over time, when in fact it really should be a force multiplier.I'm not a person that thinks that AI or technology is going to get rid of all the people in security, that's not possible. I think technology has a really important place in our space, but security is always going to require a human to understand context, and understand nuance, and ultimately make a decision that could impact whether or not somebody's life is harmed or protected, or what happens to a brand. That's not something that organizations are going to entrust to AI or a model. But that person who ultimately needs to make the decision needs to be equipped with the best information as quickly as possible, and that's where technology becomes that force multiplier. By embracing that, you have the ability to look great. It's not a risk to your program or to your job.Chuck Randolph: Ryan, what you're really talking about is making the security function accessible to everybody, right?Ryan Schonfeld: Yeah. I think as security people, and ex-cops, and ex-feds, and ex-military, we tend to operate in silos, we tend to keep things close to us in terms of what we're doing, and what our programs are, and what's entailed, and we do a very bad job of marketing security to the organization and letting people know what's actually going on.Because the reality is, as you start marketing your initiatives, security's going to have different visibility within the organization, people are going to find more value, other departments are going to find more value. You might find a bigger budget in terms of cross department budgeting, if you can provide actual tangible value to other departments. As I alluded to earlier too, security leaders are really going to be seen more as thought leaders and business leaders with a seat at the table.
37:4606/09/2023
Mitigating the Alarming Extent of Publicly Accessible Personal Data through Global Integrity's Qphone
Bill Marlow is an internationally recognized authority on Information Security and Risk. As an active participant in critical infrastructure protection on a worldwide basis, he has worked closely with global governments and law enforcement as well as financial institutions, energy corporations, pharmaceutical companies, and insurance companies on issues involving cyber terrorism, security plans, and international cooperation. Additionally, Marlow has served his country as a member of the Intelligence Community.Key topics of Marlow’s discussion with host Fred Burton include:The critical security need behind protecting publicly accessible location data for executives and their corporations, as well as individuals who are deployed abroad.The technology and strategy that went into creating the Qphone and the importance of the right customer base for this product.What’s next in the world of privacy and protection.Key takeaways:01:19: Bill Marlow: My team and I have been looking at things to help the good guys. The bad guys have the highest end capabilities that you can imagine - spectrum radios, point to point encryption capabilities - the good guys on the other hand are not exactly well funded. The Qphone is an ultra secure communications app that you can put on virtually any mobile device to allow fully secured, fully protected communications. The critical part is that we collect no data. We don't know where you are. We don't care where you are. We don't know what your phone is. It is truly a clean implementation. The encryption we use is a Quantum resistant encryption using the latest techniques to prevent Quantum computers from actually accessing it.02:46 Fred: Wow, that's simply amazing. Now I think most of us who have lived in the intelligence space or the protection business are used to apps such as Signal or Whatsapp and so forth. How is Q phone different?03:04 Bill Marlow: So nothing in life is free as the old adage goes. As you’re using a free app they have to pay for themselves somehow. So what they do is they collect information or metadata on every individual and then correlate that information and sell it lots of places. More importantly, there are a number of agencies around the world from different governments who buy that information through third party companies. They collect things about where you are, what kind of device you have, who you are connected to and how many times you talk to them, so on. The Qphone, on the other hand, doesn't collect anything. Now, it's not free but we don't collect anything so you're protected from that kind of analysis from going on. To most of us who are in the intelligence business or even the law enforcement business, that's a critical item - not having people be able to tell where you are who you're talking to or what you've done.13:51 Fred: And I assume ah like most businesses do there's due diligence on customers to make sure that this technology is not falling into enemy's hands so to speak.14:02 Bill Marlow: Absolutely. In fact, that's one of the critical items for us is that you have to be a recognizable organization. You have to be a corporation. You have to be a law enforcement group.17:46 Fred: When you think through this having done a lot of threat assessments and vulnerability assessments on ultra high net worth individuals and so forth, you might have a CEO that's very secure but family members and children aren't.18:01 Bill Marlow: Exactly and they're the vulnerability.18:04.75 Fred: So in this space with a Qphone if you had this deployed amongst your core family and so forth. You could rest assured that nobody's tracking you monitoring you and triangulating in on your location.19:23.56 Bill Marlow: I think that more people need to be made aware of all the things that are happening to them in a privacy mode. How much information is being gathered about them people don't realize the extent of the information that is being gathered every time they go out to a news site or they go shopping online or and they don't have the right kinds of protections in place.19:58 Bill Marlow: Qphone is one piece of a security program. We can protect their communications. We can make sure that they can send documents and messages and they can have conference calls and video calls securely. It works on your your mobile devices. It works on your desktop. But that’s a piece of a much larger program. There’s a need for people to start understanding about the amount of information that's being taken from them.
24:3630/08/2023
Clarity Factory Founder Uncovers the Undeniable Correlation Between Diversity and Innovation in the Security Industry
Briggs is a leading expert on security and has advised governments and multinational corporations on security, resilience, terrorism, and responses to extremism. She conducts research, thought leadership, and consulting for corporate clients on security and cybersecurity. She is also an Associate Fellow at Chatham House. She was awarded an OBE by Her Majesty the Queen in 2014 for services to hostage families and kidnap victims overseas.Briggs and host Dr. Marisa Randazzo discuss:Why great ideas can change the world and how the Clarity Factory helps identify new insights and drive innovation in the corporate security and cybersecurity industry.Her process of conveying research to leaders around an organization and the important exercise of always coming back to the core argument.The undeniable connection between diversity and innovation in the security industry and what gives her hope that change is possible in the near future.Key Takeaways:02:50: Rachel Briggs: Any area or profession needs to have good ideas to be able to continually change and improve and face the increasing challenges that we face in the world. But great ideas change the world. (Of course if they are grounded in reality.)06:31: Rachel Briggs: I think the simpler you can keep your ideas, without dumbing them down of course, the further they can travel and the better able people are able to implement it. That's why it's about clarity for me, it's about taking the messy old world that we all live in today and you know.06:58: Marisa Randazzo: One of the things that has really impressed me about the work that you have done has been not only the clarity of the ideas but of how you communicate those ideas and especially for a corporate security audience or a c-suite audience. One of the things that has been so powerful in the work that you have done has been the succinctness and simplicity with which you have conveyed these ideas. It's not just the idea itself. I'd love to just hear about the process of how you go from kind of that raw data to really. Deriving the insights that that you do and then how you communicate it.08:07: Rachel Briggs: I'm a really big believer in trusting the process. You start by opening the funnel and you know what your initial question is and you keep that really simple and you then open it up and gather as much data and information as you possibly can. At a certain point in time you have to stop and go back down the funnel in the other direction and really get sharp on what the argument is — just try and write what it is. I force myself to get back to one piece of paper and find a way of really describing what it is I think this is telling me in a very succinct way before I start writing.I think having that discipline really helps you to write and to communicate in a way that is clear. You're always coming back to your core argument and it really helps you to figure out — is this bit of data relevant or not because inevitably you end up with too much and you have to be ruthless. 15:55: Rachel Briggs: You know in anything I write, whether it's a 500 word blog post or a 20,000 word report it has to be focused on what can the reader go and do differently in the office tomorrow.21:11: Marisa Randazzo: Within security, practitioners are often trying to talk with departments outside of security — whether it is to brief a c-suite on security issues or talk with human resources or an employee assistance program — oftentimes they speak different languages and a researcher within the violence risk assessment field has talked about this great term of boundary spanner. Someone who speaks different kinds of languages in different sectors so you can communicate clearly across different domains.26:08: Rachel Briggs: I had the pleasure of working with ASIS International and its foundation. I spent about nine months diving into the issue of diversity equity and inclusion within corporate security and - spoiler alert- there isn't as much diversity as there should be. Perhaps we didn't need a piece of research to tell us that but more importantly, what I wanted to do was get under the skin of that and really understand what’s happening. I interviewed 16 chief security officers and I think without exception all of them got why security and diversity were important. One of the responses that really gave me hope was when we asked for people to tell us from strongly agree to strongly disagree whether they would speak up if they saw something that wasn't right (some discriminatory behavior) and the vast majority of respondents — across all groups men women straight gay disabled non-disabled etc — said they absolutely would speak up.In other words and I thought that was really important because essentially what we're talking about in terms of diversity is a change management challenge. We're trying to take an industry from being from looking and sounding one way to looking and sounding different in some ways and change happens first because there's the firebrands who are on the frontline who are fighting and shouting and um. You know often feel like they're sort of shouting into an empty room in those early years but answers like that that say people are willing to speak up tells me that things are changing now are they changing fast enough.
48:2609/08/2023
The Extinction Rebellion — What It Is and How It Impacts Industries Far Beyond Energy
Scott Stewart, Vice President of Intelligence at TorchStone Global, shares his expertise on this topic and how his firm provides advice to corporations on how to best protect themselves and their employees in this environment. While not all activity poses a threat, it’s important for companies to be hyper-aware of activity and the measures activists can take. Before joining TorchStone Global as the Vice President of Intelligence, Stewart led the global analysis of terrorism and security topics at Stratfor and served as a member of Michael Dell’s executive protection team. Stewart also spent ten years as a special agent with the U.S. Department of State’s Diplomatic Security Service (DSS). Key topics of Stewart’s discussion with host Fred Burton include:How the Extinction Rebellion movement evolved over time and why companies outside of the energy industry should be concerned.Advice for corporations or those managing large-scale events when there is potential for protest activity nearby.The impact of this type of protest on executive security outside of the office (residential security, banks supporting industries in the spotlight, sporting venues, etc.)
23:4002/08/2023
Thor Writes in Real-Time in his Latest Harvath Thriller, Dead Fall
Thor is the #1 New York Times bestselling author of now twenty-three thrillers. He has appeared on FOX News Channel, CNN, MSNBC, and many other media outlets to discuss terrorism and current events. Thor was recruited into the Department of Homeland Security’s “Red Cell” program: an elite group of writers and artists commissioned to brainstorm terrorist scenarios for the U.S. government.Thor returns to the podcast to discuss:Why Dead Fall is arguably the most intense thriller he has written.His approach to writing each novel (you’ll learn what the term ‘pantser’ means.)The top three authors who have inspired him most and the best advice he’s received.Dead Fall was released on July 25, 2023, and can be found here.
27:0326/07/2023
Former Marine Infantry Officer and Entrepreneur Shares Why Strategic Assessments Precede Tactical Mitigation
Jack joins host Chuck Randolph to discuss:How his time in the Marines has influenced his leadership style.The evolution in training for crisis response in high-risk environments.How to understand the needs of the customer or protectee and build a strategy around it.The best ways to add value in a crisis (hint: it’s not a knee-jerk reaction).Key takeaways:[12:29] Jack Stradley: The main thing I realized when I was COO of an organization was that security has so many different definitions. I worked with a company that did strictly bomb blast mitigation on buildings and then I had a bunch of EP guys that ran around with surveillance kits who thought about motorcade tactics — and those two people never talked to each other. One of the things the Marine Corps taught me was the “combined arms team.” You know that you don't fight in a silo — you bring your artillery, logistics, and your air power and you all work seamlessly together.[14:01] Jack Stradley: Today there are tremendously talented people with skills who apply those skills to do security or protection or analysis. Is really kind of easy. It's bringing all the pieces together and then showing value — making people understand the value because security for security's sake is not necessarily valuable. Security is when you can quantify or articulate its value.[14:50] Jack Stradley: It’s important to remember the risk and the reward for what you're doing and there are no perfect solutions. You know you can't live inside Fort Knox and never leave. That's not a realistic approach so there are always trade-offs. There's always a risk tolerance that has to be understood. That's the ongoing struggle because risk tolerance for each one of us is different. [24:35] Chuck: You're involved when many things go south for organizations. How do you help organizations or what's your recommendation for maintaining a presence of mind? [25:23] Jack Stradley: I think that most people react in a crisis and that's the last thing you want to do. You want to take a beat — now that beat can be a microsecond but you take a beat and you evaluate. You look, you listen, you think, then you act — act deliberately, don't react.Before you have to commit to a course of action and you should take as long as you have but no longer to evaluate things and then make a conscious decision and then continue to evaluate because if it's not working it's maybe time to change course.[31:10] Jack Stradley: We are inundated with information and that's not a revelation to anyone out there. The hard part is to just you know, be able to see through the noise in the chatter and try and get to the fundamentals in the foundation. Understand — what does this mean to me and how does this affect me and my plans? That's part of what we try to do for people is help them with that.
40:5419/07/2023
How Intuit’s Corporate Security Team Demonstrates Value Through Human Connection and Mentorship
Alana Forrest started her 29-year public service career in 1983 at the Palo Alto Police Department and rose through the ranks to Lieutenant. Forrest was promoted to the position of Captain by joining the Los Gatos/Monte Sereno Police Department in 2000 and retired in 2012. She has spent the last 11 years in corporate security and currently leads Global Safety and Security at Intuit. She is a proud co-founder of the California Women Leaders in Law Enforcement Symposium, which began as a local partnership in 2006 and is now endorsed by multiple law enforcement associations with a national following.Forrest joins host Dr. Marisa Randazzo to discuss:The impact of mentoring on her career and the motivation behind starting the Women Leaders in Law Enforcement Foundation.The role of storytelling and connecting on a personal level to demonstrate security’s value to other areas of an organization.Advice for women/girls pursuing a career in protection.Key takeaways:[08:38] Marisa Randazzo: I just think it's so important — the value of mentorship. But it's often difficult to figure out how to get started, so the details that you're sharing here are very helpful. I want to ask a follow-up question about the California Women Leaders in Law Enforcement Symposium. Who is it open to? [09:14] Alana: It's open to anyone. It's not just women but anyone in active law enforcement and retirees can also attend. We're trying to just open up the floodgates and allow anybody who wants to come to join us in California every year. It's been one of the proudest accomplishments in my career — to establish this and have it still be so successful.[15:53] Marisa Randazzo: It sounds like what your foundation now your symposium did was give people up a place for that colleagueship, especially from those smaller departments when they didn't have it in-house necessarily but they could still access. That same level of connection and advice and commiseration just from outside their department but still within the industry. That's phenomenal.[16:16] Alana: Yeah, absolutely and even now unfortunately in the 2000s and here we are in 2023 — we still hear similar stories of challenges that we heard in the 1980s and 90s. So it really does provide an opportunity and a forum for people who are really struggling to get some much needed support. It's kind of sad that we are still having some of these conversations. But at least there's support there.[17:53] Alana: One of the things that I've really tried to do when I first enter any organization is build those relationships and find the right people to talk to — who's in charge of what but also who are the team players that have leadership qualities that you can tell are the people that get things done or has the leadership's ear. Seek out those people to get by your side and have lunch or coffee and have a discussion — what are your pain points with global safety and security or at the security team? [20:51] Alana: I've been in where data really drives the conversation and so I think any sort of data points or storytelling [help in displaying value]. Tell the stories to let people know exactly what's going On. As people started to come back to work I would take people through our Global Security Operations Center and let them see what we do because people really don't have ah an understanding of how much work we do to keep them safe behind the scenes. So when they walk into that room and they see all the monitors and they see all the people and all the activity and I explain what we're doing and how we keep them safe, that is a huge win. [33:36] Alana: You know one of the things I'll emphasize is again — finding those mentors and those champions and building relationships is so important. I didn't get to any promotion or any position in my private sector career without the benefit of a relationship or a connection that I cultivated. And also just being willing to be helpful to anyone who reaches out for questions.
38:0612/07/2023
Identifying Threat Vectors in Anti-Semitic Crimes with Former Israel Defense Forces Combat Soldier
Greg joins host Fred Burton to discuss:Why the importance of human intelligence prevails all in a technology-dominant business culture.Trends in anti-semitic crimes that Battle Tested Solutions helps address and how Greg separates true threats from the noise of activity in the space.Being prepared for the unexpected events that happen when protecting principals abroad.His biggest lessons learned from his time in the Israel Defense Forces.
18:3905/07/2023
Inside the Mind of the Attacker: Using Red Teaming to Mitigate Business Risk
Dr. Wheat joins host Chuck Randolph to discuss:The game-changing role of red teaming in organizations and how, through alternate analysis and critical thinking, to think from the perspective of the attacker.How diverse thinking results in better decisions and aids in the elimination of biases.Where analysts can start when implementing a red teaming strategy.The role of red teaming in helping security teams partner with business leaders to help their organizations thrive.Key takeaways from the episode:[03:04] Treston Wheat: Critical thinking is fundamental to the ability to check assumptions the ability to be objective and separate the person from the analysis. The willingness to question dominant ideas (is a key element to red teaming). So everything that made me a really bad academic actually made me a really good red teamer.[03:44] Treston Wheat: We do something we call poison circles where we basically just come up with ways to attack people. Which sounds a little dark but is very very useful. Because then we have to think through the threat actors and what's their motivation and if they're motivated by — what kind of TTP do they use? How would they behave in a violent situation? How would they behave if they're trying to steal intellectual property?[06:05] Treston Wheat: My job is doing the research on how a left-wing terrorist would behave differently than a right-wing terrorist because most people when they look at terrorism, they say terrorism is terrorism. They actually all have very different targeting patterns.[08:32] Chuck: If you're you're working on an objective and you want to understand what is the potential threat actors' activity or actions … How do you start this process? Where does critical thinking start? Walk me through your protocol.[09:01] Treston Wheat: So the way I start with a threat actor...You go to what they actually say about themselves, because too often in analysis we don't really believe what people tell us even though they're telling us the truth.[12:56] Treston Wheat: And that's why you need people to come in. It's why diversity of thought is so important for a red team. You need people who actually see the world differently than you do rather than all of us coming from the military or all of us coming from Academia — breaking up groupthink. One of the most important parts of red teaming and acknowledging the bias and heuristics.[15:14] Chuck: We could be talking about a business function. We could be talking about terrorism. We could be talking about an event — multiple things — to say look I just need someone to give me an alternative thought on this because, at the end of the day, we want to enable business decision makers with options or courses of action that have some facts around them so they can make a decision.[15:38] Treston Wheat: Which is the entire point of Intel analysis and red teaming is to help our business leaders in particular because we do this for the private sector to make better decisions so that their business thrives.[21:28] Chuck: You know people are listening right now and thinking this is fascinating I need to use this more in my organization I'm a leader — I'm a team leader, or I'm an analyst where do I start?[21:48] Treston Wheat: So I think there are two key ways for people to start who don't do analysis regularly and for an analyst I would say something a little bit different. But if you're not used to doing this number one start applying it to your own life. So anytime you make a decision, walk through your process — the entire process. I recommend writing it down because I just think it's always helpful. What is my assumption in this decision? Why did I perceive what this person said or the information I took in that way?Number two I believe in the use of fiction — reading novels and watching movies and then analyzing them because it gives you an entire plot wrapped up. It's a very useful technique to read novels and watch movies and then analyze them. You don't just passively consume them.Want to hear more? Listen to the full episode here.
35:2428/06/2023
When the Little Things Add Up: The Intel Analysts' Role in Communicating Imminent Risk to Leadership
Dean Baratta has been an intelligence analyst for the majority of his 35 year career and joins the podcast to discuss practical steps for front-line intelligence analysts to communicate risk to their organizations, so that when things happen suddenly, they can maintain their security posture. His expertise spans the military, government, and private sectors. He currently works as the Director of Intelligence and Protective Services for a private company. Prior to his current role, he served as the Chief of the Analysis Bureau at the New Jersey Office of Homeland Security and Preparedness, and an adjunct professor at Rutgers University. He is a retired veteran of the United States Army. In his conversation with host Chuck Randolph they discuss:How intel analysts can be constructively disruptive and fulfill their responsibility of mitigating risk and ensuring the organization is set up for success.The importance of paying attention to the business of government and how it impacts their organization.How to react when the response from leadership is ‘it’s not a big deal’ and the most important asset to have when sharing mitigating risk recommendations.Helpful tips for leaders to support analysts dealing with risk fatigue.
36:4021/06/2023
Shattering Silos: Getting Security and Human Resources to Partner Together for Safety
Melissa Muir is the Director of Human Resources and Organizational Development for the City of Shoreline. She is committed to building strategic partnerships between security and HR to reduce threats and strengthen the health and safety of our organizations and has been a leader in the Association of Threat Assessment Professionals (ATAP) for more than a decade. Nici McLean is a Regional Director of Human Resources & Administration at GardaWorld Security Services where she oversees more than 20 managers and coordinators as well as 2200+ security guards. Her training extends to emergency management, crisis intervention, and de-escalation, and she works closely with the leadership team on strategic development and applying quality management principles. Melissa Muir and Nici McLean join host Dr. Marisa Randazzo to discuss:How “curiosity instead of judgment” can lead to silo-busting conversations.Common obstacles experienced by security and HR professionals when attempting to collaborate and how to fix them.How HR can be used as a resource to approach difficult conversations that can easily be misinterpreted or seen as overly confrontational.Why employee engagement is directly related to incidents of workplace violence.
55:5714/06/2023
The Evolution of Targeted Violence and Why the Threats We Don’t See Pose the Most Danger
Mike has four decades of law enforcement experience. He began his career with the Little Rock Police Department and spent twenty-six years with the U.S. Secret Service. Fifteen years of his career were focused on conducting behavioral threat assessments of those threatening to engage in targeted violence. Mike was also assigned as the Intelligence Liaison to the FBI and CIA Headquarters and was assigned to the Joint Terrorism Task Force. He is the author of four novels, a nonfiction work on rapport building, and Mass Killers: How you can identify workplace, school, or public killers before they strike.Tune in to this episode to hear about:His early career with the Little Rock Police Department and how it taught him the impact of forming strong alliances with both federal partners and local law enforcement.How his latest novel helps readers identify concerning behavior before an attack happens by using threat assessment methodologies.Why the ‘barking dog’ theory cannot be overlooked — threats that we don’t always see are oftentimes the most dangerous to us.The evolution of violence over the last decade and what he sees on the horizon.
23:5507/06/2023
9 Industry Leading Perspectives on How to Communicate the Value of Corporate Security
In this episode, you’ll hear from Chief Security Officers, analysts, and legal experts to learn how they’ve navigated this challenge — earning internal buy-in and fostering a sense of trust with stakeholders. To hear more from the guests featured in this special round-up episode, check out their full recordings here:Anticipating Risk on a Global Scale from Salesforce’s Strategic Intelligence Team (Lewis Sage-Passant, Global Strategic Intelligence Manager)Identifying Operational Risk to Empower a Risk-Taking Culture (Adam Cambridge, Manager of Enterprise Risk Intelligence at MITRE)The Intersection of Privacy, Compliance, and Security — Why a Unified Front Minimizes Risk (Karen Moore, Chief Compliance and Privacy Officer at Unisys)How to Get in Front of Threats at a Global Scale from Verizon’s CSO (Dan Maloney, Chief Security Officer and Senior Vice President of Global Corporate Security with Verizon Communications)What Does Your C-Suite Need to Know? The Role of Data-Informed Decisions in Corporate Security (Ken White, Expedia Group’s Senior Manager of Physical Risk, Intelligence, & Investigations)The Value of Storytelling to Prove Security’s Company-Wide Impact (Jim Bernhardt, Corporate Security Leader at the Nikola Motor Company)Why an Objective-Centric Security Strategy Matters (Bruce McIndoe, President of McIndoe Risk Advisory, Co-Founder of iJET International)Running Towards Fire — How to Mitigate Threats for Journalists in High-Risk Areas (Matt Bohatch, Director of Global Corporate Security and Site Operations for The Washington Post)Think Like an Intelligence Analyst – Deciding What Matters and How to Share It (Sandy Perez, Lead Intelligence Analyst for Alcon)Thank you for listening to Ontic’s Protective Intelligence Podcast. Please subscribe to hear our future episodes. If you have any suggestions for guests, email us at [email protected].
24:2631/05/2023
Former FBI Special Agent Shares What’s Essential to Managing Investigations
Christine joins Women Who Protect to discuss: A day in the life of managing incidents, investigations and case management.How she went about establishing a new case management process. Why she’s passionate about leaning into metrics and reporting to communicate the value of her corporate investigations program to senior leaders.Her previous role as the Co-Case Agent for the U.S. Department of Justice's first conviction of a fatal cyberstalking investigation.
31:2424/05/2023
Jack Carr Answers All — Questions from the Audience and A Sneak Peek into Only the Dead
Jack is a former Navy SEAL who led special operations teams as a Team Leader, Platoon Commander, Troop Commander, and Task Unit Commander. Over his 20 years in Naval Special Warfare, he transitioned from an enlisted SEAL sniper all the way to commanding a Special Operations Task Unit in the most Iranian-influenced section of southern Iraq throughout the tumultuous drawdown of U.S. Forces. Jack retired from active duty in 2016 and lives with his wife and three children in Park City, Utah. He is the author of The Terminal List, True Believer, Savage Son, The Devil’s Hand, In the Blood, and Only the Dead, his most recent novel available now wherever books are sold.Jack returns to the podcast to catch up with Fred Burton to discuss:Where his latest novel, Only the Dead, fits into the James Reece series and why it is hailed as his finest work yetQuestions from the audience ranging from how he approaches writing to the future of his series The best advice he’s received in his writing career
25:2217/05/2023
How a Digitally-Informed Approach to Security Can Revolutionize the Patron Experience
Peter Evans, CEO of Xtract One Technologies, leads his company around this model, and in his role he is devoted to advancing the physical security technology industry. Xtract is a leading technology-driven threat detection and security solution that uses unobtrusive threat detection systems to enable venues to deliver improved experiences while providing unprecedented safety. Peter joins host Chuck Randolph to discuss:How Xtract’s customer-based model drives insights and minimizes riskThe evolution of event security and why it’s not a one size fits all modelThe value of technology in maximizing resources and improving the patron experience
33:0910/05/2023
From OSAC to DSAC to Visa’s GSOC: Mary Hackman’s Commitment to Identifying the Root Causes of Security Concerns
Hackman has over 20 years of experience building and managing risk assessment and mitigation programs for the U.S. government and private sector. Earlier in her career, she worked at the US State Department’s Overseas Security Advisory Council (OSAC), providing security guidance to the private sector operating overseas; at the US Department of Homeland Security’s Office of Intelligence & Analysis, and also worked with the FBI’s Domestic Security Alliance Council (DSAC), before joining Visa. Throughout her career, she has looked for what root causes underlie security concerns as a way to mitigate risk and has also sought to build partnerships throughout.Hackman joins host Dr. Marisa Randazzo to discuss:Her non-linear progression from OSAC (Overseas Security Advisory Council) to GSOC (Global Security Operations Center) at Visa.The most critical skill to have when building a multi-stakeholder team to get to the root cause of a security concern.The impact of a career in security and protection on one’s health and why it’s necessary to check in with peers and take time to reset.
35:1303/05/2023
The Real-Life Spy Behind the James Bond 007 Series
Larry Loftis is the New York Times, Wall Street Journal, USA Today, and international bestselling author of the nonfiction spy thrillers THE PRINCESS SPY: The True Story of World War II Spy Aline Griffith, Countess of Romanones; CODE NAME: LISE: The True Story of the Woman Who Became WWII's Most Highly Decorated Spy; and INTO THE LION'S MOUTH: The True Story of Dusko Popov—World War II Spy, Patriot, and the Real-Life Inspiration for James Bond.Loftis joins host Fred Burton to discuss:The level of detail that went into researching Duško Popov over the course of 18 months.The meaning behind MI6, the Secret Intelligence Service of the United Kingdom, and how the Official Secrets Act impacted Popov’s work.What makes Popov such a powerful character to depict in James Bond films over the decades and questions Loftis would ask the spy if he were alive today.
24:1226/04/2023
DHS Senior Medical Officer Shares Expertise on the Level of Medical Training Needed From Today’s Security Professionals
Dr. Alex Eastman is the Senior Medical Officer at the Department of Homeland Security’s (DHS) Office of Health Security (OHS). In this role, he is responsible for operational medicine across DHS in addition to countering threats to the United States worldwide. On the operational front, Dr. Eastman is a Task Force Officer with ICE Homeland Security Investigations and is assigned to the Special Response Team (SRT) program. He is also a Dallas Police Department lieutenant, the Chief Medical Officer of the Dallas Police Department, and the Lead Medical Officer for the Dallas Police SWAT Team. He is actively involved in national planning for law enforcement medical support through the Department of Justice’s Officer Safety and Wellness Group, the Committee on Tactical Emergency Casualty Care, the Hartford Consensus Working Group and serves as the Medical Advisor for the Major Cities Chiefs Association.Dr. Alex Eastman joins host Fred Burton to discuss:How he applies emergency medicine to his career in the security industry.The biggest gaps in medical training that security teams experience when protecting people, property and reputation.Advice for corporate security and protection leaders on where to start with training their teams to be prepared for medical emergencies.
21:3019/04/2023
Beneath the Surface of Fraud, Corruption, and Compliance Risk Investigations
James Tunkey is the Chief Operating Officer of I-OnAsia, a global risk management consultancy. He works with large publicly-listed companies, high-growth companies on track to IPO, VCs, underwriters, law firm capital markets teams, and public accounting companies to identify risk. A large percentage of James' day-to-day work involves assessing fraud, corruption, reputational, and compliance risks through due diligence and background checks. James also leads global investigations into allegations of fraud, bribery, corruption, sanctions violations, money laundering, intellectual property rights theft, and ESG/BHR compliance failures. James has investigated many (many!) scams and schemes and is adept at locating people and finding real assets. James joins host Chuck Randolph to discuss:The difference between due diligence and a background checkThe most important trait to being successful in fraud investigationsWhy communicating in a way that the business understands is crucial Advice for those seeking opportunities in fraud investigations
32:3112/04/2023
Spotlighting the One Year Anniversary of Women Who Protect with Dr. Marisa Randazzo, PhD
Throughout this series so far, we’ve heard eye-opening insights and advice from our guests that have helped women navigate careers. We hope these stories inspire women and girls and inform them of the range of possibilities in the field. To hear more from the guests featured in this special round-up episode, check out their full recordings here:The Art of Helping Clients Find Lifestyle Appropriate Security with Kate BrightBlend In or Stand Out: Lesser-Known Security Strategies with Mónica Duperon RodriguezThe Crucial Role of Critical Infrastructure Protection in SecuritySoft Skills That Set Security Professionals Apart When Moving From Public to Private SectorsThe Intersection of Privacy, Compliance, and Security — Why a Unified Front Minimizes RiskForging Her Own Path: Creating a Threat Intelligence Company from ScratchThank you for listening to Women Who Protect. Please subscribe to hear our future episodes. If you have any suggestions for guests, email us at [email protected].
15:1129/03/2023
Making it Easier to Have Conversations About Mental Health and Victimization on Campus
Within the Department of Campus Safety, Karen supervises over 300 personnel in Security Services, Support Services, Incident Review & Victim Services, External Affairs, Events and Lost and Found. She is also chair of NYU’s Behavioral Intervention Team. Prior to NYU, Karen served for over 25 years in law enforcement with the Mercer County Prosecutor’s Office, located in Trenton, New Jersey. In this episode, Karen discusses the following topics with host Dr. Marisa Randazzo:The scope of her role in campus safety operationsThe mental toll of working in the Division of Criminal Justice for the state of New Jersey and lesser-known biases she observedThe evolution of NYU’s victim services unit Advice for women and girls entering the protection spaceKaren is also the creator and host of the NYU podcast You Matter!, a podcast created to provide resources to listeners, and to remove the stigma from conversations related to mental health, addiction and victimization.
36:1315/03/2023
Why Red Teaming Maximizes Resources and Minimizes Biases in the Face of Complex Security Decisions
Brian McDermott is an expert on red teaming and began his career serving 20 years as a Marine aviator retiring in 2016 as a Lieutenant Colonel. His supporting establishment tours include Faculty Advisor and Naval Expeditionary Operations Course Director at the USMC Expeditionary Warfare School and as the Marine Corps University (MCU) Red Team Director after successful completion of the 9-week Red Team Leaders course at the U.S. Army University of Foreign Military and Cultural Studies (UFMCS). He is the founder and President of Red Teaming Solutions & Training, LLC. Brian joins host Chuck Randolph to discuss:What red teaming is and why it’s needed in both the intelligence community and corporate world.How red teaming has helped him develop an appreciation of “VUCA” environments (volatile, uncertain, complex, ambiguous).Implications of not using red teaming in organizations.The importance of using common operating language and communicating recommendations in a way the audience understands.
40:0401/03/2023
How Netflix is the Best Commercial for Mark Greaney’s Gray Man Series
His research for the #1 New York Times bestselling Gray Man novels has taken him to more than thirty-five countries and given him the opportunity to train alongside military and law enforcement in the use of firearms, battlefield medicine, and close-range combative tactics. Mark joins host Fred Burton to discuss:A preview of BURNER - a geo-political thriller based in Russia and the 12th novel in the Gray Man series.What it’s like to write alongside Tom Clancy, a legend in the thriller genre.The filming of the Gray Man Netflix movie and how it impacts his series
22:1015/02/2023
Trust Through Transparency — MITRE’s Enterprise Security’s Philosophy to Being a Trusted Advisor
Josh is responsible for establishing, executing, supervising, and directing the implementation and oversight of the company’s insider threat program and strategic protection initiatives. His responsibilities span across MITRE’s six federally funded research and development centers in the fields of defense and intelligence, aviation, civil agency modernization, homeland security, healthcare, and cybersecurity. Prior to his current role, he brings more than 13 years of federal civil and military service with multi-faceted experiences in law enforcement operations, counterintelligence, executive protection, antiterrorism/force protection, and threat and intelligence analysis.Josh joins host Chuck Randolph to discuss:The reality behind convergence in the corporate security worldBeing vulnerable and demonstrating transparency in your workMITRE’s attack framework to manage risk intelligence‘Ah- ha moments’ in his career (or lack thereof!) and what risks he observes on the horizon
32:0901/02/2023
Think Like an Intelligence Analyst - Deciding What Matters and How to Share It
She has a breadth of analytical experience collaborating with local, state, and federal law enforcement agencies in the public safety and threat assessment arenas, with focus areas on counterterrorism, critical infrastructure, data analytics, and open-source intelligence methodology. Throughout her career, she has fine-tuned her ability to take raw information and put it into a form that can be used for security and protection and knows to always put the “so what” front and center.Sandy joins host Dr. Marisa Randazzo to discuss:What the work of an intelligence analyst really entails.The purpose of fusion centers and why they vary from state to state.The most important consideration for women and girls to consider when embarking on a career in security.The value of training, mentorship, and involvement in professional organizations at all stages of a career.
29:4018/01/2023
Mailroom Security — The Unfortunate Impact of Overlooking Screening Protocols
Alex Sappok, Chief Executive Officer at RaySecur Inc., has helped transform how leading security teams at Fortune 500 corporations keep their people and business safe from all types of mail attacks. He is a tech entrepreneur with a proven track record of developing and bringing disruptive innovations in historically conservative industries to market.Alex joins host Chuck Randolph to discuss:The impact of screening procedures on various areas of the business and the implications of pushing them asideHow he approaches mail security solutions for Raysecur’s client baseWhy Raysecur uses a nontraditional approach to the digital transformation trend
29:1004/01/2023
What it Takes to Modernize Your Threat Management Approach
Bringing over 25 years of experience in security consulting, executive security, investigations, and training, Chuck Tobin, Chairman and President of AT-RISK International, Inc., shares his knowledge on how the threat management space has evolved and how to keep up. As the Director of Security/Senior Consultant to three Prime Ministers/Presidential Candidates, Chuck has developed a global political campaign security expertise. This combined with his knowledge and practice in violence threat assessment, investigations, executive security, and training has led him to many leadership positions in the industry.Chuck Tobin joins host Chuck Randolph to discuss:How social media has changed threat intelligence investigationsWhy it's equally important to learn about a potential threat on a human level, as well as analytical (check out an ATAP training he recommends.)How to speak in a language that decision-makers understand to communicate security concerns
27:3521/12/2022
British Intelligence Expert Shares the Greatest Threat Facing Public Figures
Philip served as a Scotland Yard Detective in the Metropolitan Police’s Specialist Operations Command for 30 years, during which he was seconded to British Intelligence for 2.5 years. As a former Counter Terrorist Security Coordinator, he was responsible for the security plans protecting numerous events with the British Royal Family, Military, and Government. He founded Defuse in 2019 and launched The Online Bodyguard podcast in 2022.Philip joins host Fred Burton to discuss:How Philip came to be known as the ‘Online Bodyguard’ by UK mediaHow to create a baseline of threat activity to protect high-profile targetsThe most harmful threat to individuals that most would underestimatePsychological effects of unwanted attention and problematic people
28:3314/12/2022
The Devil’s Weapons — A Premier Work of Military Historical Fiction
Pete is a New York Times bestselling author and former member of the National Labor Relations Board. He contributes regularly to the National Review, and his op-eds have appeared in newspapers ranging from The Wall Street Journal to The Washington Times.Pete joins host and fellow author Fred Burton to discuss:The challenges of staying in the confines of history and research involved in creating The Devil’s Weapons (released December 6th; purchase a copy here)How he was selected to take over the reins of W. E. B. Griffin’s series, an esteemed military and detective fiction writer Pete’s approach to writing — from concept to publication
22:4207/12/2022
Forging Her Own Path: Creating a Threat Intelligence Company from Scratch
Janet Lawless has challenged the status quo throughout her career. In former leadership roles at Microsoft and Cisco, she created and managed global programs focused on compliance and security. She is a member of InfraGard (a partnership between the FBI and members of the private sector), the United States Secret Service Cyber Fraud Task Force, and the Washington State Fusion Center. She is the Chair for ASIS Puget Sound and also founded “PCs 2 Vets” and has provided over 1,000 laptops to veterans.Janet joins host Marisa Randazzo to discuss:Training the tradecraft of threat intelligence How to get threat intelligence programs up and runningWhy diversity matters when building a threat intelligence teamAdvice for women and girls seeking a career in security
41:0730/11/2022
Where to Start When Building a School Safety Plan
Creating this unified front is no easy task as it just takes one negligent individual to set things off path. But that’s where Kevin Craig comes in. Kevin is the Assistant Vice President, Safety, Security and Investigations for Porzio Compliance Services, LLC. A retired New Jersey Police Chief, he has over 30 years of experience in public safety, emergency management, and school security. Kevin has conducted training, planning, and assessments for public and private schools, businesses, and faith-based institutions. He recently authored a book on school safety best practices.Kevin joins host Chuck Randolph to discuss:The current state of school safety programsWhere to start when implementing a school safety program and common blindspotsWho needs to be part of the behavioral threat assessment team
32:4423/11/2022
Running Towards Fire — How to Mitigate Threats for Journalists in High-Risk Areas
Matt Bohatch is the Director of Global Corporate Security and Site Operations for The Washington Post and faces this challenge every day. He has experience collaborating with local law enforcement, conflict management, communications, enterprise-wide security and business partnerships. Prior to his current role, he worked for Gavin de Becker and Associates and began his career as a Sergeant for the US Marine Corps.Matt joins host Fred Burton to discuss:How his decision to join the Marine Corps affected his career trajectory The biggest challenges he faces and the current climate of the news industryEvolving from an executive protection mindset to protecting journalistsRisk mitigation strategies and examples of location-specific resources
23:3017/11/2022
The Evolution of Addressing Targeted Violence Since the 1996 Centennial Olympic Park Bombing
Dave Benson speaks of his experience as a Special Agent for the Bureau of Diplomatic Security and lessons learned from this pivotal event during his conversation with Fred Burton. He is an accomplished security professional with over 40 years of Public and Private Sector expertise in the areas of security management, protective operations, travel security, contingency planning and vulnerability/risk assessment, and mitigation. Prior to his government service, Dave served in various management positions for Walt Disney World Security.Dave and Fred discuss:Pitfalls in protection during the Centennial Olympic Park bombing in 1996How his role as Director of Training for DSS led him to a career focused on behavioral threat assessments and addressing targeted violenceStrategies to address concerning behaviors and mitigate risk in today’s threat environment
16:4215/11/2022
The All-Encompassing Meaning of “Risk” — Acknowledging Protection Beyond Physical Barriers
Robert Dodge is the Chief Executive Officer of Prosegur Global Risk, a key business unit of the world’s third-largest security company. He leads the team that advises some of the largest organizations around the world on risk mitigation and security strategies, advising companies on the critical need to connect what happens online with what’s on the ground. Prior, he was Global President of the Corporate Risk Services Division at G4S and International Senior Vice President at Pinkerton. In this episode, Robert and host Fred Burton discuss:The most challenging global environments to manage risk The evolution of risk management and its link between cyber and physical domainsWhy risk encompasses more than securityAdvice for others seeking risk management, intelligence-led roles
14:4109/11/2022
Soft Skills That Set Security Professionals Apart When Moving From Public to Private Sectors
Julie Marzheuser is the Organized Retail Crime Investigations Manager at The Kroger Co. — the country’s second-largest supermarket chain by revenue. In her role, she conducts threat assessments for internal and external cases and provides executive protection to C-Level executives and board members. She is a former law enforcement professional with a wide range of experiences — including investigations, crisis/hostage negotiation, SWAT team, VIP protection, and event security.In this episode, Julie discusses the following topics with host Dr. Marisa Randazzo:What led her to begin a career path on the front lines of securityHer transition from the public to the private sectorChallenges in the retail industry and how she has worked to address themAdvice for women and girls looking to get into the security industry
39:0503/11/2022
Why an Objective-Centric Security Strategy Matters
Bruce McIndoe has been a visionary and serial entrepreneur in the national security, intelligence, and operational risk management space for global organizations over the last four decades. Throughout his career, he has learned how important clear, action-oriented communication is to keep others informed and safe. He is President of McIndoe Risk Advisory LLC and formerly led the creation of the first 24×7 Global Watch Operations Center at iJET International, Inc. He has also been honored as a Protective Intelligence Honors Pioneer.Straight from the floor of GSX 2022, Bruce joins host Chuck Randolph to discuss:Milestones in history (9/11 and COVID-19) and how they affected corporate securityThe biggest changes in the security space over the last few decadesThe importance of using common operating information and languageExamples of objective-centric enterprise risk management strategies
29:1426/10/2022
Why Rock Bands Demand a Unique Security Strategy
In this episode, John discusses the following topics with host Fred Burton:Challenges in protecting high-profile rock bandsSocial media threats and how to address themProtecting large audiences of over 20,000Skills necessary to be successful in protecting people and assets in the music and entertainment industryCommon misconceptions when it comes to protecting rock bandsJohn also leads a podcast called Spear Talk where he discusses life on the road as a security professional.
27:0720/10/2022
The Art of Turning Information into Intelligence
Surprises are never met with open arms in the world of a security professional. Scenarios - both good and bad - are played out over and over again so nothing can catch them off guard. In the words of George Taylor, former Marine Corps Sniper turned global risk consultant, “prevention always beats reaction.”
Surprises are never met with open arms in the world of a security professional. Scenarios - both good and bad - are played out over and over again so nothing can catch them off guard. In the words of George Taylor, former Marine Corps Sniper turned global risk consultant, “prevention always beats reaction.”
Knowing how to interpret, contextualize and communicate the information around us is crucial to preventing any unwanted surprises; however, oftentimes it’s shared without factoring in who is on the receiving end. As Chief Operating Officer at Exlog Global, George helps clients recognize negative trends earlier so they can mitigate harm to people and assets. He speaks with host Chuck Randolph on the importance of understanding an organization’s culture and risk tolerance before delivering any advice, and why information is not intelligence until it’s communicated effectively — making it both an art and a science.
31:3918/10/2022
The Evolution of OSINT: Managing Privacy When It’s Nearly Impossible to Hide
Straight from the floor of GSX 2022, Don Sortor, Senior Vice President of Global Integrity, Inc, joins host Chuck Randolph to discuss the evolution of open source intelligence.
There was a time in the security profession when practitioners were fed intelligence informing them about how to approach (or avoid) a threat. Fast forward a few decades and it’s now evolved into an influx of information where it’s hard to identify what is needed and how to get ahead. More importantly, the ability to manage information to maintain privacy has become one of the most challenging aspects of security.
Don and Chuck discuss the rapid changes in managing Open Source Intelligence (OSINT) and share the unfortunate implications of turning a blind eye to such an important issue. The shift from actively finding information to preventing information from being discovered has changed the way we conduct business in our day-to-day lives. They discuss how to balance connecting with others online and protecting yourself, your family, and your business. They conclude with Don’s insight on Global Integrity’s latest product and how it’s revolutionizing the privacy industry and how we communicate.
Don has 30+ years in the security field. He is a subject matter expert in cyber and physical security having worked in the telecommunications, financial services, manufacturing, and defense industries. He is deeply skilled in managing security programs and bringing products and services to market. He is a Certified Fraud Examiner, a past member of the group of experts to the OECD on cryptography, a former chairman of I-4, and current Vice Chair of the ASIS Intellectual Property Protection Steering Committee and a member of the ASIS Critical Infrastructure Protection Committee. Don is a US Navy veteran.
28:4611/10/2022
Where Strategic Intelligence Fits Into a Company's Global Operations
Thinking beyond tactical day-to-day security operations is a goal we’ve heard time and time again. However, in today’s threat landscape it’s a choice we can’t ignore. Reading changes around the world that occur outside the boundaries of business operations is growing in importance to both corporations and non-government organizations alike.
Rodger Baker joins host Fred Burton to discuss the increase in companies incorporating geopolitical analysis into their overall business plan. However, it’s not always placed in the right area and defaults to solely a security concern. He shares why this strategic analysis can’t live alone in one department and understanding the broader landscape before incorporating it internally is crucial.
Rodger Baker is the Executive Director of the Stratfor Center for Applied Geopolitics at RANE, a global center of excellence for geopolitical intelligence and analysis. For more than 20 years Rodger has guided the company's analytical process and is one of the world's leading experts on North Korea - having dedicated extended periods of time living and working in and around the Korean peninsula. His core emphasis is the multidisciplinary approach to geopolitics and the evolution of international relations to develop mid- and long-term forecasts to assist companies, governments and other globally engaged organizations make informed decisions.
25:3406/10/2022