PLAY PODCASTS
The Ontic Connected Intelligence Podcast

The Ontic Connected Intelligence Podcast

236 episodes — Page 3 of 5

The Meticulous Eye Demanded by High Profile Investigations

As a Special Agent, McKenzie was assigned to several high-profile investigations including the September 11th investigation, and the Amerithrax case. He also successfully investigated numerous Bank, Wire and Health Care fraud as well as Money Laundering cases which exposed critical flaws in banking systems.Key topics of McKenzie’s discussion with host Chuck Randolph include:Why the desire to solve problems is at the heart of every skilled investigatorSkills he learned as a Special Agent in the FBI that carried over into the private sectorThe role of relationships and building networks in his work and why it’s important to surround yourself with people who challenge youKey takeaways:05:50: Kurt McKenzie: I looked at investigations with the same obsessive compulsive behavior that I had when I was a scientist — I'm not being funny about that. It's when you work DNA analysis — the thing you understand is that you're dealing with crime at a molecular level.06:07: Kurt McKenzie: You cannot make mistakes because when the Dna results come back, somebody could go to jail or potentially be executed because these are all very serious crimes. So you learn a meticulous approach to your job that you will take with you forever.08:41: Kurt McKenzie: You don't want to surround yourself with yes men or like-minded people — you want to surround yourself with people who will tell you ‘hey you're screwing up’ or ‘hey, let's do this together hey you're on the right track’ or ‘hey, have you thought about this.’09:00: Chuck Randolph: Yeah I love that too because we can get caught up in our own echo chamber and before we know it.10:11: Chuck Randolph: Kurt you were in the bureau for over 24 years and you did everything — financial crimes, narcotics, trafficking, terrorism, organized crime. This meticulous obsession on critical thinking as a cornerstone to your to your job — did you have to pause and consider how am I going to approach this problem?10:59: Kurt McKenzie: The first thing is to learn what you don't know, and the second thing is to apply basic investigative techniques that the FBI teaches you. You don't want to break the law trying to stop somebody from breaking the law, so you have to educate yourself. Not only about the law but about the group that you're looking at and the people you're looking at. You need to learn everything about them, learn who their associates are, and learn how they move money.17:59: Kurt McKenzie: The two key takeaways that I developed over the years of building liaisons and building teams is that you have to take yourself down a peg at times. Because you may need somebody else more than they need you, so you need to be willing to compromise to an extent to get their cooperation.The second thing you have to be able to make friends, and I don't mean to be fake. I had at least one friend in almost every police department and every federal agency in South Florida that I could call on to assist and I prided myself on that.

Oct 5, 202336 min

How Security Teams Enable Decision-Making in Times of Crisis

Key topics of Lake’s discussion with host Chuck Randolph include:Lessons in risk management Lake has learned that translate between his government and private sector experience.The importance of knowing your business and where security can add value to better support strategy and decision-making.Decision-making in times of crisis and the importance of knowing who has the authority to make certain decisions before an event occurs.Key takeaways:06:57: Chuck Randolph: How did you translate or how would you recommend people translating the ability to say ‘hey, here's some tenets that we have from say being in the military into the private with corporate world.’07:45: Dick Lake: I would push back just a little on you Chuck when you said you kind of have it handed to you in the military. That's not always the case. What I had to do in the military is similar to what I had to do in the corporate world which is sell my product. Convince people that I had a product that was worth using and why it was in their interest and to their benefit to use that product.12:45: Dick Lake: Part of it is what's my value proposition to the organization and one of the key ways you establish your value is you have an in-depth understanding of the business of the business and look for it look to identify ways that you can contribute.21:50: Dick Lake: It’s critical to understand what the organization's crisis management, crisis response, and business continuity policies and procedures are. Most organizations will have somebody that has been identified that will have that role. The second thing is understanding who has the decision authority for certain things and who can make a decision to close an office.That's something you need to decide before there's a crisis because a crisis is business that is not normal. So as as a chief security officer, I may not have that authority to close the office but I might be able to make a recommendation to the chief operating officer. People need to understand that — not just the chief operating officer and the chief security officer, but the chief financial officer, the CEO — everyone needs to underst

Sep 27, 202338 min

You See Me, You Can Be Me — UMMC’s Chief of Polices Shares the Value of Mentorship on Her Career and Future Leaders

As a fourth generation Chicago Police officer (and first female), Chief Mary Eileen Paradis had the instinct to protect ingrained in her life early on. Despite the complex task of protecting 10,000 employees in a high-crime urban area like Jackson, Mississippi, her unwavering dedication and energy toward her role are just some of the qualities that have propelled her to excel in her career.Key topics of Chief Paradis’ discussion with host Dr. Marisa Randazzo include:The challenges she faces amidst the growing reports of workplace violence in the healthcare sector generally and how she takes care of her team.Addressing the complexities of both the university and healthcare side of her role and the importance of relationships with local police and other areas on campus.Advice for women/girls pursuing a career in protection and her involvement in NAWLEE (National Association of Women Law Enforcement Executives).Chief Paradis possesses a combination of 30 plus years of law enforcement, higher education public safety and emergency management experience. She currently serves as the Chief of Police and the Executive Director of Public Safety for the University of Mississippi Police Department and the Office of Public Safety. In addition to higher education, Chief Paradis has worked in museums, hospitality, and retail, and was a sworn member of the Chicago Police Department’s Intelligence Section for over 11 years. Follow her on LinkedIn.

Sep 20, 202339 min

Till Death Do Us Part — Security at High-Profile Funerals

William Villanova knows this all too well, as he has been managing events of this nature for over three decades. He is the President of Frank E. Campbell – The Funeral Chapel in New York City, which has a rich history and is arguably the most well-known funeral home in Manhattan, if not the Nation. He is well known for implementing and promoting the highest standards in funeral service, of which security and privacy are paramount to a successful event. Key topics of Villanova’s discussion with host Fred Burton include:The preparation and contingency planning that goes into a celebrity funeral in the days/weeks leading up to the event.The variety of teams involved to orchastrate a high profile funeral – from NYPD to multiple private security teams to Secret Service.The extent of contingency planning, represented by the collaboration between medical teams and local hospitals on standby.

Sep 13, 202323 min

Empowering Security Professionals to Impact the Bottom Line with HiveWatch CEO Ryan Schonfeld

Ryan Schonfeld’s pushback to age-old security processes and refusing to settle for the way it’s always been done has helped him enable security teams to position their department as a business enabler, while protecting people and assets.Key topics of Schonfeld’s discussion with host Chuck Randolph include:Why security teams need to understand the needs of the business and how their work can impact the success of the company.The cultural challenge of security viewing technology as a risk, instead of a force multiplier that enhances the irreplaceable value of human intel.Trends he's observing in the physical security industry and what’s on the horizon.Key takeaways:Ryan Schonfeld: It’s pretty incredible the amount of data that's out there. I think people, by and large, are more aware of the data today than they certainly were back in the early days of social media and smart devices, and as connected homes were becoming more relevant, and just more and more electronics becoming a part of everyday life. But one of the pieces in slow industries, like physical security, is lack of data isn't the issue, and it's really never been the issue. It's how data is effectively collected and operationalized. That's always what slowed things down.Chuck Randolph: It strikes me, you're talking as much about change management and cultural change as you are operational change. Or, as you said, "Operationalizing the way that we manage the data." I think about it again, we have all these massive bureaucracies, whether it's the military, law enforcement, big corporation, or security provider, you're dealing with a lineage of culture change. You're going to walk in and say, "Hey, we're going to help you manage. We need to look and manage data in different ways." What obstacles have you come up with in your career to change management?Ryan Schonfeld: I think fear of the unknown's probably the biggest one. As a former cop myself, there's a lot of people in our space that are maybe great security leaders, but don't have deep technology backgrounds. Sometimes, rather than surrounding themselves with domain experts, and people who can help understand the technology, and how that technology can be leveraged to improve the program, that technology starts getting seen as a risk to their job, to their program, to whatever it is that they've been building over time, when in fact it really should be a force multiplier.I'm not a person that thinks that AI or technology is going to get rid of all the people in security, that's not possible. I think technology has a really important place in our space, but security is always going to require a human to understand context, and understand nuance, and ultimately make a decision that could impact whether or not somebody's life is harmed or protected, or what happens to a brand. That's not something that organizations are going to entrust to AI or a model. But that person who ultimately needs to make the decision needs to be equipped with the best information as quickly as possible, and that's where technology becomes that force multiplier. By embracing that, you have the ability to look great. It's not a risk to your program or to your job.Chuck Randolph: Ryan, what you're really talking about is making the security function accessible to everybody, right?Ryan Schonfeld: Yeah. I think as security people, and ex-cops, and ex-feds, and ex-military, we tend to operate in silos, we tend to keep things close to us in terms of what we're doing, and what our programs are, and what's entailed, and we do a very bad job of marketing security to the organization and letting people know what's actually going on.Because the reality is, as you start marketing your initiatives, security's going to have different visibility within the organization, people are going to find more value, other departments are going to find more value. You might find a bigger budget in terms of cross department budgeting, if you can provide actual tangible value to other departments. As I alluded to earlier too, security leaders are really going to be seen more as thought leaders and business leaders with a seat at the table.

Sep 6, 202337 min

Mitigating the Alarming Extent of Publicly Accessible Personal Data through Global Integrity's Qphone

Bill Marlow is an internationally recognized authority on Information Security and Risk. As an active participant in critical infrastructure protection on a worldwide basis, he has worked closely with global governments and law enforcement as well as financial institutions, energy corporations, pharmaceutical companies, and insurance companies on issues involving cyber terrorism, security plans, and international cooperation. Additionally, Marlow has served his country as a member of the Intelligence Community.Key topics of Marlow’s discussion with host Fred Burton include:The critical security need behind protecting publicly accessible location data for executives and their corporations, as well as individuals who are deployed abroad.The technology and strategy that went into creating the Qphone and the importance of the right customer base for this product.What’s next in the world of privacy and protection.Key takeaways:01:19: Bill Marlow: My team and I have been looking at things to help the good guys. The bad guys have the highest end capabilities that you can imagine - spectrum radios, point to point encryption capabilities - the good guys on the other hand are not exactly well funded. The Qphone is an ultra secure communications app that you can put on virtually any mobile device to allow fully secured, fully protected communications. The critical part is that we collect no data. We don't know where you are. We don't care where you are. We don't know what your phone is. It is truly a clean implementation. The encryption we use is a Quantum resistant encryption using the latest techniques to prevent Quantum computers from actually accessing it.02:46 Fred: Wow, that's simply amazing. Now I think most of us who have lived in the intelligence space or the protection business are used to apps such as Signal or Whatsapp and so forth. How is Q phone different?03:04 Bill Marlow: So nothing in life is free as the old adage goes. As you’re using a free app they have to pay for themselves somehow. So what they do is they collect information or metadata on every individual and then correlate that information and sell it lots of places. More importantly, there are a number of agencies around the world from different governments who buy that information through third party companies. They collect things about where you are, what kind of device you have, who you are connected to and how many times you talk to them, so on. The Qphone, on the other hand, doesn't collect anything. Now, it's not free but we don't collect anything so you're protected from that kind of analysis from going on. To most of us who are in the intelligence business or even the law enforcement business, that's a critical item - not having people be able to tell where you are who you're talking to or what you've done.13:51 Fred: And I assume ah like most businesses do there's due diligence on customers to make sure that this technology is not falling into enemy's hands so to speak.14:02 Bill Marlow: Absolutely. In fact, that's one of the critical items for us is that you have to be a recognizable organization. You have to be a corporation. You have to be a law enforcement group.17:46 Fred: When you think through this having done a lot of threat assessments and vulnerability assessments on ultra high net worth individuals and so forth, you might have a CEO that's very secure but family members and children aren't.18:01 Bill Marlow: Exactly and they're the vulnerability.18:04.75 Fred: So in this space with a Qphone if you had this deployed amongst your core family and so forth. You could rest assured that nobody's tracking you monitoring you and triangulating in on your location.19:23.56 Bill Marlow: I think that more people need to be made aware of all the things that are happening to them in a privacy mode. How much information is being gathered about them people don't realize the extent of the information that is being gathered every time they go out to a news site or they go shopping online or and they don't have the right kinds of protections in place.19:58 Bill Marlow: Qphone is one piece of a security program. We can protect their communications. We can make sure that they can send documents and messages and they can have conference calls and video calls securely. It works on your your mobile devices. It works on your desktop. But that’s a piece of a much larger program. There’s a need for people to start understanding about the amount of information that's being taken from them.

Aug 30, 202324 min

Clarity Factory Founder Uncovers the Undeniable Correlation Between Diversity and Innovation in the Security Industry

Briggs is a leading expert on security and has advised governments and multinational corporations on security, resilience, terrorism, and responses to extremism. She conducts research, thought leadership, and consulting for corporate clients on security and cybersecurity. She is also an Associate Fellow at Chatham House. She was awarded an OBE by Her Majesty the Queen in 2014 for services to hostage families and kidnap victims overseas.Briggs and host Dr. Marisa Randazzo discuss:Why great ideas can change the world and how the Clarity Factory helps identify new insights and drive innovation in the corporate security and cybersecurity industry.Her process of conveying research to leaders around an organization and the important exercise of always coming back to the core argument.The undeniable connection between diversity and innovation in the security industry and what gives her hope that change is possible in the near future.Key Takeaways:02:50: Rachel Briggs: Any area or profession needs to have good ideas to be able to continually change and improve and face the increasing challenges that we face in the world. But great ideas change the world. (Of course if they are grounded in reality.)06:31: Rachel Briggs: I think the simpler you can keep your ideas, without dumbing them down of course, the further they can travel and the better able people are able to implement it. That's why it's about clarity for me, it's about taking the messy old world that we all live in today and you know.06:58: Marisa Randazzo: One of the things that has really impressed me about the work that you have done has been not only the clarity of the ideas but of how you communicate those ideas and especially for a corporate security audience or a c-suite audience. One of the things that has been so powerful in the work that you have done has been the succinctness and simplicity with which you have conveyed these ideas. It's not just the idea itself. I'd love to just hear about the process of how you go from kind of that raw data to really. Deriving the insights that that you do and then how you communicate it.08:07: Rachel Briggs: I'm a really big believer in trusting the process. You start by opening the funnel and you know what your initial question is and you keep that really simple and you then open it up and gather as much data and information as you possibly can. At a certain point in time you have to stop and go back down the funnel in the other direction and really get sharp on what the argument is — just try and write what it is. I force myself to get back to one piece of paper and find a way of really describing what it is I think this is telling me in a very succinct way before I start writing.I think having that discipline really helps you to write and to communicate in a way that is clear. You're always coming back to your core argument and it really helps you to figure out — is this bit of data relevant or not because inevitably you end up with too much and you have to be ruthless. 15:55: Rachel Briggs: You know in anything I write, whether it's a 500 word blog post or a 20,000 word report it has to be focused on what can the reader go and do differently in the office tomorrow.21:11: Marisa Randazzo: Within security, practitioners are often trying to talk with departments outside of security — whether it is to brief a c-suite on security issues or talk with human resources or an employee assistance program — oftentimes they speak different languages and a researcher within the violence risk assessment field has talked about this great term of boundary spanner. Someone who speaks different kinds of languages in different sectors so you can communicate clearly across different domains.26:08: Rachel Briggs: I had the pleasure of working with ASIS International and its foundation. I spent about nine months diving into the issue of diversity equity and inclusion within corporate security and - spoiler alert- there isn't as much diversity as there should be. Perhaps we didn't need a piece of research to tell us that but more importantly, what I wanted to do was get under the skin of that and really understand what’s happening. I interviewed 16 chief security officers and I think without exception all of them got why security and diversity were important. One of the responses that really gave me hope was when we asked for people to tell us from strongly agree to strongly disagree whether they would speak up if they saw something that wasn't right (some discriminatory behavior) and the vast majority of respondents — across all groups men women straight gay disabled non-disabled etc — said they absolutely would speak up.In other words and I thought that was really important because essentially what we're talking about in terms of diversity is a change management challenge. We're trying to take an industry from being from looking and sounding one way to looking and sounding different in some ways and change happens first because

Aug 9, 202348 min

The Extinction Rebellion — What It Is and How It Impacts Industries Far Beyond Energy

Scott Stewart, Vice President of Intelligence at TorchStone Global, shares his expertise on this topic and how his firm provides advice to corporations on how to best protect themselves and their employees in this environment. While not all activity poses a threat, it’s important for companies to be hyper-aware of activity and the measures activists can take. Before joining TorchStone Global as the Vice President of Intelligence, Stewart led the global analysis of terrorism and security topics at Stratfor and served as a member of Michael Dell’s executive protection team. Stewart also spent ten years as a special agent with the U.S. Department of State’s Diplomatic Security Service (DSS). Key topics of Stewart’s discussion with host Fred Burton include:How the Extinction Rebellion movement evolved over time and why companies outside of the energy industry should be concerned.Advice for corporations or those managing large-scale events when there is potential for protest activity nearby.The impact of this type of protest on executive security outside of the office (residential security, banks supporting industries in the spotlight, sporting venues, etc.)

Aug 2, 202323 min

Thor Writes in Real-Time in his Latest Harvath Thriller, Dead Fall

Thor is the #1 New York Times bestselling author of now twenty-three thrillers. He has appeared on FOX News Channel, CNN, MSNBC, and many other media outlets to discuss terrorism and current events. Thor was recruited into the Department of Homeland Security’s “Red Cell” program: an elite group of writers and artists commissioned to brainstorm terrorist scenarios for the U.S. government.Thor returns to the podcast to discuss:Why Dead Fall is arguably the most intense thriller he has written.His approach to writing each novel (you’ll learn what the term ‘pantser’ means.)The top three authors who have inspired him most and the best advice he’s received.Dead Fall was released on July 25, 2023, and can be found here.

Jul 26, 202327 min

Former Marine Infantry Officer and Entrepreneur Shares Why Strategic Assessments Precede Tactical Mitigation

Jack joins host Chuck Randolph to discuss:How his time in the Marines has influenced his leadership style.The evolution in training for crisis response in high-risk environments.How to understand the needs of the customer or protectee and build a strategy around it.The best ways to add value in a crisis (hint: it’s not a knee-jerk reaction).Key takeaways:[12:29] Jack Stradley: The main thing I realized when I was COO of an organization was that security has so many different definitions. I worked with a company that did strictly bomb blast mitigation on buildings and then I had a bunch of EP guys that ran around with surveillance kits who thought about motorcade tactics — and those two people never talked to each other. One of the things the Marine Corps taught me was the “combined arms team.” You know that you don't fight in a silo — you bring your artillery, logistics, and your air power and you all work seamlessly together.[14:01] Jack Stradley: Today there are tremendously talented people with skills who apply those skills to do security or protection or analysis. Is really kind of easy. It's bringing all the pieces together and then showing value — making people understand the value because security for security's sake is not necessarily valuable. Security is when you can quantify or articulate its value.[14:50] Jack Stradley: It’s important to remember the risk and the reward for what you're doing and there are no perfect solutions. You know you can't live inside Fort Knox and never leave. That's not a realistic approach so there are always trade-offs. There's always a risk tolerance that has to be understood. That's the ongoing struggle because risk tolerance for each one of us is different. [24:35] Chuck: You're involved when many things go south for organizations. How do you help organizations or what's your recommendation for maintaining a presence of mind? [25:23] Jack Stradley: I think that most people react in a crisis and that's the last thing you want to do. You want to take a beat — now that beat can be a microsecond but you take a beat and you evaluate. You look, you listen, you think, then you act — act deliberately, don't react.Before you have to commit to a course of action and you should take as long as you have but no longer to evaluate things and then make a conscious decision and then continue to evaluate because if it's not working it's maybe time to change course.[31:10] Jack Stradley: We are inundated with information and that's not a revelation to anyone out there. The hard part is to just you know, be able to see through the noise in the chatter and try and get to the fundamentals in the foundation. Understand — what does this mean to me and how does this affect me and my plans? That's part of what we try to do for people is help them with that.

Jul 19, 202340 min

How Intuit’s Corporate Security Team Demonstrates Value Through Human Connection and Mentorship

Alana Forrest started her 29-year public service career in 1983 at the Palo Alto Police Department and rose through the ranks to Lieutenant. Forrest was promoted to the position of Captain by joining the Los Gatos/Monte Sereno Police Department in 2000 and retired in 2012. She has spent the last 11 years in corporate security and currently leads Global Safety and Security at Intuit. She is a proud co-founder of the California Women Leaders in Law Enforcement Symposium, which began as a local partnership in 2006 and is now endorsed by multiple law enforcement associations with a national following.Forrest joins host Dr. Marisa Randazzo to discuss:The impact of mentoring on her career and the motivation behind starting the Women Leaders in Law Enforcement Foundation.The role of storytelling and connecting on a personal level to demonstrate security’s value to other areas of an organization.Advice for women/girls pursuing a career in protection.Key takeaways:[08:38] Marisa Randazzo: I just think it's so important — the value of mentorship. But it's often difficult to figure out how to get started, so the details that you're sharing here are very helpful. I want to ask a follow-up question about the California Women Leaders in Law Enforcement Symposium. Who is it open to? [09:14] Alana: It's open to anyone. It's not just women but anyone in active law enforcement and retirees can also attend. We're trying to just open up the floodgates and allow anybody who wants to come to join us in California every year. It's been one of the proudest accomplishments in my career — to establish this and have it still be so successful.[15:53] Marisa Randazzo: It sounds like what your foundation now your symposium did was give people up a place for that colleagueship, especially from those smaller departments when they didn't have it in-house necessarily but they could still access. That same level of connection and advice and commiseration just from outside their department but still within the industry. That's phenomenal.[16:16] Alana: Yeah, absolutely and even now unfortunately in the 2000s and here we are in 2023 — we still hear similar stories of challenges that we heard in the 1980s and 90s. So it really does provide an opportunity and a forum for people who are really struggling to get some much needed support. It's kind of sad that we are still having some of these conversations. But at least there's support there.[17:53] Alana: One of the things that I've really tried to do when I first enter any organization is build those relationships and find the right people to talk to — who's in charge of what but also who are the team players that have leadership qualities that you can tell are the people that get things done or has the leadership's ear. Seek out those people to get by your side and have lunch or coffee and have a discussion — what are your pain points with global safety and security or at the security team? [20:51] Alana: I've been in where data really drives the conversation and so I think any sort of data points or storytelling [help in displaying value]. Tell the stories to let people know exactly what's going On. As people started to come back to work I would take people through our Global Security Operations Center and let them see what we do because people really don't have ah an understanding of how much work we do to keep them safe behind the scenes. So when they walk into that room and they see all the monitors and they see all the people and all the activity and I explain what we're doing and how we keep them safe, that is a huge win. [33:36] Alana: You know one of the things I'll emphasize is again — finding those mentors and those champions and building relationships is so important. I didn't get to any promotion or any position in my private sector career without the benefit of a relationship or a connection that I cultivated. And also just being willing to be helpful to anyone who reaches out for questions.

Jul 12, 202338 min

Identifying Threat Vectors in Anti-Semitic Crimes with Former Israel Defense Forces Combat Soldier

Greg joins host Fred Burton to discuss:Why the importance of human intelligence prevails all in a technology-dominant business culture.Trends in anti-semitic crimes that Battle Tested Solutions helps address and how Greg separates true threats from the noise of activity in the space.Being prepared for the unexpected events that happen when protecting principals abroad.His biggest lessons learned from his time in the Israel Defense Forces.

Jul 5, 202318 min

Inside the Mind of the Attacker: Using Red Teaming to Mitigate Business Risk

Dr. Wheat joins host Chuck Randolph to discuss:The game-changing role of red teaming in organizations and how, through alternate analysis and critical thinking, to think from the perspective of the attacker.How diverse thinking results in better decisions and aids in the elimination of biases.Where analysts can start when implementing a red teaming strategy.The role of red teaming in helping security teams partner with business leaders to help their organizations thrive.Key takeaways from the episode:[03:04] Treston Wheat: Critical thinking is fundamental to the ability to check assumptions the ability to be objective and separate the person from the analysis. The willingness to question dominant ideas (is a key element to red teaming). So everything that made me a really bad academic actually made me a really good red teamer.[03:44] Treston Wheat: We do something we call poison circles where we basically just come up with ways to attack people. Which sounds a little dark but is very very useful. Because then we have to think through the threat actors and what's their motivation and if they're motivated by — what kind of TTP do they use? How would they behave in a violent situation? How would they behave if they're trying to steal intellectual property?[06:05] Treston Wheat: My job is doing the research on how a left-wing terrorist would behave differently than a right-wing terrorist because most people when they look at terrorism, they say terrorism is terrorism. They actually all have very different targeting patterns.[08:32] Chuck: If you're you're working on an objective and you want to understand what is the potential threat actors' activity or actions … How do you start this process? Where does critical thinking start? Walk me through your protocol.[09:01] Treston Wheat: So the way I start with a threat actor...You go to what they actually say about themselves, because too often in analysis we don't really believe what people tell us even though they're telling us the truth.[12:56] Treston Wheat: And that's why you need people to come in. It's why diversity of thought is so important for a red team. You need people who actually see the world differently than you do rather than all of us coming from the military or all of us coming from Academia — breaking up groupthink. One of the most important parts of red teaming and acknowledging the bias and heuristics.[15:14] Chuck: We could be talking about a business function. We could be talking about terrorism. We could be talking about an event — multiple things — to say look I just need someone to give me an alternative thought on this because, at the end of the day, we want to enable business decision makers with options or courses of action that have some facts around them so they can make a decision.[15:38] Treston Wheat: Which is the entire point of Intel analysis and red teaming is to help our business leaders in particular because we do this for the private sector to make better decisions so that their business thrives.[21:28] Chuck: You know people are listening right now and thinking this is fascinating I need to use this more in my organization I'm a leader — I'm a team leader, or I'm an analyst where do I start?[21:48] Treston Wheat: So I think there are two key ways for people to start who don't do analysis regularly and for an analyst I would say something a little bit different. But if you're not used to doing this number one start applying it to your own life. So anytime you make a decision, walk through your process — the entire process. I recommend writing it down because I just think it's always helpful. What is my assumption in this decision? Why did I perceive what this person said or the information I took in that way?Number two I believe in the use of fiction — reading novels and watching movies and then analyzing them because it gives you an entire plot wrapped up. It's a very useful technique to read novels and watch movies and then analyze them. You don't just passively consume them.Want to hear more? Listen to the full episode here.

Jun 28, 202335 min

When the Little Things Add Up: The Intel Analysts' Role in Communicating Imminent Risk to Leadership

Dean Baratta has been an intelligence analyst for the majority of his 35 year career and joins the podcast to discuss practical steps for front-line intelligence analysts to communicate risk to their organizations, so that when things happen suddenly, they can maintain their security posture. His expertise spans the military, government, and private sectors. He currently works as the Director of Intelligence and Protective Services for a private company. Prior to his current role, he served as the Chief of the Analysis Bureau at the New Jersey Office of Homeland Security and Preparedness, and an adjunct professor at Rutgers University. He is a retired veteran of the United States Army. In his conversation with host Chuck Randolph they discuss:How intel analysts can be constructively disruptive and fulfill their responsibility of mitigating risk and ensuring the organization is set up for success.The importance of paying attention to the business of government and how it impacts their organization.How to react when the response from leadership is ‘it’s not a big deal’ and the most important asset to have when sharing mitigating risk recommendations.Helpful tips for leaders to support analysts dealing with risk fatigue.

Jun 21, 202336 min

Ep 118Shattering Silos: Getting Security and Human Resources to Partner Together for Safety

Melissa Muir is the Director of Human Resources and Organizational Development for the City of Shoreline. She is committed to building strategic partnerships between security and HR to reduce threats and strengthen the health and safety of our organizations and has been a leader in the Association of Threat Assessment Professionals (ATAP) for more than a decade. Nici McLean is a Regional Director of Human Resources & Administration at GardaWorld Security Services where she oversees more than 20 managers and coordinators as well as 2200+ security guards. Her training extends to emergency management, crisis intervention, and de-escalation, and she works closely with the leadership team on strategic development and applying quality management principles. Melissa Muir and Nici McLean join host Dr. Marisa Randazzo to discuss:How “curiosity instead of judgment” can lead to silo-busting conversations.Common obstacles experienced by security and HR professionals when attempting to collaborate and how to fix them.How HR can be used as a resource to approach difficult conversations that can easily be misinterpreted or seen as overly confrontational.Why employee engagement is directly related to incidents of workplace violence.

Jun 14, 202355 min

Ep 117The Evolution of Targeted Violence and Why the Threats We Don’t See Pose the Most Danger

Mike has four decades of law enforcement experience. He began his career with the Little Rock Police Department and spent twenty-six years with the U.S. Secret Service. Fifteen years of his career were focused on conducting behavioral threat assessments of those threatening to engage in targeted violence. Mike was also assigned as the Intelligence Liaison to the FBI and CIA Headquarters and was assigned to the Joint Terrorism Task Force. He is the author of four novels, a nonfiction work on rapport building, and Mass Killers: How you can identify workplace, school, or public killers before they strike.Tune in to this episode to hear about:His early career with the Little Rock Police Department and how it taught him the impact of forming strong alliances with both federal partners and local law enforcement.How his latest novel helps readers identify concerning behavior before an attack happens by using threat assessment methodologies.Why the ‘barking dog’ theory cannot be overlooked — threats that we don’t always see are oftentimes the most dangerous to us.The evolution of violence over the last decade and what he sees on the horizon.

Jun 7, 202323 min

Ep 1169 Industry Leading Perspectives on How to Communicate the Value of Corporate Security

In this episode, you’ll hear from Chief Security Officers, analysts, and legal experts to learn how they’ve navigated this challenge — earning internal buy-in and fostering a sense of trust with stakeholders. To hear more from the guests featured in this special round-up episode, check out their full recordings here:Anticipating Risk on a Global Scale from Salesforce’s Strategic Intelligence Team (Lewis Sage-Passant, Global Strategic Intelligence Manager)Identifying Operational Risk to Empower a Risk-Taking Culture (Adam Cambridge, Manager of Enterprise Risk Intelligence at MITRE)The Intersection of Privacy, Compliance, and Security — Why a Unified Front Minimizes Risk (Karen Moore, Chief Compliance and Privacy Officer at Unisys)How to Get in Front of Threats at a Global Scale from Verizon’s CSO (Dan Maloney, Chief Security Officer and Senior Vice President of Global Corporate Security with Verizon Communications)What Does Your C-Suite Need to Know? The Role of Data-Informed Decisions in Corporate Security (Ken White, Expedia Group’s Senior Manager of Physical Risk, Intelligence, & Investigations)The Value of Storytelling to Prove Security’s Company-Wide Impact (Jim Bernhardt, Corporate Security Leader at the Nikola Motor Company)Why an Objective-Centric Security Strategy Matters (Bruce McIndoe, President of McIndoe Risk Advisory, Co-Founder of iJET International)Running Towards Fire — How to Mitigate Threats for Journalists in High-Risk Areas (Matt Bohatch, Director of Global Corporate Security and Site Operations for The Washington Post)Think Like an Intelligence Analyst – Deciding What Matters and How to Share It (Sandy Perez, Lead Intelligence Analyst for Alcon)Thank you for listening to Ontic’s Protective Intelligence Podcast. Please subscribe to hear our future episodes. If you have any suggestions for guests, email us at [email protected].

May 31, 202324 min

Ep 115Former FBI Special Agent Shares What’s Essential to Managing Investigations

Christine joins Women Who Protect to discuss: A day in the life of managing incidents, investigations and case management.How she went about establishing a new case management process. Why she’s passionate about leaning into metrics and reporting to communicate the value of her corporate investigations program to senior leaders.Her previous role as the Co-Case Agent for the U.S. Department of Justice's first conviction of a fatal cyberstalking investigation.

May 24, 202331 min

Ep 114Jack Carr Answers All — Questions from the Audience and A Sneak Peek into Only the Dead

Jack is a former Navy SEAL who led special operations teams as a Team Leader, Platoon Commander, Troop Commander, and Task Unit Commander. Over his 20 years in Naval Special Warfare, he transitioned from an enlisted SEAL sniper all the way to commanding a Special Operations Task Unit in the most Iranian-influenced section of southern Iraq throughout the tumultuous drawdown of U.S. Forces. Jack retired from active duty in 2016 and lives with his wife and three children in Park City, Utah. He is the author of The Terminal List, True Believer, Savage Son, The Devil’s Hand, In the Blood, and Only the Dead, his most recent novel available now wherever books are sold.Jack returns to the podcast to catch up with Fred Burton to discuss:Where his latest novel, Only the Dead, fits into the James Reece series and why it is hailed as his finest work yetQuestions from the audience ranging from how he approaches writing to the future of his series The best advice he’s received in his writing career

May 17, 202325 min

Ep 113How a Digitally-Informed Approach to Security Can Revolutionize the Patron Experience

Peter Evans, CEO of Xtract One Technologies, leads his company around this model, and in his role he is devoted to advancing the physical security technology industry. Xtract is a leading technology-driven threat detection and security solution that uses unobtrusive threat detection systems to enable venues to deliver improved experiences while providing unprecedented safety. Peter joins host Chuck Randolph to discuss:How Xtract’s customer-based model drives insights and minimizes riskThe evolution of event security and why it’s not a one size fits all modelThe value of technology in maximizing resources and improving the patron experience

May 10, 202333 min

Ep 112From OSAC to DSAC to Visa’s GSOC: Mary Hackman’s Commitment to Identifying the Root Causes of Security Concerns

Hackman has over 20 years of experience building and managing risk assessment and mitigation programs for the U.S. government and private sector. Earlier in her career, she worked at the US State Department’s Overseas Security Advisory Council (OSAC), providing security guidance to the private sector operating overseas; at the US Department of Homeland Security’s Office of Intelligence & Analysis, and also worked with the FBI’s Domestic Security Alliance Council (DSAC), before joining Visa. Throughout her career, she has looked for what root causes underlie security concerns as a way to mitigate risk and has also sought to build partnerships throughout.Hackman joins host Dr. Marisa Randazzo to discuss:Her non-linear progression from OSAC (Overseas Security Advisory Council) to GSOC (Global Security Operations Center) at Visa.The most critical skill to have when building a multi-stakeholder team to get to the root cause of a security concern.The impact of a career in security and protection on one’s health and why it’s necessary to check in with peers and take time to reset.

May 3, 202335 min

Ep 111The Real-Life Spy Behind the James Bond 007 Series

Larry Loftis is the New York Times, Wall Street Journal, USA Today, and international bestselling author of the nonfiction spy thrillers THE PRINCESS SPY: The True Story of World War II Spy Aline Griffith, Countess of Romanones; CODE NAME: LISE: The True Story of the Woman Who Became WWII's Most Highly Decorated Spy; and INTO THE LION'S MOUTH: The True Story of Dusko Popov—World War II Spy, Patriot, and the Real-Life Inspiration for James Bond.Loftis joins host Fred Burton to discuss:The level of detail that went into researching Duško Popov over the course of 18 months.The meaning behind MI6, the Secret Intelligence Service of the United Kingdom, and how the Official Secrets Act impacted Popov’s work.What makes Popov such a powerful character to depict in James Bond films over the decades and questions Loftis would ask the spy if he were alive today.

Apr 26, 202324 min

Ep 110DHS Senior Medical Officer Shares Expertise on the Level of Medical Training Needed From Today’s Security Professionals

Dr. Alex Eastman is the Senior Medical Officer at the Department of Homeland Security’s (DHS) Office of Health Security (OHS). In this role, he is responsible for operational medicine across DHS in addition to countering threats to the United States worldwide. On the operational front, Dr. Eastman is a Task Force Officer with ICE Homeland Security Investigations and is assigned to the Special Response Team (SRT) program. He is also a Dallas Police Department lieutenant, the Chief Medical Officer of the Dallas Police Department, and the Lead Medical Officer for the Dallas Police SWAT Team. He is actively involved in national planning for law enforcement medical support through the Department of Justice’s Officer Safety and Wellness Group, the Committee on Tactical Emergency Casualty Care, the Hartford Consensus Working Group and serves as the Medical Advisor for the Major Cities Chiefs Association.Dr. Alex Eastman joins host Fred Burton to discuss:How he applies emergency medicine to his career in the security industry.The biggest gaps in medical training that security teams experience when protecting people, property and reputation.Advice for corporate security and protection leaders on where to start with training their teams to be prepared for medical emergencies.

Apr 19, 202321 min

Ep 109Beneath the Surface of Fraud, Corruption, and Compliance Risk Investigations

James Tunkey is the Chief Operating Officer of I-OnAsia, a global risk management consultancy. He works with large publicly-listed companies, high-growth companies on track to IPO, VCs, underwriters, law firm capital markets teams, and public accounting companies to identify risk. A large percentage of James' day-to-day work involves assessing fraud, corruption, reputational, and compliance risks through due diligence and background checks. James also leads global investigations into allegations of fraud, bribery, corruption, sanctions violations, money laundering, intellectual property rights theft, and ESG/BHR compliance failures. James has investigated many (many!) scams and schemes and is adept at locating people and finding real assets. James joins host Chuck Randolph to discuss:The difference between due diligence and a background checkThe most important trait to being successful in fraud investigationsWhy communicating in a way that the business understands is crucial Advice for those seeking opportunities in fraud investigations

Apr 12, 202332 min

Ep 108Spotlighting the One Year Anniversary of Women Who Protect with Dr. Marisa Randazzo, PhD

Throughout this series so far, we’ve heard eye-opening insights and advice from our guests that have helped women navigate careers. We hope these stories inspire women and girls and inform them of the range of possibilities in the field. To hear more from the guests featured in this special round-up episode, check out their full recordings here:The Art of Helping Clients Find Lifestyle Appropriate Security with Kate BrightBlend In or Stand Out: Lesser-Known Security Strategies with Mónica Duperon RodriguezThe Crucial Role of Critical Infrastructure Protection in SecuritySoft Skills That Set Security Professionals Apart When Moving From Public to Private SectorsThe Intersection of Privacy, Compliance, and Security — Why a Unified Front Minimizes RiskForging Her Own Path: Creating a Threat Intelligence Company from ScratchThank you for listening to Women Who Protect. Please subscribe to hear our future episodes. If you have any suggestions for guests, email us at [email protected].

Mar 29, 202315 min

Ep 107Making it Easier to Have Conversations About Mental Health and Victimization on Campus

Within the Department of Campus Safety, Karen supervises over 300 personnel in Security Services, Support Services, Incident Review & Victim Services, External Affairs, Events and Lost and Found. She is also chair of NYU’s Behavioral Intervention Team. Prior to NYU, Karen served for over 25 years in law enforcement with the Mercer County Prosecutor’s Office, located in Trenton, New Jersey. In this episode, Karen discusses the following topics with host Dr. Marisa Randazzo:The scope of her role in campus safety operationsThe mental toll of working in the Division of Criminal Justice for the state of New Jersey and lesser-known biases she observedThe evolution of NYU’s victim services unit Advice for women and girls entering the protection spaceKaren is also the creator and host of the NYU podcast You Matter!, a podcast created to provide resources to listeners, and to remove the stigma from conversations related to mental health, addiction and victimization.

Mar 15, 202336 min

Ep 106Why Red Teaming Maximizes Resources and Minimizes Biases in the Face of Complex Security Decisions

Brian McDermott is an expert on red teaming and began his career serving 20 years as a Marine aviator retiring in 2016 as a Lieutenant Colonel. His supporting establishment tours include Faculty Advisor and Naval Expeditionary Operations Course Director at the USMC Expeditionary Warfare School and as the Marine Corps University (MCU) Red Team Director after successful completion of the 9-week Red Team Leaders course at the U.S. Army University of Foreign Military and Cultural Studies (UFMCS). He is the founder and President of Red Teaming Solutions & Training, LLC. Brian joins host Chuck Randolph to discuss:What red teaming is and why it’s needed in both the intelligence community and corporate world.How red teaming has helped him develop an appreciation of “VUCA” environments (volatile, uncertain, complex, ambiguous).Implications of not using red teaming in organizations.The importance of using common operating language and communicating recommendations in a way the audience understands.

Mar 1, 202340 min

Ep 105How Netflix is the Best Commercial for Mark Greaney’s Gray Man Series

His research for the #1 New York Times bestselling Gray Man novels has taken him to more than thirty-five countries and given him the opportunity to train alongside military and law enforcement in the use of firearms, battlefield medicine, and close-range combative tactics. Mark joins host Fred Burton to discuss:A preview of BURNER - a geo-political thriller based in Russia and the 12th novel in the Gray Man series.What it’s like to write alongside Tom Clancy, a legend in the thriller genre.The filming of the Gray Man Netflix movie and how it impacts his series

Feb 15, 202322 min

Ep 104Trust Through Transparency — MITRE’s Enterprise Security’s Philosophy to Being a Trusted Advisor

Josh is responsible for establishing, executing, supervising, and directing the implementation and oversight of the company’s insider threat program and strategic protection initiatives. His responsibilities span across MITRE’s six federally funded research and development centers in the fields of defense and intelligence, aviation, civil agency modernization, homeland security, healthcare, and cybersecurity. Prior to his current role, he brings more than 13 years of federal civil and military service with multi-faceted experiences in law enforcement operations, counterintelligence, executive protection, antiterrorism/force protection, and threat and intelligence analysis.Josh joins host Chuck Randolph to discuss:The reality behind convergence in the corporate security worldBeing vulnerable and demonstrating transparency in your workMITRE’s attack framework to manage risk intelligence‘Ah- ha moments’ in his career (or lack thereof!) and what risks he observes on the horizon

Feb 1, 202332 min

Ep 103Think Like an Intelligence Analyst - Deciding What Matters and How to Share It

She has a breadth of analytical experience collaborating with local, state, and federal law enforcement agencies in the public safety and threat assessment arenas, with focus areas on counterterrorism, critical infrastructure, data analytics, and open-source intelligence methodology. Throughout her career, she has fine-tuned her ability to take raw information and put it into a form that can be used for security and protection and knows to always put the “so what” front and center.Sandy joins host Dr. Marisa Randazzo to discuss:What the work of an intelligence analyst really entails.The purpose of fusion centers and why they vary from state to state.The most important consideration for women and girls to consider when embarking on a career in security.The value of training, mentorship, and involvement in professional organizations at all stages of a career.

Jan 18, 202329 min

Ep 102Mailroom Security — The Unfortunate Impact of Overlooking Screening Protocols

Alex Sappok, Chief Executive Officer at RaySecur Inc., has helped transform how leading security teams at Fortune 500 corporations keep their people and business safe from all types of mail attacks. He is a tech entrepreneur with a proven track record of developing and bringing disruptive innovations in historically conservative industries to market.Alex joins host Chuck Randolph to discuss:The impact of screening procedures on various areas of the business and the implications of pushing them asideHow he approaches mail security solutions for Raysecur’s client baseWhy Raysecur uses a nontraditional approach to the digital transformation trend

Jan 4, 202329 min

Ep 101What it Takes to Modernize Your Threat Management Approach

Bringing over 25 years of experience in security consulting, executive security, investigations, and training, Chuck Tobin, Chairman and President of AT-RISK International, Inc., shares his knowledge on how the threat management space has evolved and how to keep up. As the Director of Security/Senior Consultant to three Prime Ministers/Presidential Candidates, Chuck has developed a global political campaign security expertise. This combined with his knowledge and practice in violence threat assessment, investigations, executive security, and training has led him to many leadership positions in the industry.Chuck Tobin joins host Chuck Randolph to discuss:How social media has changed threat intelligence investigationsWhy it's equally important to learn about a potential threat on a human level, as well as analytical (check out an ATAP training he recommends.)How to speak in a language that decision-makers understand to communicate security concerns

Dec 21, 202227 min

Ep 100British Intelligence Expert Shares the Greatest Threat Facing Public Figures

Philip served as a Scotland Yard Detective in the Metropolitan Police’s Specialist Operations Command for 30 years, during which he was seconded to British Intelligence for 2.5 years. As a former Counter Terrorist Security Coordinator, he was responsible for the security plans protecting numerous events with the British Royal Family, Military, and Government. He founded Defuse in 2019 and launched The Online Bodyguard podcast in 2022.Philip joins host Fred Burton to discuss:How Philip came to be known as the ‘Online Bodyguard’ by UK mediaHow to create a baseline of threat activity to protect high-profile targetsThe most harmful threat to individuals that most would underestimatePsychological effects of unwanted attention and problematic people

Dec 14, 202228 min

Ep 99The Devil’s Weapons — A Premier Work of Military Historical Fiction

Pete is a New York Times bestselling author and former member of the National Labor Relations Board. He contributes regularly to the National Review, and his op-eds have appeared in newspapers ranging from The Wall Street Journal to The Washington Times.Pete joins host and fellow author Fred Burton to discuss:The challenges of staying in the confines of history and research involved in creating The Devil’s Weapons (released December 6th; purchase a copy here)How he was selected to take over the reins of W. E. B. Griffin’s series, an esteemed military and detective fiction writer Pete’s approach to writing — from concept to publication

Dec 7, 202222 min

Ep 98Forging Her Own Path: Creating a Threat Intelligence Company from Scratch

Janet Lawless has challenged the status quo throughout her career. In former leadership roles at Microsoft and Cisco, she created and managed global programs focused on compliance and security. She is a member of InfraGard (a partnership between the FBI and members of the private sector), the United States Secret Service Cyber Fraud Task Force, and the Washington State Fusion Center. She is the Chair for ASIS Puget Sound and also founded “PCs 2 Vets” and has provided over 1,000 laptops to veterans.Janet joins host Marisa Randazzo to discuss:Training the tradecraft of threat intelligence How to get threat intelligence programs up and runningWhy diversity matters when building a threat intelligence teamAdvice for women and girls seeking a career in security

Nov 30, 202241 min

Ep 97Where to Start When Building a School Safety Plan

Creating this unified front is no easy task as it just takes one negligent individual to set things off path. But that’s where Kevin Craig comes in. Kevin is the Assistant Vice President, Safety, Security and Investigations for Porzio Compliance Services, LLC. A retired New Jersey Police Chief, he has over 30 years of experience in public safety, emergency management, and school security. Kevin has conducted training, planning, and assessments for public and private schools, businesses, and faith-based institutions. He recently authored a book on school safety best practices.Kevin joins host Chuck Randolph to discuss:The current state of school safety programsWhere to start when implementing a school safety program and common blindspotsWho needs to be part of the behavioral threat assessment team

Nov 23, 202232 min

Ep 96Running Towards Fire — How to Mitigate Threats for Journalists in High-Risk Areas

Matt Bohatch is the Director of Global Corporate Security and Site Operations for The Washington Post and faces this challenge every day. He has experience collaborating with local law enforcement, conflict management, communications, enterprise-wide security and business partnerships. Prior to his current role, he worked for Gavin de Becker and Associates and began his career as a Sergeant for the US Marine Corps.Matt joins host Fred Burton to discuss:How his decision to join the Marine Corps affected his career trajectory The biggest challenges he faces and the current climate of the news industryEvolving from an executive protection mindset to protecting journalistsRisk mitigation strategies and examples of location-specific resources

Nov 17, 202223 min

Ep 95The Evolution of Addressing Targeted Violence Since the 1996 Centennial Olympic Park Bombing

Dave Benson speaks of his experience as a Special Agent for the Bureau of Diplomatic Security and lessons learned from this pivotal event during his conversation with Fred Burton. He is an accomplished security professional with over 40 years of Public and Private Sector expertise in the areas of security management, protective operations, travel security, contingency planning and vulnerability/risk assessment, and mitigation. Prior to his government service, Dave served in various management positions for Walt Disney World Security.Dave and Fred discuss:Pitfalls in protection during the Centennial Olympic Park bombing in 1996How his role as Director of Training for DSS led him to a career focused on behavioral threat assessments and addressing targeted violenceStrategies to address concerning behaviors and mitigate risk in today’s threat environment

Nov 15, 202216 min

Ep 94The All-Encompassing Meaning of “Risk” — Acknowledging Protection Beyond Physical Barriers

Robert Dodge is the Chief Executive Officer of Prosegur Global Risk, a key business unit of the world’s third-largest security company. He leads the team that advises some of the largest organizations around the world on risk mitigation and security strategies, advising companies on the critical need to connect what happens online with what’s on the ground. Prior, he was Global President of the Corporate Risk Services Division at G4S and International Senior Vice President at Pinkerton. In this episode, Robert and host Fred Burton discuss:The most challenging global environments to manage risk The evolution of risk management and its link between cyber and physical domainsWhy risk encompasses more than securityAdvice for others seeking risk management, intelligence-led roles

Nov 9, 202214 min

Ep 93Soft Skills That Set Security Professionals Apart When Moving From Public to Private Sectors

Julie Marzheuser is the Organized Retail Crime Investigations Manager at The Kroger Co. — the country’s second-largest supermarket chain by revenue. In her role, she conducts threat assessments for internal and external cases and provides executive protection to C-Level executives and board members. She is a former law enforcement professional with a wide range of experiences — including investigations, crisis/hostage negotiation, SWAT team, VIP protection, and event security.In this episode, Julie discusses the following topics with host Dr. Marisa Randazzo:What led her to begin a career path on the front lines of securityHer transition from the public to the private sectorChallenges in the retail industry and how she has worked to address themAdvice for women and girls looking to get into the security industry

Nov 3, 202239 min

Ep 92Why an Objective-Centric Security Strategy Matters

Bruce McIndoe has been a visionary and serial entrepreneur in the national security, intelligence, and operational risk management space for global organizations over the last four decades. Throughout his career, he has learned how important clear, action-oriented communication is to keep others informed and safe. He is President of McIndoe Risk Advisory LLC and formerly led the creation of the first 24×7 Global Watch Operations Center at iJET International, Inc. He has also been honored as a Protective Intelligence Honors Pioneer.Straight from the floor of GSX 2022, Bruce joins host Chuck Randolph to discuss:Milestones in history (9/11 and COVID-19) and how they affected corporate securityThe biggest changes in the security space over the last few decadesThe importance of using common operating information and languageExamples of objective-centric enterprise risk management strategies

Oct 26, 202229 min

Ep 91Why Rock Bands Demand a Unique Security Strategy

In this episode, John discusses the following topics with host Fred Burton:Challenges in protecting high-profile rock bandsSocial media threats and how to address themProtecting large audiences of over 20,000Skills necessary to be successful in protecting people and assets in the music and entertainment industryCommon misconceptions when it comes to protecting rock bandsJohn also leads a podcast called Spear Talk where he discusses life on the road as a security professional.

Oct 20, 202227 min

Ep 90The Art of Turning Information into Intelligence

Surprises are never met with open arms in the world of a security professional. Scenarios - both good and bad - are played out over and over again so nothing can catch them off guard. In the words of George Taylor, former Marine Corps Sniper turned global risk consultant, “prevention always beats reaction.” Surprises are never met with open arms in the world of a security professional. Scenarios - both good and bad - are played out over and over again so nothing can catch them off guard. In the words of George Taylor, former Marine Corps Sniper turned global risk consultant, “prevention always beats reaction.” Knowing how to interpret, contextualize and communicate the information around us is crucial to preventing any unwanted surprises; however, oftentimes it’s shared without factoring in who is on the receiving end. As Chief Operating Officer at Exlog Global, George helps clients recognize negative trends earlier so they can mitigate harm to people and assets. He speaks with host Chuck Randolph on the importance of understanding an organization’s culture and risk tolerance before delivering any advice, and why information is not intelligence until it’s communicated effectively — making it both an art and a science.

Oct 18, 202231 min

Ep 89The Evolution of OSINT: Managing Privacy When It’s Nearly Impossible to Hide

Straight from the floor of GSX 2022, Don Sortor, Senior Vice President of Global Integrity, Inc, joins host Chuck Randolph to discuss the evolution of open source intelligence. There was a time in the security profession when practitioners were fed intelligence informing them about how to approach (or avoid) a threat. Fast forward a few decades and it’s now evolved into an influx of information where it’s hard to identify what is needed and how to get ahead. More importantly, the ability to manage information to maintain privacy has become one of the most challenging aspects of security. Don and Chuck discuss the rapid changes in managing Open Source Intelligence (OSINT) and share the unfortunate implications of turning a blind eye to such an important issue. The shift from actively finding information to preventing information from being discovered has changed the way we conduct business in our day-to-day lives. They discuss how to balance connecting with others online and protecting yourself, your family, and your business. They conclude with Don’s insight on Global Integrity’s latest product and how it’s revolutionizing the privacy industry and how we communicate. Don has 30+ years in the security field. He is a subject matter expert in cyber and physical security having worked in the telecommunications, financial services, manufacturing, and defense industries. He is deeply skilled in managing security programs and bringing products and services to market. He is a Certified Fraud Examiner, a past member of the group of experts to the OECD on cryptography, a former chairman of I-4, and current Vice Chair of the ASIS Intellectual Property Protection Steering Committee and a member of the ASIS Critical Infrastructure Protection Committee. Don is a US Navy veteran.

Oct 11, 202228 min

Ep 88Where Strategic Intelligence Fits Into a Company's Global Operations

Thinking beyond tactical day-to-day security operations is a goal we’ve heard time and time again. However, in today’s threat landscape it’s a choice we can’t ignore. Reading changes around the world that occur outside the boundaries of business operations is growing in importance to both corporations and non-government organizations alike. Rodger Baker joins host Fred Burton to discuss the increase in companies incorporating geopolitical analysis into their overall business plan. However, it’s not always placed in the right area and defaults to solely a security concern. He shares why this strategic analysis can’t live alone in one department and understanding the broader landscape before incorporating it internally is crucial. Rodger Baker is the Executive Director of the Stratfor Center for Applied Geopolitics at RANE, a global center of excellence for geopolitical intelligence and analysis. For more than 20 years Rodger has guided the company's analytical process and is one of the world's leading experts on North Korea - having dedicated extended periods of time living and working in and around the Korean peninsula. His core emphasis is the multidisciplinary approach to geopolitics and the evolution of international relations to develop mid- and long-term forecasts to assist companies, governments and other globally engaged organizations make informed decisions.

Oct 6, 202225 min

Ep 87The Value of Storytelling to Prove Security’s Company-Wide Impact

Straight from the floor of GSX 2022, Jim Bernhardt, Corporate Security Leader at the Nikola Motor Company, joins host Chuck Randolph to discuss the impact of storytelling to demonstrate the value of scenario planning and addressing risk before it becomes a larger issue. Thinking about what could go wrong is innate in nearly every security professional’s mindset — from a visitor passing through monitoring stations unnoticed to a USB drive containing valuable information getting into the wrong hands. However, these same thoughts are rarely shared by the people they protect, and communicating the need to scenario plan and manage risk to the C-suite is no walk in the park. Jim Bernhardt, Corporate Security Leader at the Nikola Motor Company, discusses how to approach this daunting, but critical task with host Chuck Randolph. He shares what guides his risk assessment strategy, and how to use company-wide documentation such as the 10K to educate his team on risk factors and develop metrics to address them, using language that makes sense to business units throughout the company. Jim manages all corporate security operations for Nikola Motor Company, a leading technology and manufacturing organization. He provides protection for company personnel and property by creating, implementing and maintaining security systems, policies, procedures, and practices. He also manages physical security, loss/fraud prevention, crisis/emergency management, business continuity, travel security, incident investigations, event security, and executive protection. Jim began his career as a Company Officer for the U.S. Army.

Oct 4, 202230 min

Ep 86What Does Your C-Suite Need to Know? The Role of Data-Informed Decisions in Corporate Security

E

Ken White has been with the organization for over four years and previously led security operations and security readiness for the Seattle campus and over 80 Expedia Group offices through North, Central, and South America as well as the Caribbean. His experience includes regional threat detection, security system implementation, security budgets, contracts, and staff management.

Sep 28, 202225 min

Ep 85How to Get in Front of Threats at a Global Scale from Verizon’s CSO

When you have a retail footprint in nearly 40 countries around the globe, having the same security plan in each region is a straight path to chaos — or worse, harm to employees, customers, or assets. Dan Maloney, Chief Security Officer (CSO) and Senior Vice President of Global Corporate Security with Verizon Communications, knows a thing or two about building a comprehensive (“360”) security plan that is specific to each environment where Verizon operates. He chats with Fred about how he puts his plan into action — from culture, to prioritizing resources in the most pressing environments, to identifying technology gaps and more. He shares how security extends far beyond the physical sides and demands a multi-layer approach with intelligence teams, GSOC, continuity teams, and executive protection — the more people are talking the greater chance you have of getting in front of an unwanted event. They end their discussion by acknowledging the stress that retail environments undergo on a daily basis and tips that his team has found successful to minimize it. Dan Maloney serves as Chief Security Officer and Senior Vice President of Global Corporate Security with Verizon Communications where he oversees 13 departments covering full-spectrum security across the global corporate footprint. He has been with Verizon and its legacy companies since 1997, and he oversees and coordinates global security efforts throughout Verizon and all its business units, including enterprise-wide security strategy and programs, physical security, cybersecurity, legal compliance, and law enforcement matters.

Sep 22, 202236 min

Ep 84Addressing the Cracks to Build a Comprehensive Security Program

Straight from the floor of GSX 2022, Bryan Flannery, President of Foresight Consulting, LLC and Protective Intelligence Honors recipient, joins host Chuck Randolph to discuss the state of violence and the importance of building a comprehensive program to effectively address it. Bryan and Chuck discuss how protection has evolved far beyond a person standing next to you — it’s about a feeling of confidence that a space and all visitors have been vetted, that there are contingency plans in place for all scenarios, and, most importantly but often overlooked, that all teams are exchanging the information they need to keep people and assets safe. No feeling is more important. Bryan shares the more common gaps he observes in security programs and why identifying the cracks is critical to success — risk will always be there, but it’s the programmatic responses in place (i.e. proper reporting mechanisms) that mitigate it from becoming a company-wide concern. Bryan Flannery is the President of Foresight Security Consulting. His passion to keep people safe leads him to bring a holistic approach to security and safety, garnered over 22 years in the military, law enforcement, and as a consultant for state and federal government agencies, corporate clients, schools, and houses of worship.

Sep 19, 202230 min

Ep 84LIVE from GSX 2022 with Fred Burton and Chuck Randolph

Straight from the floor of GSX 2022, podcast hosts Fred Burton and Chuck Randolph share what they’re hearing from booth 3355 as the three-day event kicks off. From threat fatigue in the news to understanding the global threat landscape and how it’s evolved from decades past, they share the most significant challenges corporations face today and lessons learned from their time in the industry. Whether you’re reading this from the event or at home, they encourage listeners to network, learn and ‘understand your blind spots' — because they are always learning something new from guests on the show. Stay tuned in the coming weeks for more episodes from our time at GSX 2022.

Sep 12, 202214 min