Episoder
-
In corporate security, much of the conversation revolves around exciting new technologies. From AI to drones and robots, these innovations capture the imagination of security professionals.
But amidst the enthusiasm for these advancements, there's a notable gap in the discussion — few delve into the practicalities of effectively implementing these technologies.
While the potential benefits are clear, challenges arise rolling out new tech across the organization, including resistance from the public, employees, or management. Overcoming these hurdles becomes crucial, as failure to do so can lead to the organization's reluctance to adopt these promising technologies.
So how do security leaders address this challenge?
This week, we're privileged to have Mark Folmer, President at Robotic Assistance Devices, join us on the podcast. In this episode, we explore the less-discussed aspects of security technology conversations, focusing on where security leaders often stumble when attempting to implement innovative technologies.
We also discuss communication strategies to bring internal stakeholders on board, the dynamics of public resistance to new security measures, the importance of articulating the value of security initiatives to internal stakeholders, how AI can elevate security programs, the difference between evolutionary changes and true innovation, and much more.
Resources:
Mark Folmer on LinkedIn
Robotic Assistance Devices
For more insights on building a successful security intelligence program, be sure to visit our blog at LifeRaftInc.com/blog. And if you enjoy these episodes, be sure to subscribe wherever you listen to the show.
-
Over the past few years, security teams have struggled to adapt to a swath of different challenges – from soaring crime rates and geopolitical conflicts to the rise of AI. But what’s coming in 2024? To get some insight, we invited Scot Walker and Carlos Francisco, CPP, CSSP to discuss the future of corporate security. In this episode, they explain why the retirement of the baby boomer generation represents one of the biggest challenges to security leaders. We also discuss the growing threat of deepfakes, how the Israel/Palestine conflict will impact businesses far away from the warzone, what security leaders need to know about the upcoming 2024 Presidential elections, and the biggest mistakes individuals from the public sector make when transitioning to the private sector.
Resources:
The Future of Corporate Security: A Fusion of Innovation and Expertise in 2033
7 Corporate Physical Security Experts Share Their Predictions for 2024
AI or Not
Joe Rogan Interviews Justin Trudeau
Corporate Security University Podcast
Corporate Security University
Carlos on LinkedIn
Scot on LinkedIn
For more insights on building a successful security intelligence program, be sure to visit our blog at LifeRaftInc.com/blog. And if you enjoy these episodes, be sure to subscribe wherever you listen to the show.
-
Manglende episoder?
-
Corporate security professionals often find themselves in a challenging position when it comes to getting the green light for projects.Frequently, executives fail to fully grasp the real threats facing their organization, leading to underinvestment in security measures. So how can leaders address this problem?
Alex Rodriguez, Director of the Global Security Communications Center at The Walt Disney Company, is on the show today. In this episode, Alex explains the importance of leadership buy-in in the security industry. He also shares strategies for gaining and maintaining leadership support for security initiatives, best practices for aligning expectations and clear communication with leadership, and real-world examples of projects and initiatives that benefited from leadership buy-in.
– Connect w/ Alex: [email protected]
For more insights on building a successful security intelligence program, be sure to visit our website at Liferaftinc.com/blog. And if you enjoy these episodes, be sure to subscribe wherever you listen to the show.
-
After exploding during the pandemic, households have continued to turn to home delivery to shop online. Now savvy thieves see an opportunity. Criminals are prowling neighborhoods for packages to pilfer, and retailers and delivery companies are footing the bill.
So how can corporate security teams address this problem?
Ben Stickle, Ph.D., Associate Professor of Criminal Justice Administration at Middle Tennessee State University, is on the show this week. In this episode, he breaks down the alarming rise of porch piracy nationwide.
Expect to learn what makes porch piracy such an attractive crime for criminals, the surprising demographics of porch pirates, the possible physiological connection between slot machines and porch piracy, why you’re more likely to be a victim of porch piracy than any other crime in America, how much porch piracy costs businesses nationwide each year, why porch piracy impacts retail sales in the future, how consumers, retailers, and delivery companies can tackle this problem and much more.
-
How do you convince senior leadership on the value of open source intelligence? Malte Roschinski and Moritz Schramm from Plan4Risk are on the show today. In this episode, they share their approach to demonstrating the value of OSINT to decision makers. We also explore the consequences of not having management buy-in for threat intelligence, how to prove a tangible ROI with OSINT, as well as the differences in the understanding of threat intelligence in various countries.
– Plan4Risk: https://www.plan4risk.com/start-en/
For more insights on building a successful security intelligence program, be sure to visit our website at Liferaftinc.com/blog. And if you enjoy these episodes, be sure to subscribe wherever you listen to the show.
-
Security leaders rely extensively on policies and procedures when traveling with VIPs. But can you be too prepared? Nathan Ackerman, President and CEO of Riley Risk, is on the show this week. In this episode, he explains why sticking too rigidly to templates can lead to unexpected outcomes, how to tailor communication strategies for individual travelers, and how to prepare travel briefings clients actually read.
Resources:
* Riley Risk: https://rileyrisk.com
* Nathan Ackerman on LinkedIn: https://www.linkedin.com/in/ackermannate/
For more insights on building a successful security intelligence program, be sure to visit our website at Liferaftinc.com/blog. And if you enjoy these episodes, be sure to subscribe wherever you listen to the show.
-
How can OSINT analysts deliver more actionable intelligence for decision-makers? Anna G., an analyst for a large global consultancy, is on the show this week. In this episode, Anna explains the pitfalls of rushed threat intelligence reports. Listeners will also learn about the dangers of single sourcing, the importance of tailored communication plans for crisis situations, and strategies for building credibility with decision-makers. For more insights on building a successful security intelligence program, be sure to visit our website at Liferaftinc.com/blog. And if you enjoy these episodes, be sure to subscribe wherever you listen to the show.
-
Picture this…
You're sitting in a room during another training session, listening to someone at the front of the room drone on and on. They flip through endless pages of a binder, reading aloud monotonously. Your mind starts to wander, and before you know it, you're daydreaming about the fun things you'll do after work. Sound familiar? We've all been there!
Ensuring employees retain crucial safety information can be a real challenge for employers. Despite the best intentions, traditional training sessions often fail to engage employees effectively. When information is presented in a dry and uninspiring manner, it becomes difficult to capture attention and make the material memorable. Consequently, employees may not retain the knowledge they need to stay safe in the workplace.
The consequences of ineffective safety training sessions extend beyond employee disengagement. Poorly designed and implemented programs can cost companies a significant amount of money. When employees fail to retain crucial safety information, accidents and injuries are more likely to occur. These incidents not only harm individuals but also result in increased healthcare costs, lost productivity, and potential legal liabilities for the company.
So what’s the answer?
On the podcast today is Dr. Tristan Casey, Director of New View Safety. In this episode, we discuss the common reasons why safety training programs often fail to engage employees. Dr. Casey will also share his insights on transforming training sessions into exciting and memorable experiences.
Resources:
Dr. Tristan Casey: https://www.linkedin.com/in/dr-tristan-casey-0a26804/ New View Safety: https://thenewview.com.au/Finally, if you enjoyed this episode, make sure to subscribe to the show on Apple Podcasts, Spotify, or wherever you listen to podcasts. And if you're interested in learning more about building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com.
-
Are AI-driven threats lurking within your organization's walls? Liferaft’s Chief Innovation Officer Eduardo Capouya and Senior Vice President of Engineering Matt Hogan join us on the show today. In this episode, Matt and Eduardo delve into the pressing challenges companies face, particularly regarding privacy, security, and ethical concerns in the era of AI. They reveal the risks associated with the use of AI models like ChatGPT, such as the unintentional disclosure of sensitive information and the potential for biased decision-making.
Resources mentioned in this episode:
LifeRaft Labs: https://liferaftlabs.com/
OpenAI: https://openai.com/
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever else you listen to these episodes. And if you’d like more insights on building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com/blog.
-
Chief Security Officers (CSOs) encounter significant challenges when constructing an effective tech stack for their organization's security. These challenges include grappling with integration issues among diverse security solutions, keeping pace with rapidly evolving threats while operating within budgetary constraints, and striking a delicate balance between robust security measures and user-friendliness. Additionally, complying with stringent regulatory requirements and safeguarding data privacy further complicate the process.
The consequences of getting the tech stack wrong can be severe, potentially leading to security vulnerabilities, data breaches, financial losses, reputational damage, and legal ramifications. It could also hinder the organization's ability to effectively defend against physical threats and stay ahead in an increasingly complicated landscape.
So how can they get it right?
John Gill, Executive Vice President at Kaseware, is on the podcast this week. In this episode, he delves into the intricacies of building an effective tech stack for security teams. He also reveals the most common mistakes CSOs make when evaluating potential solutions.
In this episode, expect to learn...
The dangers of looking for the "magic solution" that solves everything. How to create a structured Plan to Identify Suitable Technologies The seven factors to consider when selecting security technologies Picking best-of-breed technologies vs. all-in-one solutions. Best Practices for merging physical and cybersecurity roles in organizationsResources:
Contact John Gill by Email: [email protected] Kaseware: https://www.kaseware.comFinally, if you enjoyed this episode, make sure to subscribe to the show on Apple Podcasts, Spotify, or wherever you listen to podcasts. And if you're interested in learning more about building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com.
-
The prevalence of active shooter situations in the workplace has seen a disconcerting increase in recent years. These distressing incidents, once considered improbable within work environments, have sadly become an alarming reality. News reports continue to remind us that no workplace or industry is immune to such acts of violence. And this sobering trend has prompted companies of all sizes to prioritize employee safety by implementing comprehensive training programs aimed at equipping individuals with the skills and knowledge needed to navigate and survive active shooter events.
But while traditional survival training methods, including the widely-known run, hide, fight strategy advocated by the FBI, have been widely disseminated, they may not provide the most effective approach to ensure survival in active shooter situations. These methods, while offering some guidance, often oversimplify the complexities and realities of high-stress scenarios. So to better prepare employees, a more comprehensive, adaptable, and practical training approach is essential to address the nuanced challenges presented by active shooter incidents.
So what’s the answer?
On the show today is Michael Julian, creator of the A.L.I.V.E. Active Shooter Survival Training Program and President of MPS Security & Protection. During our discussion, he shares his unique method for surviving active shooter situations. Additionally, Michael provides insights on how security leaders can enhance the effectiveness of their training sessions and highlight common pitfalls that companies often encounter when teaching survival training to their employees.
Resources:
ALIVE Active Shooter Survival: www.alivetraining.com
Michael Julian on LinkedIn: www.linkedin.com/michaeljulian
Finally, if you enjoyed this episode, make sure to subscribe to the show on Apple Podcasts, Spotify, or wherever you listen to podcasts. And if you're interested in learning more about building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com.
-
High-profile individuals are increasingly exposed to various online threats that can jeopardize their personal security, reputation, and the organizations they represent. The digital realm has become a playground for attackers seeking to exploit vulnerabilities and gather sensitive information about VIPs for malicious purposes. So what can security professionals do to mitigate this risk?
In our latest podcast episode, we sit down with Ben Barrontine, VP of Executive Services at 360 Privacy. In our conversation, Ben sheds light on the growing threats executives face online and offers insights into effective strategies for safeguarding their digital presence.
In this episode, expect to learn...
Why staying off social media won't keep your data safe. A glimpse into the mindset and techniques used by online attackers. The growing importance of digital intelligence in physical security. The biggest vulnerability of almost every VIP. The four pillars of staying safe online....and much more.
Resources Mentioned
Email Ben: [email protected] Ben on LinkedIn: https://www.linkedin.com/in/benjaminbarrontine/ 360 Privacy: https://www.360privacy.ioFinally, if you enjoyed this episode, make sure to subscribe to Talking Threat Intelligence on Apple Podcasts, Spotify, or wherever you listen to podcasts. And if you're interested in learning more about building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com.
-
Imagine a world where talking to computers feels as natural as chatting with a friend. That's the power of ChatGPT, a groundbreaking technology developed by a company called OpenAI.
This technology has already revolutionized the way we work with computers. Instead of giving them commands, we can have real conversations with them. It's like having an incredibly smart virtual assistant at our fingertips. ChatGPT understands what we say and responds in a way that makes sense. It helps us find information quickly, provides useful suggestions, and even assists with tasks like writing. With ChatGPT, the possibilities seem endless, and it has truly changed the way we interact with technology.
But corporate security teams are understandably worried. For starters, ChatGPT can be used by bad actors to create and spread false information like never before. This means that people are more likely to come across misleading or manipulated content, making it hard to separate fact from fiction online. Additionally, ChatGPT also represents the technological equivalent to the machine gun for cybercriminals, allowing them to create high quality phishing emails and develop new attack vectors like never before.
So how do security teams address these challenges?
In this episode, our guest Daniel Ben-Chitrit, Director of Product Management at Authentic8, breaks down what ChatGPT will mean for corporate security teams and the OSINT community. We’ll also discuss how OSINT analysts can leverage this technology effectively while maintaining security and data privacy.
In this episode, expect to learn:
The implications of using ChatGPT in threat intelligence gathering and analysis.
Discover the potential risks and vulnerabilities associated with integrating ChatGPT into corporate systems.
How to effectively mitigate security threats and protect sensitive information in the era of ChatGPT.
Gain insights into the challenges of distinguishing between genuine and manipulated information generated by ChatGPT.
Understand the impact of ChatGPT on phishing and social engineering attacks, and how to combat them.
Explore potential vulnerabilities in existing security systems when faced with ChatGPT-generated threats.
Understand the potential impact of ChatGPT on user privacy and data protection in corporate environments.
Discover ways to educate employees about the risks and benefits of interacting with ChatGPT in a secure manner.
… and much more.
Relevant Resources:
Authentic8: authentic8.com
Email Daniel: [email protected]
Daniel on LinkedIn: https://www.linkedin.com/in/danielbenchitrit/
Try ChatGPT for Free: https://chat.openai.com/
Sentinel-1: https://www.sentinelone.com/
Joe Rogan Interviews Justin Trudeau: https://www.youtube.com/watch?v=K0YRNS0FYTQ
Finally, if you enjoyed this episode, make sure to subscribe to Talking Threat Intelligence on Apple Podcasts, Spotify, or wherever you listen to podcasts. And if you're interested in learning more about building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com. -
In the high-pressure world of security, where professionals are constantly facing complex threats and demanding situations, building resilience is not just an advantage—it's a fundamental necessity. It's what empowers practitioners to bounce back from setbacks, adapt to challenges, and maintain their mental well-being amidst the pressures of the field.
On the show today is Dr. Mary Beth Janke, a former Secret Service agent, Doctor of Clinical Psychology, and an international protection agent. Drawing from her expertise in behavioral therapy, Dr. Janke guides security professionals in developing strategies to enhance their resilience. And with her diverse background, Dr. Janke brings a unique perspective on the critical importance of resilience for success in the security industry.
By understanding the power of cognitive behavioral theory, she empowers individuals to transform their mindset, break negative thought patterns, and cultivate a resilient approach to their work and personal lives. And her insights provide practical tools and techniques to strengthen mental and emotional fortitude in the ever-changing landscape of physical security.
In this episode, expect to learn:
- The vital role of resilience in the success of security professionals.
- Exploring the connection between mental well-being and effective physical security practices.
- How behavioral therapy can be applied to enhance resilience in the field.
- Practical techniques to identify and modify negative thought patterns.
- Strategies for maintaining resilience in the face of stress and uncertainty.
- Real-life examples illustrating the transformative power of resilience in the industry.
- ...and much more.
To learn more about Dr. Mary Beth Janke and her work, visit her website at https://drmarybeth.com/, and connect with her on LinkedIn at https://www.linkedin.com/in/dr-mary-beth-wilkas-janke-88b6a565/.
Finally, if you enjoyed this episode, make sure to subscribe to Talking Threat Intelligence on Apple Podcasts, Spotify, or wherever you listen to podcasts. And if you're interested in learning more about building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com.
-
This week, guest David Benford, managing director of Blackstage Forensics, is on the podcade. In this episode, we discuss the overlap between digital and physical security, exploring the various types of vulnerabilities businesses face in the digital realm. David shares specific examples of digital vulnerabilities he has encountered in his work and highlights the potential risks they pose to individuals and organizations. The conversation also touches upon the convergence of the cyber and digital worlds, emphasizing the need to consider both online and offline security.
Key Takeaways:
Why digital vulnerabilities pose real-world security risks to businesses and individuals.
How personal identifying information (PII), such as home addresses, email addresses, and phone numbers, can be exposed through various channels.
Why digital vulnerabilities can result in blackmail, sextortion, harassment, stalking, and reputational risks.
How to build trust and put clients at ease during the onboarding process.
Common mistakes that clients make such using easily guessable email addresses and sharing personal data without fully understanding the terms and conditions.
How data breaches and leaks by companies can expose personal information, creating vulnerabilities.
Why future trends suggest an increase in privacy and security awareness, but also a rise in new types of data breaches and attacks.
How the advancement of artificial intelligence offers both advantages and challenges in detecting and combating threats.
If you found our discussion on threat intelligence valuable and want to dive deeper into this topic, please subscribe to our show to never miss an episode. Additionally, make sure to visit our website at LiferaftInc.com, where you'll find a wealth of resources and insights on building a successful threat intelligence program.
-
Alternative social networks present a growing challenge for corporate security teams. These non-traditional platforms, such as Gab and Chan boards, can pose significant threats to organizations, including cyber threats, physical threats, doxing, and misinformation campaigns. And without monitoring these communities, security analysts could be overlooking serious risks to the company.
To address this issue, Neil Spencer, Director of Market Strategy and Partnerships at Liferaft, is back on the podcast. This week, he breaks down what alternative social networks are and how security teams can effectively monitor these platforms. In this episode you will learn:
- Learn why monitoring smaller, obscure communities on these networks is critical for comprehensive threat intelligence.
- Understand how alternative social networks can create echo chambers and contribute to the spread of misinformation campaigns.
- Explore the importance of detecting early warnings and indicators of potential threats in the digital space.
- Find out why brand protection is becoming a crucial piece of corporate security scope.
- Hear real-world examples of how smaller, alternative social networks have provided early warnings of potential threats.
- Learn about the long history of white supremacists using these networks to post manifestos before violent events.
- Discover how monitoring these networks can help organizations get ahead of threats and plan effective mitigation strategies.
- Gain insights into the implications of a threat to an organization's brand, both financially and from a physical security perspective.
- Understand the significance of monitoring alternative social networks for both emerging and mainstream platforms.
Resources:
Neil Spencer on LinkedIn Bellingcat TechCrunch Authentic8 5 Alt-Tech Social Networks You Need to KnowIf you found this discussion on the importance of monitoring alternative social networks informative, please consider subscribing to our podcast on your preferred platform to stay up-to-date with our latest episodes. And if you're interested in learning more about building a successful threat intelligence program, check out the website at Liferaftinc.com for more resources and information. We appreciate your support and look forward to bringing you more valuable insights in the future.
-
Alt-tech social networks have exploded in popularity in recent years. And thanks to lax content moderation rules, these communities have become havens for criminal groups and other bad actors.
This creates new challenges for security teams.
On the one hand, many professionals may not even be aware of some of the new channels where people conjugate online. So as a result, organizations gathering open-source intelligence online could overlook serious threats to their operations.
On the other hand, alt-tech social networks present new opportunities to discover and investigate threat intelligence. This is especially true in forums and communities with relaxed content moderation guidelines.
So where should investigators and security practitioners get started?
In a recent webinar, our very own Director of Strategy and Partnerships Neil Spencer hosted a panel to explore how to collect intelligence, investigate threats, and mitigate security risks facing your organization using new alt-tech social networks. In particular, the group decided to focus on some of the largest and fastest-growing of these communities, namely Telegram, Chan Boards, and TikTok.
He was joined by Head of Intelligence at Securitas SIU, Mike Evans; Assistant Deputy Director, Intelligence Operations at Secure Community Network, Nathan Otto; and the Director of Research and Analytics at 2430 Group, Lindsay Wright.Learn more:
* 5 Tips for Conducting OSINT on Alt-Tech Social Networks
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.
-
On this episode of Talking Threat Intelligence, we're joined by Chris Grow, Managing Partner at LeMareschal LLC, to discuss the common mistakes that OSINT analysts make when providing intelligence for VIP protection. Chris is an expert in the field of open-source intelligence and has years of experience working with close protection teams. He'll be sharing his insights on the most frequent errors that analysts make, as well as strategies to minimize the risk of failure.
Some of the key topics we'll be covering include: how your bias as an American can negatively impact the intelligence you provide to an agent in the field, misconceptions about OSINT, the dangers of providing too much information for EP personnel on the ground, and how OSINT analysts should prepare before their VIP departs for a trip. Chris will also discuss how he vets potential new employees and common red flags to look for during the interview process.
Resources:
Contact Chris GrowDon't miss this enlightening episode! Join the conversation and subscribe to Talking Threat Intelligence now. And if you're interested in learning more about building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com/blog.
- Vis mere