Episodes
-
Join Manish Mehta as he sits down with security strategist and risk advisor, Munish Walther-Puri to explore the evolving landscape of insider risk. This episode dives deep into the complexities of hybrid work environments, the blurred boundaries between personal and professional devices, and the importance of balancing security with employee privacy. Tune in for actionable insights and cutting-edge strategies for managing risks in today's interconnected ecosystems.
You'll learn:How hybrid work and "bring-your-own-device" practices are reshaping insider risk managementPractical frameworks to balance insider threat monitoring with employee privacy and ethical considerationsHow emerging technologies like AI are transforming insider risk detection and mitigation strategiesRelevant resources:MITRE Center for Threat-Informed DefenseINSA categorization of insider threatsCISA’s guide to insider threat mitigationLearn more about Ontic's Incidents, Investigations, and Case Management.
-
What does it take to create a truly safe workplace? On this episode of the Connected Intelligence Podcast, Chuck sits down with Hector Alvarez, a nationally recognized expert in workplace violence prevention. With over 30 years of experience, Hector offers clear, actionable strategies for implementing proactive workplace safety measures.
What you'll learn:
How practical experience and analytics combine for effective threat management Tips for fostering a culture where employees feel comfortable voicing concerns How California’s Senate Bill 553 is changing the definition of workplace violenceSimilar episodes:
What Happens Afterward? How Capital One’s Care Team Addresses the Aftermath of an IncidentThe Story Behind The WAVR-21 — Assessing Targeted Workplace ViolenceThe Patterns Behind Mass Shootings and the Creation of The Violence Project -
Episodes manquant?
-
Join Fred Burton as he interviews Niall Herlehy, Visa’s lead for Protective Intelligence, about building world-class Global Security Operations Centers (GSOCs). Learn how forward-thinking companies like Visa are addressing complex threats and protecting their teams in an unpredictable world. This episode dives into practical advice and actionable strategies for professionals building or optimizing their security programs.
You'll learn:
How GSOCs have evolved to meet modern security challengesBest practices for managing critical intelligence and stakeholder relationshipsTips for starting and scaling GSOCs using benchmarking and collaborationLearn more about Ontic’s Integrated Research.
-
Fred Burton speaks with Robin Welch-Stearns about understanding the true extent of insider risk for modern corporate security teams. Robin shares her insights from her time at the CIA and Google, highlighting the differences between insider risk in public and private sectors. She discusses the importance of creating a comprehensive approach to managing insider threats by understanding the motivations behind them, using data analytics, and fostering collaboration between cybersecurity and physical security teams. You'll learn:
Differences in insider risks between public and private sectors, and common forms these risks take within organizations Strategies and frameworks for detecting and preventing insider threats, emphasizing data analytics and employee training Psychological factors and motivations behind insider threats, and the opportunities and challenges AI presents in managing these risksLearn more about Ontic’s Incidents, Investigations, and Case Management.
-
Mike Smith explores the intricate balance between safeguarding personal privacy and ensuring robust security measures within organizations. His discussion with Fred covers the strategies for developing an effective insider risk program that both anticipates threats and respects individual rights. Through expert insights and real-world examples, you'll gain a comprehensive understanding of how to navigate this delicate yet crucial terrain.
You'll learn:
Key strategies for balancing privacy concerns with security needsThe components that make an insider risk program effectiveHow to implement ethical practices that protect both the organization and its individualsLearn more about Ontic’s Incidents, Investigations, and Case Management.
-
Join us as we explore the dynamic shift from reactive to proactive corporate security leadership with Dave Komendat, former Vice President and Chief Security Officer for Boeing. In this episode, Dave shares his insights on building trust with business leaders through proactive risk management and the importance of employee safety in shaping company culture. Discover how integrating advanced tools and strategic leadership can transform your organization's approach to security.
Tune in to learn:
Strategies for proactive risk management and leadership trust-buildingThe role of employee safety and cultural fit in post-COVID workplace dynamicsThe benefits of the International SOS and Ontic partnership for corporate securitySimilar episodes:
Aligning Security with Business Goals: Insights from Scott LindahlThe Evolution of Risk Management with Tristan FlanneryThe Future of Talent in Corporate Security with Kathy Lavinder and Rachel Briggs -
In this episode, Manish dives into the dynamic world of corporate security through the firsthand experiences of Honeywell's seasoned professionals, Mike Pierce and Kevin Renwick, transitioning from law enforcement. Their conversation emphasizes the critical role of relationship-building in mitigating insider risks while highlighting innovative strategies for breaking down organizational silos. Listen in to gain perspectives on navigating the balance between employee privacy and organizational safety through comprehensive investigative practices.
What you'll learn:
Innovative strategies for identifying and mitigating insider risksStrategies for dismantling silos and enhancing collaborationHow to balance investigative rigor with trust and privacyLearn more about Ontic’s Incidents, Investigations, and Case Management.
-
Mike Gilbert discusses his extensive experience in product management and the evolution of Global Security Operations Centers (GSOCs) in this podcast episode. He highlights the crucial role GSOCs play as the central nervous system of an organization, managing complex security operations and evolving from reactive to proactive functions. Mike also touches on the technological advancements and best practices that are shaping the future of enterprise security operations.
Tune into this episode to learn:
Learn how GSOCs are evolving to become more proactive and strategic in managing security threatsDiscover the technological tools and practices essential for effective incident management and situational awarenessUnderstand the emerging threats faced by GSOCs and how organizations can prepare to tackle themLearn more about GSOCs in Ontic Resources.
-
In this episode, Manish Mehta, Ontic's Chief Product Officer, sits down with hosts Chuck Randolph and Fred Burton to discuss the evolution of security and the importance of Connected Intelligence in modern protective practices. Manish also shares his insights on technological disruptions and how they shape industries beyond just security. The conversation touches on the challenges of organizational silos and the potential for GSOCs (Global Security Operations Centers) to become central to modernization.
Sign up for our monthly newsletter.
What you'll learn:
The evolution of security from Protective Intelligence to Connected IntelligenceThe impact of technological disruptions on various industries, including securityThe role of GSOCs in overcoming organizational silos and driving modernization -
Scott Lindahl, Vice President Corporate Services & Chief Security Officer at Kellanova, shares his insights on aligning security with business goals. Scott explores the evolving role of security professionals in risk management and the importance of partnership and active listening within organizations. His conversation with Chuck provides practical guidance on balancing multiple business functions and driving security initiatives that enable business success.
Tune into his conversation with Chuck Randolph to hear:
Key transformations in the security industry and the shift from traditional methods to risk and resilience conversations.The role of active listening and critical thinking in aligning security strategies with corporate objectives.Strategies for managing multiple remits and synchronizing efforts across business lines for optimal outcomes.Learn more about Security Management in Ontic Resources.
Have a question for our hosts? Or want to be on the podcast? Email us at [email protected].
-
In this episode, host Chuck Randolph speaks with Ian Johnson, Threat Manager on the Coinbase Protective Intelligence team, about the evolving landscape of security in the FinTech industry. They discuss Ian’s career path, the challenges and opportunities in managing life safety threats, and how technology and AI are transforming investigative processes in corporate security.
Tune in to hear them discuss:
Ian's unconventional career path in private security and FinTechThe role of AI and technology in modern security operationsStrategies for creating effective and adaptable investigative programsRelated Resources:
The Intelligence Cycle in ActionPrioritizing Threat Actors: 3 Steps to Uncovering and Concentrating on Your Most Significant RisksHow to Take Your Investigations Program From Good to GreatHow to Elevate Your Investigations Program by Addressing Common GapsLearn more about Ontic's Incidents, Investigations, and Case Management.
Have a question for our hosts? Or want to be on the podcast? Email us at [email protected].
-
Join host Fred Burton and former Navy SEAL and New York Times Bestselling Author, Jack Carr, as they discuss pivotal moments in military history and their implications on modern-day operations. In this episode, Jack shares insights from his new book, Targeted Beirut, focusing on the 1983 attacks in Beirut and their lasting impact. Don't miss this in-depth conversation with one of the most knowledgeable voices in military history and fiction.
Tune in as Jack shares:
The challenges of acquiring photo permissions for nonfiction booksThe personal stories behind the 1983 Beirut bombings and their rescue effortsLessons learned from historical military engagements and their application todayRelated Resources:
Jack Carr's WebsiteTargeted BeirutHave a question for our hosts? Or want to be on the podcast? Email us at [email protected].
Subscribe to our monthly newsletter here.
-
Fred Burton interviews Dr. Matthew Levitt, a renowned expert in counterterrorism and intelligence. Dr. Levitt shares insights from his extensive career, including his work with the FBI, his time at the U.S. Department of Treasury, and his current role at the Washington Institute for Near East Policy. They discuss the development of interactive mapping tools that track Iranian external operations and how these tools can aid security teams in protecting their organizations.
Tune in to hear:
Dr. Matthew Levitt's background and experience in counterterrorism and intelligenceThe creation and use of interactive mapping tools for tracking Iranian external operationsInsights into the different types of Iranian plots and their implications for global securityResources mentioned in the episode:
Iranian external operations interactive mapLaunch event for the Iran operations mapHezbollah bookHamas bookHezbollah podcast (Breaking Hezbollah’s Golden Rule)Hezbollah interactive mapMore on Matthew LevittHave a question for our hosts? Or want to be on the podcast? Email us at [email protected]. For more information, check out Ontic Resources.
-
Join us in a conversation with Don Bentley, a New York Times bestselling author famous for his work in the Matt Drake, Tom Clancy Jack Ryan Jr., and Vince Flynn Mitch Rapp series. Don shares his unique experiences from being an Army Apache helicopter pilot to an FBI special agent and how these adventures contributed to his writing. Discover how Don approaches writing in iconic universes and hear about his latest projects.
Tune in to his conversation with Fred Burton to:
Understand Don's approach to taking over legacy characters like Mitch Rapp and Jack Ryan Jr.Learn how Don's military and law enforcement background has influenced his storytelling.Get a sneak peek into Don's latest works and what fans can expect next.Related Resources:
Don Bentley’s websiteCapture or Kill: A Mitch Rapp NovelHave a question for our hosts? Or want to be on the podcast? Email us at [email protected].
-
In this episode, Fred Burton speaks with Dr. Lewis Sage-Passant, Global Head of Intelligence at Novo Nordisk, about his new book, Beyond States and Spies. Lewis shares insights from his career in military intelligence, private sector intelligence, and his extensive research into the history and ethics of intelligence operations. Tune in to discover how private sector intelligence has evolved and the surprising historical precedents that challenge conventional views.
Tune in to hear them discuss:
The evolution and significance of private sector intelligence.Key historical milestones in intelligence, including the role of Lloyd's of London.The importance of transparency and cooperation in modern intelligence operations.Related Resources:
Preorder Beyond States and SpiesThe Intelligence Cycle in ActionEnhancing the Intelligence Cycle: How to Leverage Feedback to Provide More Valuable IntelligenceHave a question for our hosts? Or want to be on the podcast? Email us at [email protected].
-
In this episode of The CCI Debrief, hosts Chuck Randolph and Fred Burton are joined by Ontic's Senior Director of Threat Assessment Management Operations, Cynthia Marble. They discuss the current political violence landscape as the US elections approach, examine the implementation of California’s new workplace violence prevention law (SB 553), and share their expectations for the upcoming GSX conference. They provide valuable insights on how organizations can prepare for potential threats, emphasize the importance of workplace violence prevention, and highlight key trends and technologies to watch at GSX.
Tune in as they discuss:
Strategies to mitigate political violence risks in light of upcoming elections.The role of security in implementing California's SB 553 workplace violence prevention law.Anticipated innovations and key trends at the upcoming GSX conference.Related Resources:
5 Things California Employers Should Consider to Comply with Senate Bill 553Following California’s New Workplace Violence Laws Is Good for All BusinessesHow To Comply With California Senate Bill 553Meet with Ontic at GSXLearn more in Ontic Resources. Want to be on the podcast? Email us at [email protected].
-
In this episode, we sit down with Adrienne Galbrecht, Ontic’s Team Lead for Strategic Intelligence Services, to explore how her extensive background in law enforcement gives her a unique edge in the private sector. Adrienne shares insights from her decade-long experience as a crime and intelligence analyst, discussing the evolution of the intelligence cycle with advancements in technology and data analytics. We also address intriguing comments from LinkedIn on the non-linear nature of the intelligence process and the continuous role of data collection and analysis. Adrienne elaborates on the importance of recognizing biases and cognitive limitations while working through the intelligence cycle.
Tune into to hear Fred Burton’s discussion with Adrienne Galbrecht to hear:
Her thoughts on future trends in intelligence and the potential impact of AI on the security field. How her experiences in law enforcement inform her approach to intelligence in the corporate world.The critical need for analysts to be aware of their cognitive biases and limitations, offering strategies for overcoming these challenges.Related Resources:
Intelligence Cycle in ActionEnhancing the Intelligence Cycle: How to Leverage Feedback to Provide More Valuable IntelligenceThe Guide to Establishing an Intelligence BaselineLearn more in Ontic Resources. Want to be on the podcast? Email us at [email protected].
-
Join us in this episode where Chuck Randolph sits down once again with Lou Silvestris, the dynamic leader of the Risk Intelligence and Investigations Team at American Family Insurance. With an impressive career spanning the Central Intelligence Agency, Department of Homeland Security, and multinational corporations, Lou shares his experiences in adapting traditional intelligence techniques to the corporate world. Discover how his expertise in counter-terrorism, geopolitical risk, and operational analysis helps safeguard businesses from global threats. Tune in to explore the fascinating intersection of national security and corporate risk management.
Tune into Chuck Randolph’s conversation with Lou Silvestris to hear:
How traditional intelligence methods are being adapted to meet the unique challenges of corporate risk management.How geopolitical analysis helps businesses navigate and mitigate global threats.The application of counter-terrorism strategies in safeguarding corporate interests and enhancing operational security.Additional Resources:
Critical Infrastructure Security and Resilience (CISA)Is China’s Huawei a Threat to U.S. National Security?The 5G FutureODNI Annual Threat Assessment of the US Intelligence Community, February 2024How Companies Can Navigate Today’s Geopolitical Risks (Harvard Business Review)What is Open-Source Intelligence (ASIS)Learn more in Ontic Resources. Want to be on the podcast? Email us at [email protected].
-
Fred Burton sits down with Brad Thor, a #1 New York Times bestselling author of 24 thrilling novels. Known for his innovative plots and deep insights into intelligence and special operations, Brad shares his thoughts on terrorism, current events, and how his fiction parallels real-world threats. In this episode, Brad discusses his latest novel, Shadow of Doubt, what inspired the plot, the evolution of the novel’s protagonist, and more.
Tune in as host Fred Burton and Brad Thor discuss:
The inspiration behind Shadow of Doubt and its connections to real-world events.Brad’s meticulous research process, including how he integrates cutting-edge technologies and geopolitical insights into his novels.The significance of NATO and historical espionage events in crafting his latest plot.Related Resources:
BradThor.comShadow of Doubt - Montre plus