Recently, I had the opportunity to speak with the Vice President of a recruiting firm involved in recruiting security consultants for the architecture & engineering industry. Like many of our readers, prior to this dialogue I could not give quality answers about what recruiters look for in asset protection professionals, how they support candidates throughout the interview process, or how candidates can evaluate recruiters who approach them–All of which (and more) is answered in this 60-minute dialogue.Read More
*This is a continuation of my “executive protection hacks” series, where I write a collection of articles on a single topic (this time estate security, last time it was travel intelligence), then combine all of them in a single PDF. Download the new PDF here.
Why Estate Security?
I started writing this series of articles on estate security about 9 months before compiling and designing this PDF (procrastination’s a real...challenge). I honestly didn’t think it would get much traction because we don’t think of estate security as being particularly “sexy,” but my contributors and I can add value to the conversation and it’s something I’m quite familiar with. Also, I’ve noticed more chatter/content online about estate security recently – and I think that’s great!
Many of our peers associate estate security with the lower rungs of the executive protection / asset protection ladder (and in some cases that’s justified, if you’re paying them a low-ball hourly rate – you get what you pay for). Although estate security may be where many junior security professionals get their start, this does not diminish the critical nature of that type of work:
After all, where do your clients spend a significant amount of time?
At what location is their presence predictable?
And based on the data available to us, how would you rate the likelihood of a client being inconvenienced, embarrassed, or aggressed against near their driveway (vehicle) and the choke point at the end of their street?
That’s why it’s a job for security professionals. Not neanderthals, and not gung-ho yahoos.
About This Issue
This PDF is made up of 8 articles, and they are all brief & to the point, with no fluff. You’ll get some valuable insight from them – no doubt. A range of topics are addressed here, to include estate security threat landscape, physical security, counter-drone tech, security questioning, customer service, and more.
I am super grateful to feature two detailed pieces from subject matter expert, contributors. Meb West (MA, CPP, CSS) & Jenny West and Larry D. Friese, Jr. provided great insights into the topics of physical security and drone threats/countermeasures (respectively). Across all media (not just security) there’s a lack of long-form content, and both of these pieces fill that void and add much needed insight to the conversation.
Big “thank you” to Meb & Jenny (Seven Spears Security International, LLC) and Larry (Aerial Information Systems Corporation)! And big “thank you” to the EP Nexus readers that consume, share, comment on, and otherwise support projects like this.
Thanks for reading! And feel free to reach out to me anytime by DM on my social channels.
About the EP Nexus Blog
The EP Nexus executive protection blog, is a comprehensive resource for security professionals involved in executive protection, protective intelligence, threat assessment, and related fields.
Launched in March of 2016 as a resource for executive protection professionals, command center gurus, and close protection know-it-alls, EP Nexus is quickly becoming a resource for those seeking to quench their thirst for executive protection reading.
The most popular section of the blog is Executive Protection Hacks. EP Hacks is a series in which we address complex topics (one topic per issue) in a convenient collection of tools & writings. I am actively collaborating with industry leaders to produce future issues. If you're interested in taking an active approach in moving your industry into the future, contact me below.
Outside of EP Hacks, I explore the following topics in writings, tutorials, and webinars: online tools for executive protection professionals, open source intelligence investigations (OSINT), threat assessment, protective intelligence, travel security, and more.
Sign up for the newsletter to receive premium content and monthly updates.
There I was at an ATAP gathering, listening to the owner of a boutique security consulting firm present a threat assessment case they worked on back in 2017. As I was chatting with the highly-credentialed HR professional seated next to me, they asked me what I wanted to do professionally. I explained to them that…Read More
My latest conversation with Ilya Umanskiy was even more insightful than the first, especially as it relates to topics concerning aspiring professionals. We discussed some big topics to include the following:
Personal branding for security professionals, social media use, and Gary Vee
Perspectives on certification & long term professional development
The role of applied psychology
How Ilya and his asset protection peers evaluate talent
And much more!
From a security perspective, drones have the potential to nullify many of the protective measures long relied upon to deter and stop ground-based threats. Walls, vehicle barriers, and officers currently offer limited resistance to even a poorly skilled drone operator with a desire to attack or conduct surveillance against a target. Since World War II, the western private sector has largely not faced a serious threat from the air. The notable exception being 9/11, which was unfathomable to most people on 9/10. Who would y an airliner into a building?Read More
I studied for about 6 weeks total and passed the ASIS CPP Exam with score of 729 out of 800 (650 is passing). I would consider my security background balanced, but by my own standards I am not as proficient as I'd like to be in all of the subjects/domains of the CPP exam, especially physical or information security. Below is my summary of information that you should take in if you're considering getting the CPP certification, followed by my approach to studying for the exam efficiently.Read More
Ilya Umanskiy has nearly 20 years experience in working with global security teams and working as a security consultant. In interviewing Ilya, he showed us his insight into several key areas: career advice, mentorship, challenges facing aspiring professionals (including transitioning military & law enforcement), and more.Read More
When the term “Physical Security” is brought up in our industry, it is usually accompanied by a smirk or an eye roll. It is often deemed an “entry level” task that conjures images of Paul Blart the Mall Cop. No experienced professional would hang their hat on such a rudimentary function, would they? It has been our experience that physical security is often misunderstood and performed poorly. Yet, if the principles and concepts of physical security are understood fully and incorporated into the overall protection strategy appropriately (technology, intelligence, etc.), it can be just as critical a component as any other facet of protective operations.Read More
I created a digital calendar with over 65 of the most notable terrorist attack anniversaries in world history and recent memory, which you can import into your personal calendar (iCal, Outlook, Gmail, Etc.). This simple tool–the first of it’s kind, allows the executive protection specialist to overlay terrorist attack anniversaries with the the principal's travel plans.Read More
"Defined loosely, red teaming is the practice of viewing a problem from an adversary or competitor’s perspective. The goal of most red teams is to enhance decision making, by challenging assumptions, specifying the adversary’s preferences and strategies, or by simply acting as a devil’s advocate." (Source: Red Team Journal)Read More