An Introduction to Risk Management Principles for Security Professionals

An Introduction to Risk Management Principles for Security Professionals

In this short article I will present those big ideas from risk management that are highly relevant to security professionals like ourselves. (Admittedly, I am no expert! This is something that I am studying, and I wanted to share what might be most useful with you). As defined by ISC2, “risk management is a detailed process of identifying factors that could damage or disclose data, evaluating those factors in light of data value and countermeasure cost, and implementing cost-effective solutions for mitigating or reducing risk”...

Read More

“The Standard Pace is for Chumps"

“The Standard Pace is for Chumps"

There I was at an ATAP gathering, listening to the owner of a boutique security consulting firm present a threat assessment case they worked on back in 2017. As I was chatting with the highly-credentialed HR professional seated next to me, they asked me what I wanted to do professionally. I explained to them that…

Read More

The Final Word on Travel Intelligence & Executive Protection

The Final Word on Travel Intelligence & Executive Protection

Yes, I’m putting the executive protection/Travel Intelligence topic to rest, but only after one final overview. Below is a short summary of relevant ideas from the Travel Intelligence Masterclass held recently. Plus, I have included two important links below.

First, you need to check out the travel intelligence reading list. Any novice could knock out this list in a month, and then they’d have a great reservoir of information to pull from when they’re supporting the executive protection team with travel intelligence...

Read More

Executive Protection: Assessing Threats in 20 Questions (or Less)

Executive Protection: Assessing Threats in 20 Questions (or Less)

I have listed (with my own explanations) the 20 definitive questions that we need to address in our conducting of a systematic threat assessment of an inappropriate pursuer. This list comes from “Threat Assessment and Management Strategies: Identifying the Howlers and Hunters" by Frederick Calhoun and Stephen Weston (Second Edition). I highly recommend reading this book in its entirety. It really is the manual for threat assessment managers.

Read More