Insider threat: It’s Not Just About Spies

Historical Perspective There’s been increased attention in the government and the private sector about the insider threat since the disclosures of classified information by Edward Snowden in 2013. The insider threat has historically been viewed from an espionage perspective, especially by the Department of Justice and the FBI. This was true during the Cold War as intelligence agencies on both

Read More

Security Alignment, Optimization, and Maturity

  Overview: If you’re like me you either played Whack-A-Mole as a child or with your children or grandchildren. As we know the challenge was to be ready to whack the mole when its’ head popped up in one of several holes in front of us. In a way some companies play a version of

Read More

Stalkers and the Workplace

Overview: In their 2002 study Risk Assessment of Stalkers: Some Problems and Possible Solutions, authors P. Randall Kropp, Stephen D. Hart, David R. Lyon described Stalking as a “cluster of behaviors, including unwanted communication, approach, or other contact, usually intended to threaten, harass, coerce, or intimidate the target into meeting the demands of the perpetrator”. Prior to

Read More

Threat Management Team: No Time for Silos

Confident or Cocky? Several years ago I met with an organization to discuss their workplace violence prevention program and threat management team. I asked a key stakeholder to identify who in the organization was responsible to assess and manage threats of violence. His response: “I assess all threats and decide what action we will take”

Read More

Are Protection Orders a Good Strategy?

Protection Orders It is too soon to say whether the protection order issued to the suspect in the shooting in Hesston, Kansas last week served as a trigger to this deadly event. And we do not know how much, if any, the suspect’s employer knew of the allegations of domestic abuse or whether the employer

Read More

Security Practices: Trust But Verify

Security Policies & Procedures Basic security policies and procedures are at the core of a sound security risk program. Former President Ronald Reagan popularized the phrase “trust but verify” when negotiating with the Soviet Union in the 1980s. Although certainly not on the same scale, that phrase can be applied everyday to ensure we provide for

Read More

Ethics: Don’t Reward Bad Behavior

Golden Parachute The CEO of United Airlines and two other senior executives stepped down in September of 2015 in the midst of a federal corruption probe and potential violations of the company’s code of ethics. Subsequently, CNBC reported that the United board of directors granted the CEO a $4.9 million termination settlement plus 60,000 shares of

Read More

Blind Spots: Know and Overcome Them

  What are Blind Spots Anyone who learned to drive as a teenager was warned to be aware of the blind spots between what you see in the rear view mirror and the side view mirror. As adults we hear about blind spots but in a much different context. Merriam-Webster defines one type of  blind spot as the tendency to ignore

Read More

Security Guards: Leveraging as a Resource

Benefit or Burden? Properly leveraging security guards, contract or proprietary, can have a significant and positive impact on a facility’s security program. Not properly utilized these resources can drain your security budget, increase liability, and provide for a false sense of security. The value these officers add to the business has a direct correlation to their selection, training,

Read More

Investigations: Get it Right the First Time

Understanding Investigations There is an old saying you only have one chance to make a first impression. The same can be said when conducting internal investigations. Get it right the first time using a sound and well thought out process, one that is effective and ethical. Establish this process before you are faced with a stressful

Read More