Skip to main content
Talking Threat Intelligence

Talking Threat Intelligence

By LifeRaft Inc.

Staying up to date with rapidly evolving world of corporate security requires continuous learning and adaptability. Join us every other Tuesday as we interview top experts working at the intersection of OSINT and risk management. Each episode we break down emerging threats that could impact your organization, insights into the latest technologies that can enhance security operations, and tips for exploiting threat intelligence to keep your staff, assets, and customers safe.
Available on
Apple Podcasts Logo
Google Podcasts Logo
Pocket Casts Logo
Spotify Logo
Currently playing episode

7 Steps to Debunk Online Misinformation: Melanie Trecek-King 

Talking Threat Intelligence Aug 16, 2022

00:00
26:18
Why Do Security Teams Stumble with New Tech?

Why Do Security Teams Stumble with New Tech?

In corporate security, much of the conversation revolves around exciting new technologies. From AI to drones and robots, these innovations capture the imagination of security professionals. 

But amidst the enthusiasm for these advancements, there's a notable gap in the discussion — few delve into the practicalities of effectively implementing these technologies. 

While the potential benefits are clear, challenges arise rolling out new tech across the organization, including resistance from the public, employees, or management. Overcoming these hurdles becomes crucial, as failure to do so can lead to the organization's reluctance to adopt these promising technologies.

So how do security leaders address this challenge?

This week, we're privileged to have Mark Folmer, President at Robotic Assistance Devices, join us on the podcast. In this episode, we explore the less-discussed aspects of security technology conversations, focusing on where security leaders often stumble when attempting to implement innovative technologies. 

We also discuss communication strategies to bring internal stakeholders on board, the dynamics of public resistance to new security measures, the importance of articulating the value of security initiatives to internal stakeholders, how AI can elevate security programs, the difference between evolutionary changes and true innovation, and much more. 

Resources: 

For more insights on building a successful security intelligence program, be sure to visit our blog at LifeRaftInc.com/blog. And if you enjoy these episodes, be sure to subscribe wherever you listen to the show.

Jan 23, 202425:43
The Future of Corporate Security: AI, ChatGPT, 2024 Elections, Israel/Palestine
Jan 09, 202401:31:19
OSINT for Executive Protection: Executive Privacy, Travel Security, Threat Intelligence

OSINT for Executive Protection: Executive Privacy, Travel Security, Threat Intelligence

To kickoff 2024, please enjoy this special executive protection compilation episode with Robert Baillieul.

Jan 02, 202401:28:46
OSINT Mastery for Corporate Security: Blockchain Analysis, Doxxing Attacks, Alt-Social Networks

OSINT Mastery for Corporate Security: Blockchain Analysis, Doxxing Attacks, Alt-Social Networks

To celebrate our 60th episode of Talking Threat Intelligence, please enjoy this special OSINT compilation episode with Robert Baillieul.

Dec 26, 202301:16:34
How to Gain Leadership Buy-In for Security Initiatives

How to Gain Leadership Buy-In for Security Initiatives

Corporate security professionals often find themselves in a challenging position when it comes to getting the green light for projects.Frequently, executives fail to fully grasp the real threats facing their organization, leading to underinvestment in security measures. So how can leaders address this problem? 

Alex Rodriguez, Director of the Global Security Communications Center at The Walt Disney Company, is on the show today. In this episode, Alex explains the importance of leadership buy-in in the security industry. He also shares strategies for gaining and maintaining leadership support for security initiatives, best practices for aligning expectations and clear communication with leadership, and real-world examples of projects and initiatives that benefited from leadership buy-in.

– Connect w/ Alex: Alex.Rodriguez@disney.com

For more insights on building a successful security intelligence program, be sure to visit our website at Liferaftinc.com/blog. And if you enjoy these episodes, be sure to subscribe wherever you listen to the show. 

Dec 19, 202323:47
Securing the Last Mile: Porch Piracy Solutions for Retailers

Securing the Last Mile: Porch Piracy Solutions for Retailers

After exploding during the pandemic, households have continued to turn to home delivery to shop online. Now savvy thieves see an opportunity. Criminals are prowling neighborhoods for packages to pilfer, and retailers and delivery companies are footing the bill.

So how can corporate security teams address this problem?

Ben Stickle, Ph.D., Associate Professor of Criminal Justice Administration at Middle Tennessee State University, is on the show this week. In this episode, he breaks down the alarming rise of porch piracy nationwide.

Expect to learn what makes porch piracy such an attractive crime for criminals, the surprising demographics of porch pirates, the possible physiological connection between slot machines and porch piracy, why you’re more likely to be a victim of porch piracy than any other crime in America, how much porch piracy costs businesses nationwide each year, why porch piracy impacts retail sales in the future, how consumers, retailers, and delivery companies can tackle this problem and much more.

Nov 28, 202329:14
OSINT: How to Show a Tangible ROI to Management
Nov 14, 202324:59
Why Rigid Templates Fail in Real-World Travel Security

Why Rigid Templates Fail in Real-World Travel Security

Security leaders rely extensively on policies and procedures when traveling with VIPs. But can you be too prepared? Nathan Ackerman, President and CEO of Riley Risk, is on the show this week. In this episode, he explains why sticking too rigidly to templates can lead to unexpected outcomes, how to tailor communication strategies for individual travelers, and how to prepare travel briefings clients actually read.


Resources:

* Riley Risk: https://rileyrisk.com

* Nathan Ackerman on LinkedIn: https://www.linkedin.com/in/ackermannate/


For more insights on building a successful security intelligence program, be sure to visit our website at Liferaftinc.com/blog. And if you enjoy these episodes, be sure to subscribe wherever you listen to the show.

Oct 31, 202320:59
7 Do's and Don'ts Every OSINT Analyst Must Know

7 Do's and Don'ts Every OSINT Analyst Must Know

How can OSINT analysts deliver more actionable intelligence for decision-makers? Anna G., an analyst for a large global consultancy, is on the show this week. In this episode, Anna explains the pitfalls of rushed threat intelligence reports. Listeners will also learn about the dangers of single sourcing, the importance of tailored communication plans for crisis situations, and strategies for building credibility with decision-makers. For more insights on building a successful security intelligence program, be sure to visit our website at Liferaftinc.com/blog. And if you enjoy these episodes, be sure to subscribe wherever you listen to the show.

Oct 17, 202319:55
How to Enhance Workplace Safety Training

How to Enhance Workplace Safety Training

Picture this…

You're sitting in a room during another training session, listening to someone at the front of the room drone on and on. They flip through endless pages of a binder, reading aloud monotonously. Your mind starts to wander, and before you know it, you're daydreaming about the fun things you'll do after work. Sound familiar? We've all been there!

Ensuring employees retain crucial safety information can be a real challenge for employers. Despite the best intentions, traditional training sessions often fail to engage employees effectively. When information is presented in a dry and uninspiring manner, it becomes difficult to capture attention and make the material memorable. Consequently, employees may not retain the knowledge they need to stay safe in the workplace.

The consequences of ineffective safety training sessions extend beyond employee disengagement. Poorly designed and implemented programs can cost companies a significant amount of money. When employees fail to retain crucial safety information, accidents and injuries are more likely to occur. These incidents not only harm individuals but also result in increased healthcare costs, lost productivity, and potential legal liabilities for the company.

So what’s the answer? 

On the podcast today is Dr. Tristan Casey, Director of New View Safety. In this episode, we discuss the common reasons why safety training programs often fail to engage employees. Dr. Casey will also share his insights on transforming training sessions into exciting and memorable experiences.

Resources:

Finally, if you enjoyed this episode, make sure to subscribe to the show on Apple Podcasts, Spotify, or wherever you listen to podcasts. And if you're interested in learning more about building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com.

Oct 03, 202327:15
ChatGPT and Beyond: AI's Impact on Threat Intelligence
Sep 19, 202323:41
How to Build an Effective Tech Stack for Security Teams

How to Build an Effective Tech Stack for Security Teams

Chief Security Officers (CSOs) encounter significant challenges when constructing an effective tech stack for their organization's security. These challenges include grappling with integration issues among diverse security solutions, keeping pace with rapidly evolving threats while operating within budgetary constraints, and striking a delicate balance between robust security measures and user-friendliness. Additionally, complying with stringent regulatory requirements and safeguarding data privacy further complicate the process. 


The consequences of getting the tech stack wrong can be severe, potentially leading to security vulnerabilities, data breaches, financial losses, reputational damage, and legal ramifications. It could also hinder the organization's ability to effectively defend against physical threats and stay ahead in an increasingly complicated landscape.


So how can they get it right?


John Gill, Executive Vice President at Kaseware, is on the podcast this week. In this episode, he delves into the intricacies of building an effective tech stack for security teams. He also reveals the most common mistakes CSOs make when evaluating potential solutions. 


In this episode, expect to learn...

  • The dangers of looking for the "magic solution" that solves everything.
  • How to create a structured Plan to Identify Suitable Technologies
  • The seven factors to consider when selecting security technologies
  • Picking best-of-breed technologies vs. all-in-one solutions.
  • Best Practices for merging physical and cybersecurity roles in organizations


Resources:


  • Contact John Gill by Email: john.gill@kaseware.com
  • Kaseware: https://www.kaseware.com


Finally, if you enjoyed this episode, make sure to subscribe to the show on Apple Podcasts, Spotify, or wherever you listen to podcasts. And if you're interested in learning more about building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com.

Aug 09, 202334:54
How to Protect Your Organization From Workplace Shootings

How to Protect Your Organization From Workplace Shootings

The prevalence of active shooter situations in the workplace has seen a disconcerting increase in recent years. These distressing incidents, once considered improbable within work environments, have sadly become an alarming reality. News reports continue to remind us that no workplace or industry is immune to such acts of violence. And this sobering trend has prompted companies of all sizes to prioritize employee safety by implementing comprehensive training programs aimed at equipping individuals with the skills and knowledge needed to navigate and survive active shooter events.

But while traditional survival training methods, including the widely-known run, hide, fight strategy advocated by the FBI, have been widely disseminated, they may not provide the most effective approach to ensure survival in active shooter situations. These methods, while offering some guidance, often oversimplify the complexities and realities of high-stress scenarios. So to better prepare employees, a more comprehensive, adaptable, and practical training approach is essential to address the nuanced challenges presented by active shooter incidents.

So what’s the answer?

On the show today is Michael Julian, creator of the A.L.I.V.E. Active Shooter Survival Training Program and President of MPS Security & Protection. During our discussion, he shares his unique method for surviving active shooter situations. Additionally, Michael provides insights on how security leaders can enhance the effectiveness of their training sessions and highlight common pitfalls that companies often encounter when teaching survival training to their employees.

Resources:

Finally, if you enjoyed this episode, make sure to subscribe to the show on Apple Podcasts, Spotify, or wherever you listen to podcasts. And if you're interested in learning more about building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com.

Aug 01, 202328:04
Digital Executive Protection: Keeping VIPs Safe Online

Digital Executive Protection: Keeping VIPs Safe Online

Jul 25, 202330:06
What Security Teams Need to Know About ChatGPT

What Security Teams Need to Know About ChatGPT

Imagine a world where talking to computers feels as natural as chatting with a friend. That's the power of ChatGPT, a groundbreaking technology developed by a company called OpenAI. 

This technology has already revolutionized the way we work with computers. Instead of giving them commands, we can have real conversations with them. It's like having an incredibly smart virtual assistant at our fingertips. ChatGPT understands what we say and responds in a way that makes sense. It helps us find information quickly, provides useful suggestions, and even assists with tasks like writing. With ChatGPT, the possibilities seem endless, and it has truly changed the way we interact with technology.

But corporate security teams are understandably worried. For starters, ChatGPT can be used by bad actors to create and spread false information like never before. This means that people are more likely to come across misleading or manipulated content, making it hard to separate fact from fiction online. Additionally, ChatGPT also represents the technological equivalent to the machine gun for cybercriminals, allowing them to create high quality phishing emails and develop new attack vectors like never before. 

So how do security teams address these challenges? 

In this episode, our guest Daniel Ben-Chitrit, Director of Product Management at Authentic8, breaks down what ChatGPT will mean for corporate security teams and the OSINT community. We’ll also discuss how OSINT analysts can leverage this technology effectively while maintaining security and data privacy.

In this episode, expect to learn: 

  • The implications of using ChatGPT in threat intelligence gathering and analysis.

  • Discover the potential risks and vulnerabilities associated with integrating ChatGPT into corporate systems.

  • How to effectively mitigate security threats and protect sensitive information in the era of ChatGPT.

  • Gain insights into the challenges of distinguishing between genuine and manipulated information generated by ChatGPT.

  • Understand the impact of ChatGPT on phishing and social engineering attacks, and how to combat them.

  • Explore potential vulnerabilities in existing security systems when faced with ChatGPT-generated threats.

  • Understand the potential impact of ChatGPT on user privacy and data protection in corporate environments.

  • Discover ways to educate employees about the risks and benefits of interacting with ChatGPT in a secure manner.

… and much more. 

Relevant Resources:


Finally, if you enjoyed this episode, make sure to subscribe to Talking Threat Intelligence on Apple Podcasts, Spotify, or wherever you listen to podcasts. And if you're interested in learning more about building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com.

Jul 11, 202333:41
Building Resilience as a Security Professional

Building Resilience as a Security Professional

In the high-pressure world of security, where professionals are constantly facing complex threats and demanding situations, building resilience is not just an advantage—it's a fundamental necessity. It's what empowers practitioners to bounce back from setbacks, adapt to challenges, and maintain their mental well-being amidst the pressures of the field. 

On the show today is Dr. Mary Beth Janke, a former Secret Service agent, Doctor of Clinical Psychology, and an international protection agent. Drawing from her expertise in behavioral therapy, Dr. Janke guides security professionals in developing strategies to enhance their resilience. And with her diverse background, Dr. Janke brings a unique perspective on the critical importance of resilience for success in the security industry.

By understanding the power of cognitive behavioral theory, she empowers individuals to transform their mindset, break negative thought patterns, and cultivate a resilient approach to their work and personal lives. And her insights provide practical tools and techniques to strengthen mental and emotional fortitude in the ever-changing landscape of physical security.

In this episode, expect to learn:

- The vital role of resilience in the success of security professionals.

- Exploring the connection between mental well-being and effective physical security practices.

- How behavioral therapy can be applied to enhance resilience in the field.

- Practical techniques to identify and modify negative thought patterns.

- Strategies for maintaining resilience in the face of stress and uncertainty.

- Real-life examples illustrating the transformative power of resilience in the industry.

- ...and much more.

To learn more about Dr. Mary Beth Janke and her work, visit her website at https://drmarybeth.com/, and connect with her on LinkedIn at https://www.linkedin.com/in/dr-mary-beth-wilkas-janke-88b6a565/.

Finally, if you enjoyed this episode, make sure to subscribe to Talking Threat Intelligence on Apple Podcasts, Spotify, or wherever you listen to podcasts. And if you're interested in learning more about building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com

Jun 27, 202328:04
Unveiling Digital Vulnerabilities: The Intersection of Cyber and Physical Security

Unveiling Digital Vulnerabilities: The Intersection of Cyber and Physical Security

This week, guest David Benford, managing director of Blackstage Forensics, is on the podcade. In this episode, we discuss the overlap between digital and physical security, exploring the various types of vulnerabilities businesses face in the digital realm. David shares specific examples of digital vulnerabilities he has encountered in his work and highlights the potential risks they pose to individuals and organizations. The conversation also touches upon the convergence of the cyber and digital worlds, emphasizing the need to consider both online and offline security. 

Key Takeaways:

  • Why digital vulnerabilities pose real-world security risks to businesses and individuals.

  • How personal identifying information (PII), such as home addresses, email addresses, and phone numbers, can be exposed through various channels.

  • Why digital vulnerabilities can result in blackmail, sextortion, harassment, stalking, and reputational risks.

  • How to build trust and put clients at ease during the onboarding process.

  • Common mistakes that clients make such using easily guessable email addresses and sharing personal data without fully understanding the terms and conditions.

  • How data breaches and leaks by companies can expose personal information, creating vulnerabilities.

  • Why future trends suggest an increase in privacy and security awareness, but also a rise in new types of data breaches and attacks.

  • How the advancement of artificial intelligence offers both advantages and challenges in detecting and combating threats.

If you found our discussion on threat intelligence valuable and want to dive deeper into this topic, please subscribe to our show to never miss an episode. Additionally, make sure to visit our website at LiferaftInc.com, where you'll find a wealth of resources and insights on building a successful threat intelligence program.

Jun 13, 202316:48
What OSINT Analysts Should Know About Alt Tech Social Networks

What OSINT Analysts Should Know About Alt Tech Social Networks

Alternative social networks present a growing challenge for corporate security teams. These non-traditional platforms, such as Gab and Chan boards, can pose significant threats to organizations, including cyber threats, physical threats, doxing, and misinformation campaigns. And without monitoring these communities, security analysts could be overlooking serious risks to the company. 


To address this issue, Neil Spencer, Director of Market Strategy and Partnerships at Liferaft, is back on the podcast. This week, he breaks down what alternative social networks are and how security teams can effectively monitor these platforms. In this episode you will learn:    


- Learn why monitoring smaller, obscure communities on these networks is critical for comprehensive threat intelligence.

- Understand how alternative social networks can create echo chambers and contribute to the spread of misinformation campaigns.

- Explore the importance of detecting early warnings and indicators of potential threats in the digital space.

- Find out why brand protection is becoming a crucial piece of corporate security scope.

- Hear real-world examples of how smaller, alternative social networks have provided early warnings of potential threats.

- Learn about the long history of white supremacists using these networks to post manifestos before violent events.

- Discover how monitoring these networks can help organizations get ahead of threats and plan effective mitigation strategies.

- Gain insights into the implications of a threat to an organization's brand, both financially and from a physical security perspective.

- Understand the significance of monitoring alternative social networks for both emerging and mainstream platforms.


Resources:



If you found this discussion on the importance of monitoring alternative social networks informative, please consider subscribing to our podcast on your preferred platform to stay up-to-date with our latest episodes. And if you're interested in learning more about building a successful threat intelligence program, check out the website at Liferaftinc.com for more resources and information. We appreciate your support and look forward to bringing you more valuable insights in the future.

May 23, 202324:03
OSINT on Telegram, TikTok, and Chanboards

OSINT on Telegram, TikTok, and Chanboards

Alt-tech social networks have exploded in popularity in recent years. And thanks to lax content moderation rules, these communities have become havens for criminal groups and other bad actors.

This creates new challenges for security teams.

On the one hand, many professionals may not even be aware of some of the new channels where people conjugate online. So as a result, organizations gathering open-source intelligence online could overlook serious threats to their operations.

On the other hand, alt-tech social networks present new opportunities to discover and investigate threat intelligence. This is especially true in forums and communities with relaxed content moderation guidelines.

So where should investigators and security practitioners get started?

In a recent webinar, our very own Director of Strategy and Partnerships Neil Spencer hosted a panel to explore how to collect intelligence, investigate threats, and mitigate security risks facing your organization using new alt-tech social networks. In particular, the group decided to focus on some of the largest and fastest-growing of these communities, namely Telegram, Chan Boards, and TikTok.

He was joined by Head of Intelligence at Securitas SIU, Mike Evans; Assistant Deputy Director, Intelligence Operations at Secure Community Network, Nathan Otto; and the Director of Research and Analytics at 2430 Group, Lindsay Wright.

Learn more:

* 5 Tips for Conducting OSINT on Alt-Tech Social Networks

Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.

May 09, 202356:49
OSINT for VIP Protection: The Mistakes Most Analysts Make with Chris Grow
Apr 11, 202330:38
Blockchain: The Next Frontier for OSINT Analysis with Nick Gicinto
Mar 28, 202331:39
Protecting Executives Online: Using OSINT to Thwart Doxxing Attempts with Tristan Laugher

Protecting Executives Online: Using OSINT to Thwart Doxxing Attempts with Tristan Laugher

Doxxing -- or the publication of personal information to punish or harass an individual – represents a growing problem. Even worse, potentially anyone could become a target – from executives and celebrities to frontline workers.

So how can security teams address this threat?

Tristan Laugher, Product Specialist at Liferaft Inc., is on the show this week.

In this episode, Tristan breaks down how to use OSINT to stop and mitigate doxxing online.

Expect to learn what type of threat actors employ this tactic, how doxxing put executives and other VIPs at risk, the new tactics malicious individuals use to harass targets, how security teams can protect their principal from getting doxxed, the surprising threat vector most security teams haven’t considered, what to do after your principal gets doxxed online, and much more.

Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.

And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.

Mar 14, 202322:05
What the Media Gets Wrong About Incels: Naama Kates

What the Media Gets Wrong About Incels: Naama Kates

The media often portrays incels as a serious security risk worldwide. But how much truth is there in these accusations?

Naama Kates, producer and creator of the Incel Project podcast, is on the show this week.

In this episode, she explains what are incels and examines the rapid growth of their community online.

Expect to learn what incels really believe, what is the “black pill,” how incels are often falsely connected to the “alt-right” movement, the demographic breakdown of the community, what the media gets wrong when reporting on mass shootings allegedly connected to incels, how incels fit within the broader online manosphere, and much more.

Resources:

  • Contact Naama: theincelproject@gmail.com
  • The Incel Project Podcast: https://podcasts.apple.com/ca/podcast/incel/id1469915971
  • The Incel Project on Twitter: https://twitter.com/IncelProject?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor

Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.

And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.

Feb 28, 202326:31
7 Mistakes Security Teams Make with Corporate Threat Intelligence: Kyle Baker

7 Mistakes Security Teams Make with Corporate Threat Intelligence: Kyle Baker

Sure, much has been said about the benefits of corporate threat intelligence. But what if you’re doing something wrong?

Are there a collection of common mistakes that GSOCs and security teams make when using open-sourced intelligence in their operations — mistakes that compromise the safety of people and property?

Yep.

Kyle Baker, Product Specialist here at Liferaft Inc, is on the show this week.

In this episode, Kyle reveals the seven most common mistakes organizations make when it comes to applying OSINT for corporate security.

Expect to learn the limitations of artificial intelligence, the accidental oversight that can cripple investigations, the dangerous corners of the web most security teams overlook completely, the value of building a diverse team, and much more.

Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.

And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.

Feb 14, 202324:01
The Alarming Rise of Porch Piracy: Ben Stickle, Ph.D

The Alarming Rise of Porch Piracy: Ben Stickle, Ph.D

After exploding during the pandemic, households have continued to turn to home delivery to shop online.

Now savvy thieves see an opportunity. Criminals are prowling neighborhoods for packages to pilfer, and retailers and delivery companies are footing the bill.

So how can corporate security teams address this problem?

Ben Stickle, Ph.D., Associate Professor of Criminal Justice Administration at Middle Tennessee State University, is on the show this week.

In this episode, he breaks down the alarming rise of porch piracy nationwide.

Expect to learn what makes porch piracy such an attractive crime for criminals, the surprising demographics of porch pirates, the possible physiological connection between slot machines and porch piracy, why you’re more likely to be a victim of porch piracy than any other crime in America, how much porch piracy costs businesses nationwide each year, why porch piracy impacts retail sales in the future, how consumers, retailers, and delivery companies can tackle this problem and much more.

Resources:

  • Ben Stickle: https://www.benstickle.com
  • Fighting Package Theft: https://www.benstickle.com/package-theft/

Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.

And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.

Jan 31, 202327:35
How to Hire the Right People for Your Security Team: Jerry Heying, CPP, PPS, CST
Jan 17, 202326:27
Building Teams, Proving ROI to Clients, and Growing Your Intel Function: Mike Evans, MSyI M.ISRM AMBCI

Building Teams, Proving ROI to Clients, and Growing Your Intel Function: Mike Evans, MSyI M.ISRM AMBCI

Mike Evans, MSyI M.ISRM AMBCI, Head of Intelligence at Securitas UK, is on the show this week.

In this episode, he discusses how intelligence leaders can improve and grow their function within an organization.

Expect to learn the value of soft ROI versus hard ROI, the importance of positioning yourself as a trusted advisor within a business, the ultimate sign your department has been successful, the surprising reason to try to make yourself redundant every two years, why you should strive to be a generalist over a specialist (especially early in your career, Mike’s controversial technique to eliminate bias from analysis, the common mistake most intelligence teams make in corporate security, and much more.

Resources:

  • Mike Evans on LinkedIn: https://www.linkedin.com/in/mike-evans-security/
  • Securitas UK: https://www.securitas.uk.com
  • Email Mike: Intelligence@Securitas.com

Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.

And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.

Jan 03, 202325:31
The Coming Retirement Tsunami: How to Keep Your Corporate Security Program Afloat with Scot Walker

The Coming Retirement Tsunami: How to Keep Your Corporate Security Program Afloat with Scot Walker

Welcome to the latest episode of Talking Threat Intelligence, where we sit down with security expert Scot Walker to discuss how the retirement of the Baby Boomer generation will impact corporate security.  

Scot Walker is the Principal Consultant at Walker & Associates and host of the Protective Future Podcast. With over 20 years of experience in the military, law enforcement, and corporate security, he is a leading voice on issues related to workplace security and risk management.  

In this episode, we explore why employees are increasingly leaving their employers, and how the Baby Boomer generation's retirement is reshaping the modern workplace. We delve into the security and operational challenges that high turnover rates present to organizations and discuss strategies that managers can use to prevent their top talent from leaving.  

Whether you're an executive, security leader, or just interested in the future of work, this episode has something for you. So join us as we delve into these critical and timely issues with Scot Walker, and learn how a new generation is set to reshape corporate security.   

Don't forget to subscribe to the Talking Threat Intelligence podcast to stay up-to-date on our latest episodes. And be sure to visit our website, LiferaftInc.com/blog, to learn more about building a successful threat intelligence program.

Resources:

Connect with Scot: https://www.linkedin.com/in/scotwalker1811/

Scot Walker’s Protective Future: https://www.youtube.com/c/ScotWalkersProtectiveFuture

Dec 20, 202227:09
Protecting Your Principal’s Privacy Online: Sandra Stibbards
Dec 06, 202229:16
OSINT OPSEC, Career Advice, Hiring Talent: Kelly Pereira, CISM

OSINT OPSEC, Career Advice, Hiring Talent: Kelly Pereira, CISM

Kelly Pereira, CISM, a veteran OSINT practitioner with over 20 years of experience, is on the show this week.

In this episode, she discusses the big mistakes new analysts make when they start on their OSINT journey.

Expect to learn how to practice effective operational security online, the secret to making a successful transition from law enforcement to corporate security, Kelly’s “three-point” plan for delivering high-impact intelligence to decision-makers, how to “dilute your language” to communicate better with colleagues in the private sector, the OSINT skill employers adore, the interview mistake that trips up new candidates, and much more.

Resources:

  • Kelly Pereira on LinkedIn: https://www.linkedin.com/in/kelly-pereira-cism/

Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.

And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.

Nov 22, 202224:03
OSINT for Physical Security: Chris Story, MBA
Nov 08, 202226:11
3 Ways OSINT Analysts Can Deliver Better Intelligence: James Tunkey
Oct 25, 202221:07
Taking Security From a Cost Center to a Profit Center: Alan Saquella, CPP

Taking Security From a Cost Center to a Profit Center: Alan Saquella, CPP

Oct 11, 202227:60
OSINT for Close Protection: Denida Grow
Sep 27, 202227:07
Preventing Mass Shootings in the Workplace: Drew Neckar, MBA, CPP, CHPA
Sep 13, 202228:36
The Problem with Background Checks for Pre-employment Screening: Russ Law and Yariv Lis
Aug 30, 202227:37
7 Steps to Debunk Online Misinformation: Melanie Trecek-King 

7 Steps to Debunk Online Misinformation: Melanie Trecek-King 

At Liferaft, we know from talking to hundreds of OSINT analysts that online misinformation presents a growing challenge.

Social networks make it easier than ever for fake news to spread. And we have already seen how digital misinformation can have a corrosive effect on democracies.

This presents a big problem for the OSINT community, too. After all, no one can deliver good intelligence with bad information. And this can have huge implications for those that rely on our work.

So what’s the solution?

Melanie Trecek-King, Associate Professor of Biology at Massasoit Community College, is on the show today. She has over 20 years of experience as a scientific educator teaching students about critical thinking.

In this episode, we discuss her seven-step process for debunking misinformation.

Expect to learn the three reasons why we’re prone to falling for misinformation, the simple exercise to “inoculate” yourself against fake news and misleading claims, using “lateral thinking” to quickly fact-check information online, and much more.

Resources:

Thinking is Power: https://thinkingispower.com

A Life Preserver for Staying Afloat in a Sea of Misinformation: https://skepticalinquirer.org/2022/02/a-life-preserver-for-staying-afloat-in-a-sea-of-misinformation/

How to inoculate yourself against misinformation: https://thinkingispower.com/how-to-inoculate-yourself-against-misinformation/

Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.

And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.

Aug 16, 202226:18
The Growing Value of OSINT for Strategic Intelligence: Harry Kemsley, OBE

The Growing Value of OSINT for Strategic Intelligence: Harry Kemsley, OBE

Harry Kemsley, OBE, President of Government & National Security at Janes Group, is on the show this week.

In this episode, he discusses how OSINT went from the 'poor twin' of the intelligence world to a foundational tool.

Expect to learn how experienced OSINT analysts tackle mis- and disinformation online, where to get started when building an intelligence function, recruiting tactics that can dramatically improve the quality of your team’s analysis, the biggest challenge OSINT analysts struggle with today, and much more.

Resources:

  • Janes Group: https://www.janes.com

Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.

And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.

Aug 02, 202228:39
The OSINT Skills Employers Want Right Now: Loránd Bodó

The OSINT Skills Employers Want Right Now: Loránd Bodó

What OSINT skills do employers want right now? And how can you stand out during the application process? 

At Liferaft, we know from talking to hundreds of analysts that many want to take their OSINT careers to the next level.

Unfortunately, OSINT as a profession is relatively new. So you won’t find as many clear milestones and certifications to guide your career.

That can make breaking into the field confusing for rookie analysts. And it can make things even harder for experienced practitioners trying to advance in their careers.

So what's the answer?

Loránd Bodó, an OSINT professional and the creator of OSINTJobs.com, joins the podcast this week.

In this episode, we discuss the strategies he used to break in and grow his career as an OSINT professional.

Expect to learn the biggest mistakes candidates make when starting a career in OSINT, the number one error that prevents candidates from landing their dream OSINT jobs, why networking isn’t sleazy, the top OSINT skills employers want right now, why highly advanced technical skills may not be as important as you might think, the unconventional technique anyone can do to stand out during the application process, and much more.

Resources:

  • OSINT Jobs: https://www.osint-jobs.com
  • Loránd Bodó on Twitter: https://twitter.com/lorandbodo

Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.

And if you’d like more insights on building a successful threat intelligence program, check out our resource page at LiferaftInc.com/blog.

Jul 19, 202225:03
The Future of Corporate Security: Carlos Francisco, CPP
Jul 05, 202229:21
Announcing Season 2!

Announcing Season 2!

A quick update if you're looking for new episodes.

Jun 07, 202201:12
Protecting Employees from Mail Attacks: Will Plummer

Protecting Employees from Mail Attacks: Will Plummer

Mail attacks pose a growing danger to companies, non-profits, and government agencies.

Will Plummer, CSO of RaySecur, is on the show today. In this episode, we discuss the state of mail security and the growing challenge this presents for businesses.

We also discuss:

* Which organizations are most at risk for mail attacks.

* How mail attacks will likely evolve over the coming years.

* How security leaders can best prepare for and respond to these incidents.

Resources:

RaySecur Inc.: https://raysecur.com

State of Mail Security - 2021 Annual Report: https://raysecur.com/mail-security-report-2021/

For more insights on building a successful threat intelligence program, be sure to check out the LifeRaft blog at LifeRaftInc.com.

May 24, 202223:34
The Future of Threat Intelligence: Michael McCabe
May 11, 202227:50
How to Build Alliances at Work: Scot Walker
Apr 26, 202222:37
The Future of Event Security: AJ De Rosa
Apr 12, 202220:19
Transitioning from the Military to Corporate Security: Scot Walker
Mar 29, 202221:06
Conducting More Successful Investigative Interviews: Russ Law

Conducting More Successful Investigative Interviews: Russ Law

How do you conduct effective investigative interviews?

Russ Law, CEO of Verensics, is on the show this week.

In this episode, we discuss the common mistake security practitioners, especially those with military or law-enforcement backgrounds, often make when conducting investigative interviews.

We also discuss:

* How to get people to cooperate with your investigation (even if you have no formal authority).

* Are you secretly costing your organization millions?

* The future of investigative interviews.

Links:

Connect with Russ on LinkedIn: https://www.linkedin.com/in/russlaw/

Verensics: https://verensics.com

Never miss an episode by subscribing on Spotify, Apple, or wherever else you listen to podcasts.

And for more tips on building a successful threat intelligence program, check out our website at LiferaftInc.com.

Mar 15, 202218:15
Branding Yourself as a Security Professional: Chuck Andrews, MSME, CPP
Mar 01, 202225:27
The Grayman School of Celebrity Protection: Jerry Heying, CPP, PPS, CST
Feb 15, 202227:48
Creating More Actionable Threat Intelligence: Mike Evans MSyI M.ISRM AMBCI

Creating More Actionable Threat Intelligence: Mike Evans MSyI M.ISRM AMBCI

How can analysts create more actionable threat intelligence?

Mike Evans, Head of Intelligence at Securitas UK, is on the show today.

In this episode, we discuss the biggest mistake analysts make when crafting intelligence for decision makers.

We also discuss:

* Three ways to uncover your end-users’ hidden requirements.

* Are you delivering finished intelligence or just data?

* How to create actionable threat intelligence that decision makers really value.

Links:

Connect with Mike: https://www.linkedin.com/in/mike-evans-security/

Securitas UK: https://www.securitas.uk.com

Never miss an episode by subscribing on Spotify, Apple Podcasts, or wherever else you listen to podcasts.

And for more tips on building a successful threat intelligence program, be sure to check out the LifeRaft blog at LifeRaftInc.com.

Jan 25, 202225:36