Talking Threat Intelligence
By LifeRaft Inc.
Talking Threat Intelligence Sep 19, 2023
Why Do Security Teams Stumble with New Tech?
In corporate security, much of the conversation revolves around exciting new technologies. From AI to drones and robots, these innovations capture the imagination of security professionals.
But amidst the enthusiasm for these advancements, there's a notable gap in the discussion — few delve into the practicalities of effectively implementing these technologies.
While the potential benefits are clear, challenges arise rolling out new tech across the organization, including resistance from the public, employees, or management. Overcoming these hurdles becomes crucial, as failure to do so can lead to the organization's reluctance to adopt these promising technologies.
So how do security leaders address this challenge?
This week, we're privileged to have Mark Folmer, President at Robotic Assistance Devices, join us on the podcast. In this episode, we explore the less-discussed aspects of security technology conversations, focusing on where security leaders often stumble when attempting to implement innovative technologies.
We also discuss communication strategies to bring internal stakeholders on board, the dynamics of public resistance to new security measures, the importance of articulating the value of security initiatives to internal stakeholders, how AI can elevate security programs, the difference between evolutionary changes and true innovation, and much more.
Resources:
For more insights on building a successful security intelligence program, be sure to visit our blog at LifeRaftInc.com/blog. And if you enjoy these episodes, be sure to subscribe wherever you listen to the show.
The Future of Corporate Security: AI, ChatGPT, 2024 Elections, Israel/Palestine
Over the past few years, security teams have struggled to adapt to a swath of different challenges – from soaring crime rates and geopolitical conflicts to the rise of AI. But what’s coming in 2024? To get some insight, we invited Scot Walker and Carlos Francisco, CPP, CSSP to discuss the future of corporate security. In this episode, they explain why the retirement of the baby boomer generation represents one of the biggest challenges to security leaders. We also discuss the growing threat of deepfakes, how the Israel/Palestine conflict will impact businesses far away from the warzone, what security leaders need to know about the upcoming 2024 Presidential elections, and the biggest mistakes individuals from the public sector make when transitioning to the private sector.
Resources:
The Future of Corporate Security: A Fusion of Innovation and Expertise in 2033
7 Corporate Physical Security Experts Share Their Predictions for 2024
For more insights on building a successful security intelligence program, be sure to visit our blog at LifeRaftInc.com/blog. And if you enjoy these episodes, be sure to subscribe wherever you listen to the show.
OSINT for Executive Protection: Executive Privacy, Travel Security, Threat Intelligence
To kickoff 2024, please enjoy this special executive protection compilation episode with Robert Baillieul.
OSINT Mastery for Corporate Security: Blockchain Analysis, Doxxing Attacks, Alt-Social Networks
To celebrate our 60th episode of Talking Threat Intelligence, please enjoy this special OSINT compilation episode with Robert Baillieul.
How to Gain Leadership Buy-In for Security Initiatives
Corporate security professionals often find themselves in a challenging position when it comes to getting the green light for projects.Frequently, executives fail to fully grasp the real threats facing their organization, leading to underinvestment in security measures. So how can leaders address this problem?
Alex Rodriguez, Director of the Global Security Communications Center at The Walt Disney Company, is on the show today. In this episode, Alex explains the importance of leadership buy-in in the security industry. He also shares strategies for gaining and maintaining leadership support for security initiatives, best practices for aligning expectations and clear communication with leadership, and real-world examples of projects and initiatives that benefited from leadership buy-in.
– Connect w/ Alex: Alex.Rodriguez@disney.com
For more insights on building a successful security intelligence program, be sure to visit our website at Liferaftinc.com/blog. And if you enjoy these episodes, be sure to subscribe wherever you listen to the show.
Securing the Last Mile: Porch Piracy Solutions for Retailers
After exploding during the pandemic, households have continued to turn to home delivery to shop online. Now savvy thieves see an opportunity. Criminals are prowling neighborhoods for packages to pilfer, and retailers and delivery companies are footing the bill.
So how can corporate security teams address this problem?
Ben Stickle, Ph.D., Associate Professor of Criminal Justice Administration at Middle Tennessee State University, is on the show this week. In this episode, he breaks down the alarming rise of porch piracy nationwide.
Expect to learn what makes porch piracy such an attractive crime for criminals, the surprising demographics of porch pirates, the possible physiological connection between slot machines and porch piracy, why you’re more likely to be a victim of porch piracy than any other crime in America, how much porch piracy costs businesses nationwide each year, why porch piracy impacts retail sales in the future, how consumers, retailers, and delivery companies can tackle this problem and much more.
OSINT: How to Show a Tangible ROI to Management
How do you convince senior leadership on the value of open source intelligence? Malte Roschinski and Moritz Schramm from Plan4Risk are on the show today. In this episode, they share their approach to demonstrating the value of OSINT to decision makers. We also explore the consequences of not having management buy-in for threat intelligence, how to prove a tangible ROI with OSINT, as well as the differences in the understanding of threat intelligence in various countries.
– Plan4Risk: https://www.plan4risk.com/start-en/
For more insights on building a successful security intelligence program, be sure to visit our website at Liferaftinc.com/blog. And if you enjoy these episodes, be sure to subscribe wherever you listen to the show.
Why Rigid Templates Fail in Real-World Travel Security
Security leaders rely extensively on policies and procedures when traveling with VIPs. But can you be too prepared? Nathan Ackerman, President and CEO of Riley Risk, is on the show this week. In this episode, he explains why sticking too rigidly to templates can lead to unexpected outcomes, how to tailor communication strategies for individual travelers, and how to prepare travel briefings clients actually read.
Resources:
* Riley Risk: https://rileyrisk.com
* Nathan Ackerman on LinkedIn: https://www.linkedin.com/in/ackermannate/
For more insights on building a successful security intelligence program, be sure to visit our website at Liferaftinc.com/blog. And if you enjoy these episodes, be sure to subscribe wherever you listen to the show.
7 Do's and Don'ts Every OSINT Analyst Must Know
How can OSINT analysts deliver more actionable intelligence for decision-makers? Anna G., an analyst for a large global consultancy, is on the show this week. In this episode, Anna explains the pitfalls of rushed threat intelligence reports. Listeners will also learn about the dangers of single sourcing, the importance of tailored communication plans for crisis situations, and strategies for building credibility with decision-makers. For more insights on building a successful security intelligence program, be sure to visit our website at Liferaftinc.com/blog. And if you enjoy these episodes, be sure to subscribe wherever you listen to the show.
How to Enhance Workplace Safety Training
Picture this…
You're sitting in a room during another training session, listening to someone at the front of the room drone on and on. They flip through endless pages of a binder, reading aloud monotonously. Your mind starts to wander, and before you know it, you're daydreaming about the fun things you'll do after work. Sound familiar? We've all been there!
Ensuring employees retain crucial safety information can be a real challenge for employers. Despite the best intentions, traditional training sessions often fail to engage employees effectively. When information is presented in a dry and uninspiring manner, it becomes difficult to capture attention and make the material memorable. Consequently, employees may not retain the knowledge they need to stay safe in the workplace.
The consequences of ineffective safety training sessions extend beyond employee disengagement. Poorly designed and implemented programs can cost companies a significant amount of money. When employees fail to retain crucial safety information, accidents and injuries are more likely to occur. These incidents not only harm individuals but also result in increased healthcare costs, lost productivity, and potential legal liabilities for the company.
So what’s the answer?
On the podcast today is Dr. Tristan Casey, Director of New View Safety. In this episode, we discuss the common reasons why safety training programs often fail to engage employees. Dr. Casey will also share his insights on transforming training sessions into exciting and memorable experiences.
Resources:
- Dr. Tristan Casey: https://www.linkedin.com/in/dr-tristan-casey-0a26804/
- New View Safety: https://thenewview.com.au/
Finally, if you enjoyed this episode, make sure to subscribe to the show on Apple Podcasts, Spotify, or wherever you listen to podcasts. And if you're interested in learning more about building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com.
ChatGPT and Beyond: AI's Impact on Threat Intelligence
Are AI-driven threats lurking within your organization's walls? Liferaft’s Chief Innovation Officer Eduardo Capouya and Senior Vice President of Engineering Matt Hogan join us on the show today. In this episode, Matt and Eduardo delve into the pressing challenges companies face, particularly regarding privacy, security, and ethical concerns in the era of AI. They reveal the risks associated with the use of AI models like ChatGPT, such as the unintentional disclosure of sensitive information and the potential for biased decision-making.
Resources mentioned in this episode:
LifeRaft Labs: https://liferaftlabs.com/
OpenAI: https://openai.com/
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever else you listen to these episodes. And if you’d like more insights on building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com/blog.
How to Build an Effective Tech Stack for Security Teams
Chief Security Officers (CSOs) encounter significant challenges when constructing an effective tech stack for their organization's security. These challenges include grappling with integration issues among diverse security solutions, keeping pace with rapidly evolving threats while operating within budgetary constraints, and striking a delicate balance between robust security measures and user-friendliness. Additionally, complying with stringent regulatory requirements and safeguarding data privacy further complicate the process.
The consequences of getting the tech stack wrong can be severe, potentially leading to security vulnerabilities, data breaches, financial losses, reputational damage, and legal ramifications. It could also hinder the organization's ability to effectively defend against physical threats and stay ahead in an increasingly complicated landscape.
So how can they get it right?
John Gill, Executive Vice President at Kaseware, is on the podcast this week. In this episode, he delves into the intricacies of building an effective tech stack for security teams. He also reveals the most common mistakes CSOs make when evaluating potential solutions.
In this episode, expect to learn...
- The dangers of looking for the "magic solution" that solves everything.
- How to create a structured Plan to Identify Suitable Technologies
- The seven factors to consider when selecting security technologies
- Picking best-of-breed technologies vs. all-in-one solutions.
- Best Practices for merging physical and cybersecurity roles in organizations
Resources:
- Contact John Gill by Email: john.gill@kaseware.com
- Kaseware: https://www.kaseware.com
Finally, if you enjoyed this episode, make sure to subscribe to the show on Apple Podcasts, Spotify, or wherever you listen to podcasts. And if you're interested in learning more about building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com.
How to Protect Your Organization From Workplace Shootings
The prevalence of active shooter situations in the workplace has seen a disconcerting increase in recent years. These distressing incidents, once considered improbable within work environments, have sadly become an alarming reality. News reports continue to remind us that no workplace or industry is immune to such acts of violence. And this sobering trend has prompted companies of all sizes to prioritize employee safety by implementing comprehensive training programs aimed at equipping individuals with the skills and knowledge needed to navigate and survive active shooter events.
But while traditional survival training methods, including the widely-known run, hide, fight strategy advocated by the FBI, have been widely disseminated, they may not provide the most effective approach to ensure survival in active shooter situations. These methods, while offering some guidance, often oversimplify the complexities and realities of high-stress scenarios. So to better prepare employees, a more comprehensive, adaptable, and practical training approach is essential to address the nuanced challenges presented by active shooter incidents.
So what’s the answer?
On the show today is Michael Julian, creator of the A.L.I.V.E. Active Shooter Survival Training Program and President of MPS Security & Protection. During our discussion, he shares his unique method for surviving active shooter situations. Additionally, Michael provides insights on how security leaders can enhance the effectiveness of their training sessions and highlight common pitfalls that companies often encounter when teaching survival training to their employees.
Resources:
ALIVE Active Shooter Survival: www.alivetraining.com
Michael Julian on LinkedIn: www.linkedin.com/michaeljulian
Finally, if you enjoyed this episode, make sure to subscribe to the show on Apple Podcasts, Spotify, or wherever you listen to podcasts. And if you're interested in learning more about building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com.
Digital Executive Protection: Keeping VIPs Safe Online
High-profile individuals are increasingly exposed to various online threats that can jeopardize their personal security, reputation, and the organizations they represent. The digital realm has become a playground for attackers seeking to exploit vulnerabilities and gather sensitive information about VIPs for malicious purposes. So what can security professionals do to mitigate this risk?
In our latest podcast episode, we sit down with Ben Barrontine, VP of Executive Services at 360 Privacy. In our conversation, Ben sheds light on the growing threats executives face online and offers insights into effective strategies for safeguarding their digital presence.
In this episode, expect to learn...
- Why staying off social media won't keep your data safe.
- A glimpse into the mindset and techniques used by online attackers.
- The growing importance of digital intelligence in physical security.
- The biggest vulnerability of almost every VIP.
- The four pillars of staying safe online.
...and much more.
Resources Mentioned
- Email Ben: info@360privacy.io
- Ben on LinkedIn: https://www.linkedin.com/in/benjaminbarrontine/
- 360 Privacy: https://www.360privacy.io
Finally, if you enjoyed this episode, make sure to subscribe to Talking Threat Intelligence on Apple Podcasts, Spotify, or wherever you listen to podcasts. And if you're interested in learning more about building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com.
What Security Teams Need to Know About ChatGPT
Imagine a world where talking to computers feels as natural as chatting with a friend. That's the power of ChatGPT, a groundbreaking technology developed by a company called OpenAI.
This technology has already revolutionized the way we work with computers. Instead of giving them commands, we can have real conversations with them. It's like having an incredibly smart virtual assistant at our fingertips. ChatGPT understands what we say and responds in a way that makes sense. It helps us find information quickly, provides useful suggestions, and even assists with tasks like writing. With ChatGPT, the possibilities seem endless, and it has truly changed the way we interact with technology.
But corporate security teams are understandably worried. For starters, ChatGPT can be used by bad actors to create and spread false information like never before. This means that people are more likely to come across misleading or manipulated content, making it hard to separate fact from fiction online. Additionally, ChatGPT also represents the technological equivalent to the machine gun for cybercriminals, allowing them to create high quality phishing emails and develop new attack vectors like never before.
So how do security teams address these challenges?
In this episode, our guest Daniel Ben-Chitrit, Director of Product Management at Authentic8, breaks down what ChatGPT will mean for corporate security teams and the OSINT community. We’ll also discuss how OSINT analysts can leverage this technology effectively while maintaining security and data privacy.
In this episode, expect to learn:
The implications of using ChatGPT in threat intelligence gathering and analysis.
Discover the potential risks and vulnerabilities associated with integrating ChatGPT into corporate systems.
How to effectively mitigate security threats and protect sensitive information in the era of ChatGPT.
Gain insights into the challenges of distinguishing between genuine and manipulated information generated by ChatGPT.
Understand the impact of ChatGPT on phishing and social engineering attacks, and how to combat them.
Explore potential vulnerabilities in existing security systems when faced with ChatGPT-generated threats.
Understand the potential impact of ChatGPT on user privacy and data protection in corporate environments.
Discover ways to educate employees about the risks and benefits of interacting with ChatGPT in a secure manner.
… and much more.
Relevant Resources:
Authentic8: authentic8.com
Email Daniel: dbchitrit@authentic8.com
Daniel on LinkedIn: https://www.linkedin.com/in/danielbenchitrit/
Try ChatGPT for Free: https://chat.openai.com/
Sentinel-1: https://www.sentinelone.com/
- Joe Rogan Interviews Justin Trudeau: https://www.youtube.com/watch?v=K0YRNS0FYTQ
Finally, if you enjoyed this episode, make sure to subscribe to Talking Threat Intelligence on Apple Podcasts, Spotify, or wherever you listen to podcasts. And if you're interested in learning more about building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com.
Building Resilience as a Security Professional
In the high-pressure world of security, where professionals are constantly facing complex threats and demanding situations, building resilience is not just an advantage—it's a fundamental necessity. It's what empowers practitioners to bounce back from setbacks, adapt to challenges, and maintain their mental well-being amidst the pressures of the field.
On the show today is Dr. Mary Beth Janke, a former Secret Service agent, Doctor of Clinical Psychology, and an international protection agent. Drawing from her expertise in behavioral therapy, Dr. Janke guides security professionals in developing strategies to enhance their resilience. And with her diverse background, Dr. Janke brings a unique perspective on the critical importance of resilience for success in the security industry.
By understanding the power of cognitive behavioral theory, she empowers individuals to transform their mindset, break negative thought patterns, and cultivate a resilient approach to their work and personal lives. And her insights provide practical tools and techniques to strengthen mental and emotional fortitude in the ever-changing landscape of physical security.
In this episode, expect to learn:
- The vital role of resilience in the success of security professionals.
- Exploring the connection between mental well-being and effective physical security practices.
- How behavioral therapy can be applied to enhance resilience in the field.
- Practical techniques to identify and modify negative thought patterns.
- Strategies for maintaining resilience in the face of stress and uncertainty.
- Real-life examples illustrating the transformative power of resilience in the industry.
- ...and much more.
To learn more about Dr. Mary Beth Janke and her work, visit her website at https://drmarybeth.com/, and connect with her on LinkedIn at https://www.linkedin.com/in/dr-mary-beth-wilkas-janke-88b6a565/.
Finally, if you enjoyed this episode, make sure to subscribe to Talking Threat Intelligence on Apple Podcasts, Spotify, or wherever you listen to podcasts. And if you're interested in learning more about building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com.
Unveiling Digital Vulnerabilities: The Intersection of Cyber and Physical Security
This week, guest David Benford, managing director of Blackstage Forensics, is on the podcade. In this episode, we discuss the overlap between digital and physical security, exploring the various types of vulnerabilities businesses face in the digital realm. David shares specific examples of digital vulnerabilities he has encountered in his work and highlights the potential risks they pose to individuals and organizations. The conversation also touches upon the convergence of the cyber and digital worlds, emphasizing the need to consider both online and offline security.
Key Takeaways:
Why digital vulnerabilities pose real-world security risks to businesses and individuals.
How personal identifying information (PII), such as home addresses, email addresses, and phone numbers, can be exposed through various channels.
Why digital vulnerabilities can result in blackmail, sextortion, harassment, stalking, and reputational risks.
How to build trust and put clients at ease during the onboarding process.
Common mistakes that clients make such using easily guessable email addresses and sharing personal data without fully understanding the terms and conditions.
How data breaches and leaks by companies can expose personal information, creating vulnerabilities.
Why future trends suggest an increase in privacy and security awareness, but also a rise in new types of data breaches and attacks.
How the advancement of artificial intelligence offers both advantages and challenges in detecting and combating threats.
If you found our discussion on threat intelligence valuable and want to dive deeper into this topic, please subscribe to our show to never miss an episode. Additionally, make sure to visit our website at LiferaftInc.com, where you'll find a wealth of resources and insights on building a successful threat intelligence program.
What OSINT Analysts Should Know About Alt Tech Social Networks
Alternative social networks present a growing challenge for corporate security teams. These non-traditional platforms, such as Gab and Chan boards, can pose significant threats to organizations, including cyber threats, physical threats, doxing, and misinformation campaigns. And without monitoring these communities, security analysts could be overlooking serious risks to the company.
To address this issue, Neil Spencer, Director of Market Strategy and Partnerships at Liferaft, is back on the podcast. This week, he breaks down what alternative social networks are and how security teams can effectively monitor these platforms. In this episode you will learn:
- Learn why monitoring smaller, obscure communities on these networks is critical for comprehensive threat intelligence.
- Understand how alternative social networks can create echo chambers and contribute to the spread of misinformation campaigns.
- Explore the importance of detecting early warnings and indicators of potential threats in the digital space.
- Find out why brand protection is becoming a crucial piece of corporate security scope.
- Hear real-world examples of how smaller, alternative social networks have provided early warnings of potential threats.
- Learn about the long history of white supremacists using these networks to post manifestos before violent events.
- Discover how monitoring these networks can help organizations get ahead of threats and plan effective mitigation strategies.
- Gain insights into the implications of a threat to an organization's brand, both financially and from a physical security perspective.
- Understand the significance of monitoring alternative social networks for both emerging and mainstream platforms.
Resources:
- Neil Spencer on LinkedIn
- Bellingcat
- TechCrunch
- Authentic8
- 5 Alt-Tech Social Networks You Need to Know
If you found this discussion on the importance of monitoring alternative social networks informative, please consider subscribing to our podcast on your preferred platform to stay up-to-date with our latest episodes. And if you're interested in learning more about building a successful threat intelligence program, check out the website at Liferaftinc.com for more resources and information. We appreciate your support and look forward to bringing you more valuable insights in the future.
OSINT on Telegram, TikTok, and Chanboards
Alt-tech social networks have exploded in popularity in recent years. And thanks to lax content moderation rules, these communities have become havens for criminal groups and other bad actors.
This creates new challenges for security teams.
On the one hand, many professionals may not even be aware of some of the new channels where people conjugate online. So as a result, organizations gathering open-source intelligence online could overlook serious threats to their operations.
On the other hand, alt-tech social networks present new opportunities to discover and investigate threat intelligence. This is especially true in forums and communities with relaxed content moderation guidelines.
So where should investigators and security practitioners get started?
In a recent webinar, our very own Director of Strategy and Partnerships Neil Spencer hosted a panel to explore how to collect intelligence, investigate threats, and mitigate security risks facing your organization using new alt-tech social networks. In particular, the group decided to focus on some of the largest and fastest-growing of these communities, namely Telegram, Chan Boards, and TikTok.
He was joined by Head of Intelligence at Securitas SIU, Mike Evans; Assistant Deputy Director, Intelligence Operations at Secure Community Network, Nathan Otto; and the Director of Research and Analytics at 2430 Group, Lindsay Wright.
Learn more:
* 5 Tips for Conducting OSINT on Alt-Tech Social Networks
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.
OSINT for VIP Protection: The Mistakes Most Analysts Make with Chris Grow
On this episode of Talking Threat Intelligence, we're joined by Chris Grow, Managing Partner at LeMareschal LLC, to discuss the common mistakes that OSINT analysts make when providing intelligence for VIP protection. Chris is an expert in the field of open-source intelligence and has years of experience working with close protection teams. He'll be sharing his insights on the most frequent errors that analysts make, as well as strategies to minimize the risk of failure.
Some of the key topics we'll be covering include: how your bias as an American can negatively impact the intelligence you provide to an agent in the field, misconceptions about OSINT, the dangers of providing too much information for EP personnel on the ground, and how OSINT analysts should prepare before their VIP departs for a trip. Chris will also discuss how he vets potential new employees and common red flags to look for during the interview process.
Resources:
Don't miss this enlightening episode! Join the conversation and subscribe to Talking Threat Intelligence now. And if you're interested in learning more about building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com/blog.
Blockchain: The Next Frontier for OSINT Analysis with Nick Gicinto
In this episode of our podcast, we're thrilled to have Nick Gicinto, Executive Vice President at Red Five Security, join us. Nick is a highly experienced OSINT analyst and security practitioner, and he's here to discuss the importance of learning how to conduct investigations on the blockchain for threat intelligence professionals.
Nick will explain how blockchain technology is rapidly evolving and becoming more important to our understanding of the current threat landscape. He'll delve into how blockchain can be used to investigate a wide range of activities, from financial fraud to cyberattacks. And we'll explain how OSINT analysts can use blockchain to access a wealth of information that would otherwise be hidden from view.
Additionally, Nick will provide some tips and tricks to help OSINT analysts get started with blockchain investigations, including resources, tools, and important concepts to understand.
Resources:
Don't forget to subscribe to the show to make sure you never miss an episode, and to keep updated with the latest developments in threat intelligence and blockchain investigations. And if you're interested in learning more about building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com/blog.
Protecting Executives Online: Using OSINT to Thwart Doxxing Attempts with Tristan Laugher
Doxxing -- or the publication of personal information to punish or harass an individual – represents a growing problem. Even worse, potentially anyone could become a target – from executives and celebrities to frontline workers.
So how can security teams address this threat?
Tristan Laugher, Product Specialist at Liferaft Inc., is on the show this week.
In this episode, Tristan breaks down how to use OSINT to stop and mitigate doxxing online.
Expect to learn what type of threat actors employ this tactic, how doxxing put executives and other VIPs at risk, the new tactics malicious individuals use to harass targets, how security teams can protect their principal from getting doxxed, the surprising threat vector most security teams haven’t considered, what to do after your principal gets doxxed online, and much more.
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.
And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.
What the Media Gets Wrong About Incels: Naama Kates
The media often portrays incels as a serious security risk worldwide. But how much truth is there in these accusations?
Naama Kates, producer and creator of the Incel Project podcast, is on the show this week.
In this episode, she explains what are incels and examines the rapid growth of their community online.
Expect to learn what incels really believe, what is the “black pill,” how incels are often falsely connected to the “alt-right” movement, the demographic breakdown of the community, what the media gets wrong when reporting on mass shootings allegedly connected to incels, how incels fit within the broader online manosphere, and much more.
Resources:
- Contact Naama: theincelproject@gmail.com
- The Incel Project Podcast: https://podcasts.apple.com/ca/podcast/incel/id1469915971
- The Incel Project on Twitter: https://twitter.com/IncelProject?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.
And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.
7 Mistakes Security Teams Make with Corporate Threat Intelligence: Kyle Baker
Sure, much has been said about the benefits of corporate threat intelligence. But what if you’re doing something wrong?
Are there a collection of common mistakes that GSOCs and security teams make when using open-sourced intelligence in their operations — mistakes that compromise the safety of people and property?
Yep.
Kyle Baker, Product Specialist here at Liferaft Inc, is on the show this week.
In this episode, Kyle reveals the seven most common mistakes organizations make when it comes to applying OSINT for corporate security.
Expect to learn the limitations of artificial intelligence, the accidental oversight that can cripple investigations, the dangerous corners of the web most security teams overlook completely, the value of building a diverse team, and much more.
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.
And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.
The Alarming Rise of Porch Piracy: Ben Stickle, Ph.D
After exploding during the pandemic, households have continued to turn to home delivery to shop online.
Now savvy thieves see an opportunity. Criminals are prowling neighborhoods for packages to pilfer, and retailers and delivery companies are footing the bill.
So how can corporate security teams address this problem?
Ben Stickle, Ph.D., Associate Professor of Criminal Justice Administration at Middle Tennessee State University, is on the show this week.
In this episode, he breaks down the alarming rise of porch piracy nationwide.
Expect to learn what makes porch piracy such an attractive crime for criminals, the surprising demographics of porch pirates, the possible physiological connection between slot machines and porch piracy, why you’re more likely to be a victim of porch piracy than any other crime in America, how much porch piracy costs businesses nationwide each year, why porch piracy impacts retail sales in the future, how consumers, retailers, and delivery companies can tackle this problem and much more.
Resources:
- Ben Stickle: https://www.benstickle.com
- Fighting Package Theft: https://www.benstickle.com/package-theft/
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.
And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.
How to Hire the Right People for Your Security Team: Jerry Heying, CPP, PPS, CST
Over the course of interviewing dozens of security leaders on this podcast, one of my favorite questions is, “How do you hire?”
Their answers always provide a great insight. That’s because after interviewing countless job candidates, they’ve learned the best approaches to help them figure out how a person really ticks. And more importantly, whether they will work well on their team.
Jerry Heying, CPP, PPS, CST, CEO at International Protection Group, is on the show this week.
In this episode, he breaks down the techniques he uses to identify top talent and hire the right people for his close protection details.
Expect to learn the key personality trait every protector needs to succeed in the private-sector, the biggest red flags to look for when interviewing candidates, the job interview question every hiring manager should ask, how to sniff out misleading accomplishments on a resume, the type of great candidates security managers often overlook, and much more.
Resources:
International Protection Group: www.IPGcompany.com
Executive Protection Institute: https://www.personalprotection.com
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.
And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.
Building Teams, Proving ROI to Clients, and Growing Your Intel Function: Mike Evans, MSyI M.ISRM AMBCI
Mike Evans, MSyI M.ISRM AMBCI, Head of Intelligence at Securitas UK, is on the show this week.
In this episode, he discusses how intelligence leaders can improve and grow their function within an organization.
Expect to learn the value of soft ROI versus hard ROI, the importance of positioning yourself as a trusted advisor within a business, the ultimate sign your department has been successful, the surprising reason to try to make yourself redundant every two years, why you should strive to be a generalist over a specialist (especially early in your career, Mike’s controversial technique to eliminate bias from analysis, the common mistake most intelligence teams make in corporate security, and much more.
Resources:
- Mike Evans on LinkedIn: https://www.linkedin.com/in/mike-evans-security/
- Securitas UK: https://www.securitas.uk.com
- Email Mike: Intelligence@Securitas.com
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.
And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.
The Coming Retirement Tsunami: How to Keep Your Corporate Security Program Afloat with Scot Walker
Welcome to the latest episode of Talking Threat Intelligence, where we sit down with security expert Scot Walker to discuss how the retirement of the Baby Boomer generation will impact corporate security.
Scot Walker is the Principal Consultant at Walker & Associates and host of the Protective Future Podcast. With over 20 years of experience in the military, law enforcement, and corporate security, he is a leading voice on issues related to workplace security and risk management.
In this episode, we explore why employees are increasingly leaving their employers, and how the Baby Boomer generation's retirement is reshaping the modern workplace. We delve into the security and operational challenges that high turnover rates present to organizations and discuss strategies that managers can use to prevent their top talent from leaving.
Whether you're an executive, security leader, or just interested in the future of work, this episode has something for you. So join us as we delve into these critical and timely issues with Scot Walker, and learn how a new generation is set to reshape corporate security.
Don't forget to subscribe to the Talking Threat Intelligence podcast to stay up-to-date on our latest episodes. And be sure to visit our website, LiferaftInc.com/blog, to learn more about building a successful threat intelligence program.
Resources:
Connect with Scot: https://www.linkedin.com/in/scotwalker1811/
Scot Walker’s Protective Future: https://www.youtube.com/c/ScotWalkersProtectiveFuture
Protecting Your Principal’s Privacy Online: Sandra Stibbards
Sandra Stibbards, Owner & President of Camelot Investigations, is on the show to chat about executive privacy.
In this episode, we discuss what close protection teams need to know about protecting their principal’s personal information online.
You will learn how seemingly harmless bits of metadata can leave executives and other VIPs vulnerable to attackers, what you should tell clients to absolutely never post on social media, the one thing analysts should do every week to keep principals safe, a simple trick that can dramatically reduce the venerability of your LinkedIn account, free OSINT tools to monitor for doxxings and other data leaks online, and much more.
Resources:
Email Sandra: sandra@CamelotInvestigations.com
Camelot Investigations: CamelotInvestigations.com
Open Source Intelligence Training: https://opensourceintelligencetraining.org
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.
And if you’d like more insights on building a successful threat intelligence program, be sure to check out our blog at LiferaftInc.com/blog.
OSINT OPSEC, Career Advice, Hiring Talent: Kelly Pereira, CISM
Kelly Pereira, CISM, a veteran OSINT practitioner with over 20 years of experience, is on the show this week.
In this episode, she discusses the big mistakes new analysts make when they start on their OSINT journey.
Expect to learn how to practice effective operational security online, the secret to making a successful transition from law enforcement to corporate security, Kelly’s “three-point” plan for delivering high-impact intelligence to decision-makers, how to “dilute your language” to communicate better with colleagues in the private sector, the OSINT skill employers adore, the interview mistake that trips up new candidates, and much more.
Resources:
- Kelly Pereira on LinkedIn: https://www.linkedin.com/in/kelly-pereira-cism/
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.
And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.
OSINT for Physical Security: Chris Story, MBA
Chris Story, Director of Risk Intelligence & Security Consulting at Triumph Protection Group, is on the show this week.
In this episode, he discusses applications for open source intelligence in physical security and investigations.
Expect to learn where to get started with OSINT for physical security, the strengths and limitations of OSINT, the common mistake that trips up new OSINT practitioners, and much more.
Resources:
Chris on LinkedIn: https://www.linkedin.com/in/chris-story-securityriskintelligenceleadership/
Triumph Protection Group: https://triumphprotection.com
Conversations in Close Protection: https://www.conversationsincloseprotection.com
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.
And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.
3 Ways OSINT Analysts Can Deliver Better Intelligence: James Tunkey
James Tunkey, Chief Operating Officer of I-OnAsia, is on the show this week.
In this episode, James reveals three key things he believes every OSINT analyst should start doing to deliver better risk intelligence for clients.
Expect to learn the biggest opportunity for OSINT analysts to differentiate themselves in the marketplace right now, the benefit of adding individuals with an insurance or finance background to an OSINT team, why OSINT analysts need to focus more on preparing for “non-routine” events, the key mistake that can sabotage your analysis, and much more.
Resources:
- James Tunkey on LinkedIn: https://www.linkedin.com/in/jamestunkey/
- I-OnAsia: https://www.ionasia.com.hk
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.
And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.
Taking Security From a Cost Center to a Profit Center: Alan Saquella, CPP
Security departments have long had the reputation of being cost centers inside organizations.
That makes it tough for managers and directors to ask for more budget. And their departments are often the first to see budget cuts during a recession.
So how can security leaders avoid this problem?
Alan Saquella, CPP, professor of Business, Security, and Intelligence at Embry-Riddle Aeronautical University in Arizona and a consultant for Verensics, joins the podcast this week.
In this episode, we discuss his strategies to transform the security function at Cox Communications from a cost center to revenue neutral and beyond.
Expect to learn the dangers of being a cost center within an organization, the first thing you should do before asking executives for additional budget, the importance of learning the language of business, how to demonstrate the ROI of your corporate security program, and much more.
Resources:
- Taking Security From a Cost Center to Cost Neutral and Beyond: https://www.securitymagazine.com/articles/98138-transforming-security-from-cost-center-to-value-add
- Alan Saquella, CPP: https://www.linkedin.com/in/alan-saquella-cpp/
- Verensics: https://verensics.com
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.
And if you’d like more insights on building a successful threat intelligence program, check out our resource page at LiferaftInc.com/blog. That’s LiferaftInc.com/blog.
OSINT for Close Protection: Denida Grow
Open-source intelligence, or OSINT, has become an increasingly important tool for close protection details. But because many intelligence analysts have never worked in the field, some struggle to provide the actionable insights needed to keep clients safe.
So how can we address this problem?
Denida Grow, Founder & CEO Athena Worldwide and Nannyguards as well as Managing Partner at LeMareschal LLC, is on the show this week.
In this episode, she breaks down the communication gap that exists between OSINT analysts and close protection teams on the ground.
Expect to learn what every OSINT analyst should do before working with an EP team, the danger of sending too much information to agents on the ground, what protectors on the ground probably won’t tell you, the common OSINT mistakes that compromise client safety, the number one trait of top OSINT analysts, how biases can jeopardize security, one of the biggest problems across the security industry today, and much more.
Resources:
- Denida Zinxhiria Grow: linkedin.com/in/denida-grow
- Athena Worldwide: https://www.athenaworldwide.com
- Nannyguards: https://www.nannyguards.com
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.
And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.
Preventing Mass Shootings in the Workplace: Drew Neckar, MBA, CPP, CHPA
Mass shootings in the workplace have become more frequent in recent years. And with employees returning to the office following the COVID pandemic, we’ve seen a spike in violent incidences.
So how can security teams proactively address this problem?
Drew Neckar, MBA, CPP, CHPA, President and Principal Consultant at Security Advisors Consulting Group, is on the show this week.
In this episode, Drew reveals the lessons learned from an incident where he and his team successfully prevented a mass shooting incident.
Expect to learn the importance of teaching ordinary employees how to spot suspicious behavior, the mistake most organizations make when providing security awareness training, the value of environmental design in preventing workplace violence, and much more.
Resources:
- Drew Neckar on LinkedIn: https://www.linkedin.com/in/carlosfranciscocpp/
- Security Advisors Consulting Group: https://www.securityadvisorcg.com
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.
And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.
The Problem with Background Checks for Pre-employment Screening: Russ Law and Yariv Lis
Background checks represent the go-to method most organizations use to screen out unethical employees. But due to a growing number of problems, this system has started to fail employers.
Russ Law and Yariv Lis, co-founders of Verensics, are on the show this week.
In this episode, they explain the broken system behind background checks and why this technique fails to screen out problematic workers.
Expect to learn why companies have no incentive to report workplace incidents, the importance of talking about ethics upfront in the interview process, the mistake almost all hiring managers make that can cost their organizations millions, how to set up a structured interview to screen out unethical employees, the best indicators that a candidate will be successful in their new role, and much more.
Resources:
- Russ Law on LinkedIn: https://www.linkedin.com/in/russlaw/
- Yariv Lis on LinkedIn: https://www.linkedin.com/in/yariv-lis-881b43184/
- Verensics: https://verensics.com
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.
And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.
7 Steps to Debunk Online Misinformation: Melanie Trecek-King
At Liferaft, we know from talking to hundreds of OSINT analysts that online misinformation presents a growing challenge.
Social networks make it easier than ever for fake news to spread. And we have already seen how digital misinformation can have a corrosive effect on democracies.
This presents a big problem for the OSINT community, too. After all, no one can deliver good intelligence with bad information. And this can have huge implications for those that rely on our work.
So what’s the solution?
Melanie Trecek-King, Associate Professor of Biology at Massasoit Community College, is on the show today. She has over 20 years of experience as a scientific educator teaching students about critical thinking.
In this episode, we discuss her seven-step process for debunking misinformation.
Expect to learn the three reasons why we’re prone to falling for misinformation, the simple exercise to “inoculate” yourself against fake news and misleading claims, using “lateral thinking” to quickly fact-check information online, and much more.
Resources:
Thinking is Power: https://thinkingispower.com
A Life Preserver for Staying Afloat in a Sea of Misinformation: https://skepticalinquirer.org/2022/02/a-life-preserver-for-staying-afloat-in-a-sea-of-misinformation/
How to inoculate yourself against misinformation: https://thinkingispower.com/how-to-inoculate-yourself-against-misinformation/
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.
And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.
The Growing Value of OSINT for Strategic Intelligence: Harry Kemsley, OBE
Harry Kemsley, OBE, President of Government & National Security at Janes Group, is on the show this week.
In this episode, he discusses how OSINT went from the 'poor twin' of the intelligence world to a foundational tool.
Expect to learn how experienced OSINT analysts tackle mis- and disinformation online, where to get started when building an intelligence function, recruiting tactics that can dramatically improve the quality of your team’s analysis, the biggest challenge OSINT analysts struggle with today, and much more.
Resources:
- Janes Group: https://www.janes.com
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.
And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.
The OSINT Skills Employers Want Right Now: Loránd Bodó
What OSINT skills do employers want right now? And how can you stand out during the application process?
At Liferaft, we know from talking to hundreds of analysts that many want to take their OSINT careers to the next level.
Unfortunately, OSINT as a profession is relatively new. So you won’t find as many clear milestones and certifications to guide your career.
That can make breaking into the field confusing for rookie analysts. And it can make things even harder for experienced practitioners trying to advance in their careers.
So what's the answer?
Loránd Bodó, an OSINT professional and the creator of OSINTJobs.com, joins the podcast this week.
In this episode, we discuss the strategies he used to break in and grow his career as an OSINT professional.
Expect to learn the biggest mistakes candidates make when starting a career in OSINT, the number one error that prevents candidates from landing their dream OSINT jobs, why networking isn’t sleazy, the top OSINT skills employers want right now, why highly advanced technical skills may not be as important as you might think, the unconventional technique anyone can do to stand out during the application process, and much more.
Resources:
- OSINT Jobs: https://www.osint-jobs.com
- Loránd Bodó on Twitter: https://twitter.com/lorandbodo
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.
And if you’d like more insights on building a successful threat intelligence program, check out our resource page at LiferaftInc.com/blog.
The Future of Corporate Security: Carlos Francisco, CPP
Transitioning from the public sector to corporate security is no easy task. Habits that served you well in the military and law enforcement may sabotage your success in the private sector.
So how can you avoid this problem?
Carlos Francisco, CPP, Regional Security Leader at one of the world’s largest social media companies and host of the Corporate Security Translator Podcast, is on the show this week.
In this episode, you’ll learn the radical mindset shift security practitioners must learn going forward to succeed in a corporate environment.
Expect to learn how better customer service improves corporate security, the MAGIC formula for effective leadership, what security professionals can learn from Disney, how to lead without authority, and much more.
Resources:
- Carlos Francisco on LinkedIn: https://www.linkedin.com/in/carlosfranciscocpp/
- Corporate MAGIC Keys: https://corporatemagickeys.com/
- The Corporate Security Translator Podcast: https://podcasts.apple.com/us/podcast/the-corporate-security-translator-podcast/id1545799214
- So, You Want to Get into Corporate Security?: https://www.amazon.ca/You-Want-into-Corporate-Security/dp/1945783133
Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.
And if you’d like more insights on building a successful threat intelligence program, be sure to check out our resource page at LiferaftInc.com/blog.
Announcing Season 2!
A quick update if you're looking for new episodes.
Protecting Employees from Mail Attacks: Will Plummer
Mail attacks pose a growing danger to companies, non-profits, and government agencies.
Will Plummer, CSO of RaySecur, is on the show today. In this episode, we discuss the state of mail security and the growing challenge this presents for businesses.
We also discuss:
* Which organizations are most at risk for mail attacks.
* How mail attacks will likely evolve over the coming years.
* How security leaders can best prepare for and respond to these incidents.
Resources:
RaySecur Inc.: https://raysecur.com
State of Mail Security - 2021 Annual Report: https://raysecur.com/mail-security-report-2021/
For more insights on building a successful threat intelligence program, be sure to check out the LifeRaft blog at LifeRaftInc.com.
The Future of Threat Intelligence: Michael McCabe
Intelligence analysts are increasingly turning to the "wisdom of the crowd" to help them make better predictions.
Michael McCabe, CEO of Intelligence Fusion, is on the show today. In this episode, we discuss an emerging trend that has reshaped how organizations gather and analyze intelligence: crowdsourcing.
We also discuss:
* What is crowdsourced intelligence?
* How crowdsourced data gives organizations an edge.
* How analysts can ensure the quality of crowdsourced information.
Resources:
Intelligence Fusion: https://www.intelligencefusion.co.uk
Connect with Michael: https://www.linkedin.com/in/msmccabedhm/
What is Crowdsourcing Intelligence?: https://www.intelligencefusion.co.uk/insights/resources/article/what-is-crowdsourcing-intelligence/
For more insights on building a successful threat intelligence program, be sure to check out the LifeRaft blog at LifeRaftInc.com.
How to Build Alliances at Work: Scot Walker
If you have recently transitioned from the military or law-enforcement to corporate security, then you may have noticed other stakeholders in your organization are skeptical (or even out right hostile) of your role.
This presents a big problem for a new security professionals entering the private sector.
Without allies in your organization, it becomes far harder to get anything done. That can jeopardize the safety of other stakeholders as well as your success in this new role.
So what can be done?
Scot Walker, host of Scot Walker’s Protective Future, is on the show with us this week.
In this episode, we discuss the importance a building alliances at work.
We also discuss:
* Specific tactics you can use to win over allies in your organization.
* The common mistake former military and law enforcement professionals often make when transitioning to the private sector.
* The ultimate sign that you are succeeding in your new role.
Connect with Scot: https://www.linkedin.com/in/scotwalker1811/
Scot Walker’s Protective Future: https://www.youtube.com/c/ScotWalkersProtectiveFuture
If you would like more insights on building a successful threat intelligence program, be sure to check out our website at LifeRaftInc.com.
And if you like these episodes, be sure to subscribe on Apple, Spotify, or whatever else you listen to podcasts.
The Future of Event Security: AJ De Rosa
How will COVID reshape the world of event security?
AJ De Rosa, Chief Revenue Officer of Evolv Technologies, is on the show this week.
In this episode, we chat about the future of event security.
We also discuss:
- The biggest risks to sport and concert venues.
- How COVID has rewritten the rules of event security.
- How slow screening system impact event profits.
Links:
Connect with AJ: https://www.evolvtechnology.com
Evolv Technologies: https://www.linkedin.com/in/a-j-de-rosa-793b357/
If you liked this episode, be sure to subscribe on Apple, Spotify, or wherever else you listen to podcasts.
And if you would like more insights on building a successful threat intelligence program, be sure to check out our website at LifeRaftInc.com
Transitioning from the Military to Corporate Security: Scot Walker
When transitioning to corporate security, what is the biggest mistake that prevents former military and law-enforcement professionals from succeeding in their new role?
Scot Walker, host of Scot Walker’s Protective Future, is on the podcast this week.
In this episode, we discuss the importance of understanding company culture when starting a new position in the private sector.
We also chat about:
- The common mistakes former military and law-enforcement professionals make in corporate security.
- The type of mentality that can sabotage your career.
- One simple technique to win over executives and other potential allies in your organization.
Links:
Connect with Scot: https://www.linkedin.com/in/scotwalker1811/
Scot Walker’s Protective Future: https://www.youtube.com/c/ScotWalkersProtectiveFuture
For more insights on building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com.
And if you liked this episode, be sure to subscribe on Apple, Spotify, or wherever else you listen to podcasts.
Conducting More Successful Investigative Interviews: Russ Law
How do you conduct effective investigative interviews?
Russ Law, CEO of Verensics, is on the show this week.
In this episode, we discuss the common mistake security practitioners, especially those with military or law-enforcement backgrounds, often make when conducting investigative interviews.
We also discuss:
* How to get people to cooperate with your investigation (even if you have no formal authority).
* Are you secretly costing your organization millions?
* The future of investigative interviews.
Links:
Connect with Russ on LinkedIn: https://www.linkedin.com/in/russlaw/
Verensics: https://verensics.com
Never miss an episode by subscribing on Spotify, Apple, or wherever else you listen to podcasts.
And for more tips on building a successful threat intelligence program, check out our website at LiferaftInc.com.
Branding Yourself as a Security Professional: Chuck Andrews, MSME, CPP
A personal brand can go along way towards distinguishing yourself from other professionals and unlocking new career opportunities.
Chuck Andrews (MSME, CPP), founder of Friends of Chuck and the number one influencer in the security industry, is on the show this week.
In this episode, we chat about the importance of establishing and building your personal brand as a security professional.
We also chat about…
- How security professionals can define their personal brand.
- 3 steps to expand your professional network.
- The dangers of blending in and looking like everyone else.
- How to be yourself online.
Connect with Chuck: https://www.linkedin.com/in/charlesandrewscpp/
Friends of Chuck: friendsofchuck.com
If you would like more insights on building as successful threat intelligence program, be sure to check out our website at LifeRaftInc.com.
And if you liked this episode, be sure to subscribe on Apple, Spotify, or whatever else you listen to podcasts.
The Grayman School of Celebrity Protection: Jerry Heying, CPP, PPS, CST
When it comes to celebrity protection, what separates the professional protector from the amateur bodyguard?
Jerry Heying (CPP, PPS, CST), Security Director of the Executive Protection Institute, is on the show today.
In this episode, Jerry reveals the biggest mistake protectors make when safeguarding VIP clients.
We also discuss:
* The Grayman school of executive protection.
* How fake news and false rumors can jeopardize your VIP’s safety.
* The value of threat intelligence in celebrity or executive protection.
Connect with Jerry: https://www.linkedin.com/in/jerry-heying-cpp-pps-cst-99506910/
Executive Protection Institute: https://www.personalprotection.com
Be sure to subscribe on Apple, Spotify, or wherever else do you listen the podcasts.
And if you'd like more advice on building a successful threat intelligence program, be sure to check out our website at LifeRaftInc.com.
Creating More Actionable Threat Intelligence: Mike Evans MSyI M.ISRM AMBCI
How can analysts create more actionable threat intelligence?
Mike Evans, Head of Intelligence at Securitas UK, is on the show today.
In this episode, we discuss the biggest mistake analysts make when crafting intelligence for decision makers.
We also discuss:
* Three ways to uncover your end-users’ hidden requirements.
* Are you delivering finished intelligence or just data?
* How to create actionable threat intelligence that decision makers really value.
Links:
Connect with Mike: https://www.linkedin.com/in/mike-evans-security/
Securitas UK: https://www.securitas.uk.com
Never miss an episode by subscribing on Spotify, Apple Podcasts, or wherever else you listen to podcasts.
And for more tips on building a successful threat intelligence program, be sure to check out the LifeRaft blog at LifeRaftInc.com.