Connected Corporate Security: How To Manage Threats and Risks with a Unified Security Model

Nonmember Price: $0.00
Member Price: $0.00
In stock
Code (SKU)
WB-240125-CST

Thursday, January 25, 2024 12:30pm EST
Sponsored By: Ontic
1 CPE
ASIS International is requesting your personal information to meaningfully communicate in response to your registration for this event. We will use this information for registration, service delivery, logistics, and communication needs related to this event. You may always rescind your consent, per our Privacy Policy.
ASIS may provide my name and contact information in the roster of registrants to event sponsor Ontic, and will be handled in accordance with the presenting sponsor’s published privacy policy.

Learn how security teams can serve as connectors across any organization and develop new, integrated solutions through technology, talent, partnerships, external networks, and the right kind of leadership and metrics.

Free to all | Registration required


Thursday, January 25, 2024 12:30pm EST
Sponsored By: Ontic
1 CPE

Today, security threats are growing and increasingly interconnected. Technology — which could be part of the solution — is often the problem: outdated systems, disconnected SaaS tools, and spreadsheets exacerbate silos between different groups within the corporate security team and between the security team and other functions across the business.

Security teams have a unique opportunity to serve as the connector within any organization and develop new, integrated solutions. The key to realizing this potential lies with technology, talent, partnerships, external networks, and the right kind of leadership and metrics.

Join Rachel Briggs, CEO of The Clarity Factory, and Chuck Randolph, Chief Security Officer of Ontic, in this one-hour webinar as they share findings from our report, Connected Corporate Security: How To Manage Threats and Risks With a Unified Security Model, on how:

  • Within the corporate security function, team members can work together on consolidated technology platforms and seamlessly share data to generate better insights to manage complex and heightened security risks
  • Corporate security functions can partner with colleagues outside the security team by sharing data and fostering collaborative working arrangements to help the company deal with interconnected risks
  • Corporate security professionals can leverage their external network to benefit not just the corporate security team but the corporation at large

Credit Information

Completion of this webinar is eligible for 1 CPE credit.  CPE credits for ASIS-sponsored webinars will be updated in your user profile within 48 hours of completion.  Self-reporting of CPE credits is not required.  

Presenters* 

Rachel Briggs
CEO and Founder, The Clarity Factory

Rachel Briggs OBE is the CEO and Founder of The Clarity Factory, an acclaimed consultancy producing knowledge, insights, and practical solutions for security clients, including  Fortune and FTSE 100 companies. Briggs is an expert on corporate and national security and regularly advises multinational corporations on their security strategies and resourcing. She is the author of The Business Value of Corporate Security and The Business of Resilience.

Chuck Randolph
Chief Security Officer, Ontic

Before his role at Ontic, Chuck Randolph successfully led global operations and intelligence teams at Microsoft for 20 years, leveraging his expertise to safeguard executives and assets and report on threat intelligence and risk trends. His extensive experience in executive protection, event risk management, and intelligence has made a significant impact and
transformed these services into strategic enablers. In addition to his remarkable tenure in the private sector, Randolph has a notable 30-year military career, retiring as a Lieutenant Colonel.

*Note:  Speakers and content are subject to change without notice.


Thursday, January 25, 2024 12:30pm EST
Sponsored By: Ontic
1 CPE
Write Your Own Review
You're reviewing:Connected Corporate Security: How To Manage Threats and Risks with a Unified Security Model