Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

Identifying Physical Threats in the Virtual World

By Greg Mancusi-Ungaro
protestenews
August 25, 2015

In the last decade, security has become a multi-platform, multi-channel concern for businesses. Gone are the days when the only threats to a bank could be warded off by an armed guard standing in front of a bank vault to intimidate and dissuade potential robbers. Also gone are the days when protestors worked their personal connections to organize physical demonstrations. Today, activists and demonstrators are more sophisticated, using social and digital media to gain supporters and document their activities.

This is good news for security teams. These nefarious online posts, comments and calls for action leave a digital trail of evidence that allows some potential threats to be mitigated before they materialize into physical attacks.

In the digital era, security personnel have to open their eyes to all possible angles and avenues to thwart potential threat actors. Whether a disgruntled employee is sharing a series of posts in an online forum to rally supporters, or venting his or her frustrations on a personal blog, these threats leave a similar trail. But, if such online activities are not detected, or worse, ignored, they have the potential to become full-blown business-changing incidents.

Training for Threat Mitigation in a Digital Age

When it comes to physical threats, most event organizers, venue owners and management teams at top companies and public locations have been trained to be on the lookout for suspicious characters. If they see someone in the crowd acting strangely, they know something could be afoot. They will act to investigate and neutralize the potential threat as soon as possible, exactly as they’ve been trained to do.  

The same techniques should be applied to digital hackers and scammers. But identifying suspicious or threatening online activity is, unfortunately, a more difficult problem, as the breadth and scope of online forums and social domains is enormous, in fact, expanding every day. Unlike security teams at physical locations, cyber threat experts aren’t looking for specific appearances of the threat actor, but rather for online messages, website comments, tweets or other activity that indicate aggression or threats against the companies, brands,  employees, executives or other leaders.

For example, the “Occupy” protests that notoriously spread after the first 2011 demonstrations on Wall Street were largely spurred on by activists using Twitter, social media and other outlets to promote ideas that led to thousands of grass-roots advocates joining their cause, sleeping in tents on the streets of major cities and disrupting the lives of many people within those areas. While not all of these Occupy demonstrations served as major risks to local city dwellers, some demonstrations did threaten to get out of hand, and city leaders needed to be prepared for whatever happened. Certainly, as the Occupy movement gathered momentum, security and law enforcement teams worked together to establish online monitoring. By following the conversations that were happening online, they could respond accordingly, to mitigate some of the risks – to city residents or protesters themselves.

Special events, including product announcements, shareholder meetings, sponsored sporting events and press conferences, to name a few, are frequent targets for protests and other activist activity. Even seemingly “everyday” happenings, like road races, parades or charity events can become the focal point of a public threat. All of these classes of activity have a similar profile – they are “public events” and they will garner media coverage on their own. The activists and fanatics seek a public stage – they are much more likely to go where the cameras will already be present. Forward-thinking security teams will be monitoring online forums and social media for early evidence of possible third-party actions against a company or sponsor.

Identifying Where Threats Live and Hide

In today’s hyper-connected, hyper-social world, virtual and physical threats can come in all shapes and sizes. They range from an individual trying to organize their followers to protest a product, service or company based on their personal beliefs or experiences, to specific harassment or physical threats made against prominent celebrities.

Activists, fanatics and disgruntled insiders seek the spotlight – they are often found making public statements, before, during and after an event. These comments might appear on Facebook, on a newly created page, to followers on Twitter, across Google+, Pinterest, Instagram or even on a blog. Wherever it may be, early detection of threatening activity is key. In the weeks and months before a physical event, security teams should monitor all of these online locations around the clock. Just monitoring Twitter or Facebook is not enough, as activists may choose any site to be their forum of choice.

Beyond activist, fanatic and insider activities, where the goal is getting publicity for a cause, cybercriminals are also at work looking to prey on the innocent members of the public who might be attending the event. Through email schemes, backed by rogue websites and social media promotions, cybercriminals will launch a barrage of attacks, including counterfeit ticket schemes, meet-the-celebrity cons and merchandise fraud. The cybercriminals are usually very sophisticated and extremely secretive, but their online scams and cons are easy to detect – if you are looking for them.

Monitoring Threats 24/7

Not surprisingly, securing the online component of a physical event is an enormous task. Most security teams will outsource Internet monitoring to a trusted partner. That way, they can leverage the partner’s external listening expertise to provide actionable intelligence across a broad set of online channels.  Without access to the online monitoring technology or platform provided by a trusted partner, it would be nearly impossible to sift through the online noise to identify real potential risks.

But, with such a partnership in place, the on-site security teams can focus on what they do best, planning for every possible contingency, and mitigating risks and threats when they arise. By adopting an approach that gives full attention to discovering, analyzing and mitigating online threats in the months and weeks that precede a physical event, security teams will have left no stone unturned, while they  work to ensure the safety and the integrity of their event.

KEYWORDS: business continuity planning business interruption security awareness Situational Awareness social media security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Greg mancusi ungaro brandprotect cmo
Greg Mancusi-Ungaro is CMO of BrandProtect

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber-threats

    Understanding the Convergence Between Online and Real-World Threats

    See More
  • SEC0520-drug-Feat-slide1_900px

    Benchtop NMR - Identifying the Unknown in Forensic Drug Testing

    See More
  • 5_minutes_with_Jaros_1121_900px.jpg

    5 minutes with Stephanie Jaros: Identifying and addressing insider threats

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!