Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

Identifying Physical Threats in the Virtual World

By Greg Mancusi-Ungaro
August 25, 2015

In the last decade, security has become a multi-platform, multi-channel concern for businesses. Gone are the days when the only threats to a bank could be warded off by an armed guard standing in front of a bank vault to intimidate and dissuade potential robbers. Also gone are the days when protestors worked their personal connections to organize physical demonstrations. Today, activists and demonstrators are more sophisticated, using social and digital media to gain supporters and document their activities.

This is good news for security teams. These nefarious online posts, comments and calls for action leave a digital trail of evidence that allows some potential threats to be mitigated before they materialize into physical attacks.

In the digital era, security personnel have to open their eyes to all possible angles and avenues to thwart potential threat actors. Whether a disgruntled employee is sharing a series of posts in an online forum to rally supporters, or venting his or her frustrations on a personal blog, these threats leave a similar trail. But, if such online activities are not detected, or worse, ignored, they have the potential to become full-blown business-changing incidents.

Training for Threat Mitigation in a Digital Age

When it comes to physical threats, most event organizers, venue owners and management teams at top companies and public locations have been trained to be on the lookout for suspicious characters. If they see someone in the crowd acting strangely, they know something could be afoot. They will act to investigate and neutralize the potential threat as soon as possible, exactly as they’ve been trained to do.  

The same techniques should be applied to digital hackers and scammers. But identifying suspicious or threatening online activity is, unfortunately, a more difficult problem, as the breadth and scope of online forums and social domains is enormous, in fact, expanding every day. Unlike security teams at physical locations, cyber threat experts aren’t looking for specific appearances of the threat actor, but rather for online messages, website comments, tweets or other activity that indicate aggression or threats against the companies, brands,  employees, executives or other leaders.

For example, the “Occupy” protests that notoriously spread after the first 2011 demonstrations on Wall Street were largely spurred on by activists using Twitter, social media and other outlets to promote ideas that led to thousands of grass-roots advocates joining their cause, sleeping in tents on the streets of major cities and disrupting the lives of many people within those areas. While not all of these Occupy demonstrations served as major risks to local city dwellers, some demonstrations did threaten to get out of hand, and city leaders needed to be prepared for whatever happened. Certainly, as the Occupy movement gathered momentum, security and law enforcement teams worked together to establish online monitoring. By following the conversations that were happening online, they could respond accordingly, to mitigate some of the risks – to city residents or protesters themselves.

Special events, including product announcements, shareholder meetings, sponsored sporting events and press conferences, to name a few, are frequent targets for protests and other activist activity. Even seemingly “everyday” happenings, like road races, parades or charity events can become the focal point of a public threat. All of these classes of activity have a similar profile – they are “public events” and they will garner media coverage on their own. The activists and fanatics seek a public stage – they are much more likely to go where the cameras will already be present. Forward-thinking security teams will be monitoring online forums and social media for early evidence of possible third-party actions against a company or sponsor.

Identifying Where Threats Live and Hide

In today’s hyper-connected, hyper-social world, virtual and physical threats can come in all shapes and sizes. They range from an individual trying to organize their followers to protest a product, service or company based on their personal beliefs or experiences, to specific harassment or physical threats made against prominent celebrities.

Activists, fanatics and disgruntled insiders seek the spotlight – they are often found making public statements, before, during and after an event. These comments might appear on Facebook, on a newly created page, to followers on Twitter, across Google+, Pinterest, Instagram or even on a blog. Wherever it may be, early detection of threatening activity is key. In the weeks and months before a physical event, security teams should monitor all of these online locations around the clock. Just monitoring Twitter or Facebook is not enough, as activists may choose any site to be their forum of choice.

Beyond activist, fanatic and insider activities, where the goal is getting publicity for a cause, cybercriminals are also at work looking to prey on the innocent members of the public who might be attending the event. Through email schemes, backed by rogue websites and social media promotions, cybercriminals will launch a barrage of attacks, including counterfeit ticket schemes, meet-the-celebrity cons and merchandise fraud. The cybercriminals are usually very sophisticated and extremely secretive, but their online scams and cons are easy to detect – if you are looking for them.

Monitoring Threats 24/7

Not surprisingly, securing the online component of a physical event is an enormous task. Most security teams will outsource Internet monitoring to a trusted partner. That way, they can leverage the partner’s external listening expertise to provide actionable intelligence across a broad set of online channels.  Without access to the online monitoring technology or platform provided by a trusted partner, it would be nearly impossible to sift through the online noise to identify real potential risks.

But, with such a partnership in place, the on-site security teams can focus on what they do best, planning for every possible contingency, and mitigating risks and threats when they arise. By adopting an approach that gives full attention to discovering, analyzing and mitigating online threats in the months and weeks that precede a physical event, security teams will have left no stone unturned, while they  work to ensure the safety and the integrity of their event.

KEYWORDS: business continuity planning business interruption security awareness Situational Awareness social media security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Greg Mancusi-Ungaro is CMO of BrandProtect

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber-threats

    Understanding the Convergence Between Online and Real-World Threats

    See More
  • Stressed woman at laptop

    Determining the Credibility of Online Threats in a World of Digital Noise

    See More
  • data-enews

    How to Secure the Entry in a Cyber-Physical World

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • The Complete Guide to Physical Security

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing