Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsManagementSecurity Talk ColumnSecurity Enterprise ServicesSecurity Leadership and Management

Executive Protection Success Hinges on Investigative Talents

By Diane Ritchey
May 1, 2018

It is a dangerous world with new and evolving challenges that can threaten the safety and security of our elected officials, community leaders, corporate executives and the organizations they lead.

With a 24-hour news cycle and social media, inflammatory stories and even personal information about an executive can spread worldwide. Negative messages that affect your enterprise’s brand and reputation can face the same fate.

In an enterprise with a robust Executive Protection (EP) program, it is the job of that team to ensure the physical safety of the principal and also the principal’s and his or her organization’s reputations. A large part of that task lies with a strong Protective Intelligence program that conducts thorough and continual threat assessments. And an important part of any threat assessment team is a skilled investigator.

Wayne North - Security Magazine

Wayne North

According to Wayne North, CPP, a retired federal law enforcement executive and emergency programs manager, and Managing Partner for Overwatch Risk Solutions LLC in Tallahassee, Florida, there’s a large gap in EP missions – in the pre-event and travel planning areas. Proper protective intelligence is rarely utilized, he says, and in many cases, that exposes the client and any traveling party to unnecessary risk. This is where strong investigative skills are crucial, as the role of a trained, skilled investigator or analyst should not be overlooked. A good protective intelligence process can identify potential hostile actors; identify security and safety concerns; aid in developing emergency response procedures; and identify potential logistical challenges in such things as vehicle routes, lodging arrangements, arrivals and departures, entry and egress points at various venues, luggage control and security, and areas to avoid. The two most important things for an effective EP mission is to ensure the client’s physical safety and protect their brand/reputation, North says. Thorough protective intelligence by an experienced investigator or analyst is invaluable in this regard.

 

What are the skill sets needed for one to conduct a thorough risk assessment?

A thorough risk assessment requires dedicated investigators with excellent investigative and analytical skills to obtain information from multiple independent and corroborated sources, and these instigators need several key skill sets.

First is the ability to discreetly mine open source information. An Open Source Intelligence (OSINT) investigation analyzes social media, public records, blog posts, podcasts and media outlets. It can provide a wealth of information for an experienced investigator by quickly identifying individuals or groups that have expressed a desire to cause harm to or have otherwise shown an inappropriate or unusual interest in a principal or the organization. Analyzing status updates, photos posted by both a person or group of interest and their friends, followers and other social connections can help to determine if a legitimate threat exists, identify the location of a person at a given time, track travel, identify upcoming events that may be of concern, and uncover a wealth of priceless information. It is worth noting that OSINT analysis should not stop with the issuance of a threat assessment report or a travel safety briefing. For example, continual, real-time monitoring of social media while the principal is traveling or attending an event is critical in identifying any developing risks or threats such as natural disasters or civil unrest.

 

What about interview skills?

Absolutely. Law enforcement protective intelligence investigators will often attempt to interview a person of concern to determine motive, assess the person’s mental state, evaluate the ability to carry out a threat, etc. Non-law enforcement organizations may not have the capacity, desire, legal authority or resources to do this. However, good interviewers know how to establish rapport and convince people to cooperate. This ability is also extremely valuable when talking to others who possess vital information such as law enforcement officers, external partners such as other security organizations or event staff, and internal resources like human resource specialists. As with any investigator, the risk assessment investigator has to be approachable with good people skills and able to develop sources and information and contacts.

 

How can security technology be used?

Surveillance is another traditional investigative skill that can be helpful in determining if an identified person of interest possesses the intent and capability to follow through on an expressed threat by evaluating financial means, associates, daily routines and even identifying erratic behavior.

Obviously, these are just a few of the skills needed for effective risk assessment investigators. Other soft skills such as excellent communication skills, common sense, flexibility, discretion and the ability to work effectively with a team are needed.

Do you have a dedicated and skilled investigator that is involved in your EP program to mitigate risks to your organization and your leadership? I’d like to know. Email me at ritcheyd@bnpmedia.com.

KEYWORDS: C-suite security executive protection insider threats international security security career security investigations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Megapixel Cameras Boost Investigative Potential, Efficiency

    See More
  • College Finds Security Awareness Success with Creativity, Videos

    See More
  • SEC0419-cover-feat-slide1_900px

    What Salary Does a Security Executive Make?

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • Physical Security and Environmental Protection

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing