Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementSecurity Education & Training

Education & Training

The exposure in traditional executive protection

By Chris Bullock, Ashley Ferguson
SEC0321-Edu-Feat-slide1_900px

Tom Merton / OJO Images via Getty Images

SEC0321-Edu-slide2_900px

Chris Bullock is CEO & Managing Member of Cyber Investigations & Intelligence Agency (CI2A). After Bullock reduced his decorated 10-year, full-time law enforcement career to part-time in 1996, he moved into a successful private sector cybersecurity career. Bullock earned his Associate of Applied Science in Electronic Technology and his Bachelor’s in Criminal Justice. He graduated Cum Laude. Bullock is currently completing his Master’s Degree in Cybercrime and Digital Forensics from the University of South Florida. He holds multiple certifications including Certified Information Systems Security Professional (CISSP), Certified Computer Forensic Technician (CCFT), Certified Computer Examiner (CCE), SANS GIAC Web Application Penetration Tester (GWAPT), Certified Cyber Crime Investigator (3CI), Certified Cyber Crime Examiner (3CE) and is a Georgia Cyber Safety Initiative Instructor (GaCSI). Chris has held several executive level security positions in his private sector career across several large, Atlanta-based companies subsequently building and maturing their cybersecurity programs.

(Photo courtesy of Bullock)

SEC0321-Edu-slide3_900px

Ashley Ferguson is President & Managing Member of Cyber Investigations & Intelligence Agency (CI2A), creators of the comprehensive CyberVIP Protection Framework. She brings almost two decades of risk management, compliance, privacy and security experience to CI2A across the fields of information technology, oil and gas, utilities, financial services, healthcare, retail, legal and entertainment. Prior to CI2A, Ferguson was the Global Director of Advisory Services including the Executive Advisory, Governance, Risk & Compliance (GRC) and the Security Architecture & Design (SDA) practices at Dell SecureWorks. In this role, she was responsible for the strategic direction, vision and alignment of these practices globally and the founder of the Executive Advisory Center, Advisory CISO and Executive & Board Advisory service portfolios.

(Photo courtesy of Ferguson)

SEC0321-Edu-Feat-slide1_900px
SEC0321-Edu-slide2_900px
SEC0321-Edu-slide3_900px
March 12, 2021

Executive protection is a profession that has an extensive history. This tradecraft began back in late B.C. to 312 A.D., with Roman protection groups that guarded emperors. The purpose of executive protection has evolved significantly since the Roman Empire; however, it remains a primarily physical or kinetic focused protection methodology where high-value targets are protected from physical harm through various physical techniques. Training for executive protection typically involves firearms, defensive tactics, counterintelligence and advances.

Executive protection teams are often tasked with ensuring the destination of the principal is as secure as possible both from physical threats as well as performing technical security countermeasures (TSCM), otherwise known as bug sweeps on locations. Although executive protection is beginning to evolve slightly, incorporating cybersecurity protections, it is still woefully behind. If the principal is to be effectively protected, cybercrime attack considerations, intelligence and protections must be applied consistently within the executive protection tradecraft.

Cybercrime is now one of the most popular attack vectors used by criminals and bad actors. There are many reasons for this shift in tactic. Cybercrime provides a warm blanket of anonymity to its perpetrators. When done properly, the chances of getting caught are significantly less than in committing a kinetic or physical crime. Additionally, cybercrime is now easier to commit.

Committing a cyberattack no longer requires extensive technical acumen; YouTube videos and dark web forum articles provide step-by-step instructions on the distribution of ransomware or spyware targeted to a principal’s smartphone. The common criminal is learning more about how to orchestrate a successful cyberattack on their target without having to leave the comfort of their home. This shift has also enabled traditional crime to be enhanced through the use of technology, including technical crime job listings for hire out on the dark web.

Traditional executive protection techniques and tactics alone are no longer enough to effectively provide the 360 degrees of protection now required to keep a principal secure. The disparity between traditional protection tactics and cyber protection tactics will continue to grow as technology continues to proliferate in our society and society’s reliance and addiction to technology rises.

Society has become addicted to social media and technology consumption, enhancing the opportunity for cybercrime. Individuals are now programmed to want instant gratification and convenience. Consumed by “likes” and technological answers for all our daily tasks, our lives, likes and dislikes are less private than they have ever been in our history as a society and as a culture. We trust our intimate details to technology platforms without any consideration of how that data is protected or how it will be used.

This overexposure of data and pattern of life activity nurtures the potential for unlawful surveillance, stalking and cyber harassment. Principals can now be targeted by radical activists or hacktivists based on opinions that are not normally shared publicly. What we buy, what we eat, where we go, our intimate opinions, our relationship status, our geo location and our close circle of friends are all available for analysis and weaponization.

Disgruntled employees or simple differences of opinions can present both external and internal threats to the cybersecurity and physical security of the principal, their family or their close staff. This data, whether provided involuntarily or voluntarily, provides attackers with the ability to plan cyberattacks and kinetic attacks with an easier circumvention of the executive protection team. Any military or law enforcement leader will tell you that a successful attack starts with good intelligence gathering.

To effectively protect their principal, executive protection operatives must know every aspect of the latest technological attacks and understand exactly how their principals are exposed through their digital footprint, pattern of life activity and technology vulnerabilities. These techniques are not part of most traditional executive protection training programs and require enhanced technical acumen and cybercrime analysis skills.

From the device in our principals’ pockets, to their vehicle infotainment systems, to their home automation technologies, thousands of attack vectors are present. If the executive, members of their family, their close circle or associates over participate on social media, configure their smartphones or applications incorrectly, or do not protect their internet of things (IOT) devices, an attack is imminent, particularly if they are of high notoriety or high net worth.

Technical Security Counter Measures (TSCM) or bug sweeps are not designed for this level of cyber exposure analysis. Most TSCM sweeps focus on the leakage of RF or radio frequencies, LASER listening devices, or hardwired listening devices across a phone. TSCM is not designed to detect advanced malware on a smartphone that intercepts and transmits texts and voice data to a bad actor’s server through the Internet via a digital protocol. This exposure must be detected through digital forensic analysis, cyber threat hunting and digital indicators of compromise. Digital forensic analysis, cyber threat hunting and recognition of digital indicators of compromise are not part of traditional executive protection training; however, these advanced cybercrime protection and detection techniques are now a vital component of effective executive protection.

In summary, security teams charged with executive protection must adapt to the growing cybercrime threat. Many firms are becoming more aware of this need and partnering with specialty firms or adding technology specialists to their protection teams. Unfortunately, the disparities between the cost expectations of traditional executive protection and the addition of cybercrime specialists have not fully aligned due to the differences in skillset requirements. Effective protection now must include both traditional and cyber executive protection to help protect against the most dominant form of attack today, a cyberattack.

KEYWORDS: access control business continuity COVID-19 Global Security Operations Center (GSOC) risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sec0321 edu slide2 900px

Chris Bullock is CEO & Managing Member of Cyber Investigations & Intelligence Agency (CI2A). After Bullock reduced his decorated 10-year, full-time law enforcement career to part-time in 1996, he moved into a successful private sector cybersecurity career. Bullock earned his Associate of Applied Science in Electronic Technology and his Bachelor’s in Criminal Justice. He graduated Cum Laude. Bullock is currently completing his Master’s Degree in Cybercrime and Digital Forensics from the University of South Florida. He holds multiple certifications including Certified Information Systems Security Professional (CISSP), Certified Computer Forensic Technician (CCFT), Certified Computer Examiner (CCE), SANS GIAC Web Application Penetration Tester (GWAPT), Certified Cyber Crime Investigator (3CI), Certified Cyber Crime Examiner (3CE) and is a Georgia Cyber Safety Initiative Instructor (GaCSI). Chris has held several executive level security positions in his private sector career across several large, Atlanta-based companies subsequently building and maturing their cybersecurity programs.

Sec0321 edu slide2 900px1

Ashley Ferguson is President & Managing Member of Cyber Investigations & Intelligence Agency (CI2A), creators of the comprehensive CyberVIP Protection Framework. She brings almost two decades of risk management, compliance, privacy and security experience to CI2A across the fields of information technology, oil and gas, utilities, financial services, healthcare, retail, legal and entertainment. Prior to CI2A, Ferguson was the Global Director of Advisory Services including the Executive Advisory, Governance, Risk & Compliance (GRC) and the Security Architecture & Design (SDA) practices at Dell SecureWorks. In this role, she was responsible for the strategic direction, vision and alignment of these practices globally and the founder of the Executive Advisory Center, Advisory CISO and Executive & Board Advisory service portfolios.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Corporate Executive Protection in the 21st Century - Security Magazine

    Corporate Executive Protection in the 21st Century

    See More
  • Person holds white cellphone

    The role of mobile security in executive protection

    See More
  • Executive Protection & Behavioral Threat Teams

    The Prevention Partnership: Executive Protection & Behavioral Threat Teams

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

  • Physical Security and Environmental Protection

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing