Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and ManagementPhysical Security

Security & Business Resilience

Preparing for extremism in the workplace

By Sarah Ludwig Rausch
SEC0421-Extremism-FEAT_MAIN_1170x878px

actionsportsnc / iStock / Getty Images Plus via Getty Images

SEC0421-Extremism-Feat-Slide2-900px

Greg Wurm

(Photo courtesy of Wurm)

SEC0421-Extremism-Feat-Slide3-900px

Matt Hollandsworth

(Photo courtesy of Hollandsworth)

SEC0421-Extremism-Feat-Slide4-900px

Timothy Gallagher

(Photo courtesy of Gallagher)

SEC0421-Extremism-Feat-Slide5-900px

Casey Johnston

(Photo courtesy of Johnston)

SEC0421-Extremism-Feat-Slide6-900px

Adam S. Lee

(Photo courtesy of Lee)

SEC0421-Extremism-FEAT_MAIN_1170x878px
SEC0421-Extremism-Feat-Slide2-900px
SEC0421-Extremism-Feat-Slide3-900px
SEC0421-Extremism-Feat-Slide4-900px
SEC0421-Extremism-Feat-Slide5-900px
SEC0421-Extremism-Feat-Slide6-900px
April 7, 2021

Extremism is nothing new for seasoned security leaders, but with the violence by both left- and right-wing extremists this past year, it’s on everyone’s radar now more than ever. “As a career FBI agent with exposure to jurisdictions across the country, I can say with some degree of credibility that (extremism) has gotten worse in recent years,” says Adam S. Lee, Vice President and Chief Security Officer at Dominion Energy Services in Richmond, Va.

The United States and other countries have a history of political unrest and extremist acts, but Lee says the difference now is that society is more divided than he’s ever seen it. “Perhaps most concerning to me, our leaders—federal, state and local—too often excuse or even encourage lawlessness in pursuit of political ends,” he says. “After a quarter-century working these issues, that, in my assessment, is a new and dangerous dynamic.”

“I think (extremism) is going to be a bigger focus for security departments,” says Matt Hollandsworth, Director of Corporate Security, Facilities, and Safety at AMERICAN SYSTEMS in Chantilly, Va. “How do we prevent it? How do we detect it? And how do we train our staff appropriately to respond? I think, from that perspective, it’s going to affect us more.”


Extremism and Private Sector Organizations

Whether it’s a company’s people, property or shareholder value, extremist groups from either side of the spectrum can be a threat, says Tim Gallagher, Managing Director of Business Intelligence and Investigations at Kroll in New York City. “It doesn’t make a difference as to what the ideology is of the extremist group, if you’re running a company, you could be targeted,” he says.

Extremism has the potential to impact private sector organizations in multiple ways. For one, company employees could become involved. Companies like AMERICAN SYSTEMS who have government and private contracts may have staff members inadvertently caught up in extremist acts at government or other notable buildings, Hollandsworth explains.

If employees engage in extremist activities, this can reflect unfavorably on the company brand, says Greg Wurm, Vice President and Chief Security Officer at Anthem, Inc., Indianapolis.

Even worse, staff members could be associated with a foreign terrorist organization or be a member of a hate or anarchist group looking to carry out their goals through illegal means, Lee says. At least in these situations, Lee notes, company policies usually give security and human resource departments the ability to take action.

The more difficult circumstance, Lee believes, is employees who are expressing extreme views at work, looking at extremist material on company devices, and perhaps even exhibiting concerning behaviors, but are not members of an extremist group and haven’t made a declaration of extremist beliefs. In these cases, security leaders have the complicated task of figuring out how to manage and/or monitor these individuals more closely before any potential damage to the enterprise occurs.

Enterprises can also become the target of extremist acts due to factors such as their business model or their political affiliations, says Casey Johnston, Director of Global Security, Risk, and Intelligence at Anthem, Inc., Indianapolis. “Whether it’s environmental extremists upset at a company due to its impact on the environment or religious extremists targeting a company based on its support of a foreign government, those threats could be external or internal,” Johnston says.


Insider Threat Programs

Many enterprises have some sort of insider threat program in place. This may include monitoring employees’ internet use, for example. Gallagher says it’s important to have policies in place with human resources that include employee agreements to “a certain level of monitoring as a condition of employment, whether that be email traffic on your system or things that they post on social media.”

At Anthem, Johnston says they have awareness campaigns to teach employees when and how to report suspicious activity and concerning behaviors. They’ve also developed a cross-functional threat management program with team members from security, legal and human resources, as well as an external consultant, and trained the team to review these cases. “We’re really trying to spend more time and resources to increase some of our intelligence capabilities,” Wurm says. “I think it’s also important to do some information sharing and to belong to some of these large global security associations or groups to exchange information within the industry.”

Dominion Energy’s insider threat program looks for potential threats from employees (concerning behavior, suspicious network activity, misuse of company devices, etc.) while also working to make sure that staff members don’t feel like they’re being spied on, Lee says. Of course, any employee who is exhibiting extremist behavior needs closer examination or further action, but “our efforts are politically agnostic,” says Lee. “Our focus in providing security services is on our core values and the behaviors that create risk to our customers, our employees and our assets.”

For AMERICAN SYSTEMS, a strong insider threat program is key, Hollandsworth says. There’s the information technology (IT) side of network tracking and monitoring—in this case, for employees visiting extremist websites. There is also employee training on being aware of suspicious behavior, but “we tweak that a bit to look at not just the person’s emotional sense, but what are they doing? What are they talking about?” he says. The company also makes a point of having a culture that encourages reporting by allowing employees to disclose concerns anonymously.

 

Intelligence Sharing

Since 9-11, law enforcement and government entities have significantly increased the amount of intelligence they share with private entities, Gallagher says. Even so, “law enforcement is not able, in many cases, to actually provide the resources that mitigate that threat.” If security teams don’t have the bandwidth to mitigate potential radical or extremist threats, then working with an outside consultant can be helpful in this area.

As a former Special Agent in Charge with the FBI, Gallagher is familiar with intelligence sharing from both sides. “In the FBI, we were pushing information out to our private sector partners to help them stay safe and mitigate the threat. From this side, where I’m the recipient of the information, I utilize it now to formulate mitigation strategies to keep people safe,” he says.

Lee, who is also a former FBI Special Agent says that relationships with law enforcement are critical to security teams and enterprises globally to help manage the threat of extremism in the workplace. He notes, “Developing those relationships take time and involve trust.”

 

Outside Threats

Experts say that a large part of mitigating risk from extremism involves trolling social media for external threats. Because Dominion Energy powers intelligence community elements and Department of Defense facilities, its close connection to the government makes it a target. “Many extremist groups that are adversarial to the business operations of the energy sector are active and often threatening on social media platforms,” Lee says.

The summer of 2020 saw riots that affected downtown Richmond, including destruction of Dominion Energy property. Since then, the company has acquired new technology solutions to protect its people and assets from any type of outside threats, including extremism. The organization also recently completed active threat/workplace violence training with their staff to prepare them for potential threats.

Johnston says that most of Anthem’s security programs monitor and handle both internal and external threats. “Externally, we look at industry activism and the activity of those activist groups, as well as any decisions made by our company that could potentially increase negative sentiment or animosity toward us and put us into the cross hairs of one of these activist groups,” he says.

 

Boosting Extremism Planning

Many companies already have good programs in place when it comes to planning for extremism, Hollandsworth says. He advises looking at your existing programs through the lens of an extremist. “Maybe there are some additional things that you can do or some adjustments you can make,” he says.

Having a formal threat assessment team and program is useful, Wurm says. “They can weed through the true threats versus the white noise out there amongst all the disinformation campaigns,” he says. Wurm also believes that having a good working relationship with different departments within the company, such as HR and legal, are beneficial. These holistic relationships enable feedback that can help enhance your own program, he says.

Johnston says relationships with corporate communications and those in charge of the enterprise’s social media are important too, “since they’re the ones that are out there every day, looking at what’s being said about the company. They really are a force multiplier to assist with intelligence gathering.”

Perhaps most importantly when it comes to radicalism and extremism in terms of threats, is to have a strong handle on your organization’s risk profile. “There are so many different risks and threats out there, it’d be difficult to allocate the same level of resources across the board, so really understanding what your risk profile is helps to focus your efforts on those areas that present the greatest risk to the company,” Johnston advises.

In addition, Gallagher recommends developing a robust reporting program within the organization. “Have a system in place and encourage people to use it,” he says. Make sure employees know they can report anonymously. “People don’t want to come forward because they don’t want to risk someone’s reputation if they’re wrong,” he says.

KEYWORDS: business continuity extremism public safety radicalism risk management threat assessment

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sarah Ludwig Rausch is a Contributing Writer to Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security newswire default

    Support for Groups Countering Extremism in the UK

    See More
  • 5mw Spoerndle

    5 minutes with Jeff Spoerndle - Planning for domestic violent extremism in large venues

    See More
  • Extremism in the United States: where are the risks and what security enterprises can do regarding extremism

    Extremism in the United States in 2021: What’s out there and where are the risks?

    See More

Related Products

See More Products
  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products

Events

View AllSubmit An Event
  • January 16, 2025

    Preparing for the 2025 Threat Landscape

    ON DEMAND: In 2024, businesses faced a barrage of critical events with far-reaching impacts. From record-breaking storms and costly infrastructure failures to contentious election cycles and sophisticated cyberattacks, companies are navigating an increasingly complicated threat landscape.
View AllSubmit An Event
×
actionsportsnc / iStock / Getty Images Plus via Getty Images
Greg Wurm (Photo courtesy of Wurm)
Matt Hollandsworth (Photo courtesy of Hollandsworth)
Timothy Gallagher (Photo courtesy of Gallagher)
Casey Johnston (Photo courtesy of Johnston)
Adam S. Lee (Photo courtesy of Lee)

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!