Why Executive Protection Teams Need Finished Intelligence

Glenn Lemons

Glenn Lemons

For executive protection teams tasked with safeguarding business leaders in what is now an increasingly complex threat landscape, having rapid access to relevant information is essential. However, as more threat actors shift operations online – and often to illicit, exclusive communities and platforms – many of the insights most useful to executive protection teams are becoming decentralised and difficult to access, explains Glenn Lemons.

These challenges highlight the overriding need for executive protection teams to augment their operations with a crucial resource: finished intelligence. Widely considered to be the most consumable type of intelligence, finished intelligence is derived from timely and relevant data that has been deeply analysed, contextualised and presented alongside all details needed to inform decisions.

Producing finished intelligence requires extensive resources, expertise and bandwidth. The following examples demonstrate why finished intelligence is an invaluable investment for executive protection teams.

Overcoming ‘analysis paralysis’ to make informed decisions

When sending prominent individuals to international destinations or high-profile events, executive protection teams must proactively establish an appropriate level of physical protection in a manner that’s tactful and unobtrusive. This requires an holistic awareness of the situation at hand and related risks, but given the potentially overwhelming volume of noise or misinformation surrounding emerging developments, teams may struggle to determine which information is accurate and relevant.

As such, ‘analysis paralysis’ – ie the stalling of key decisions in order to gather and analyse information – is a common pitfall for executive protection teams.

Moreover, without specialist subject-matter expertise and visibility into illicit communities, these teams may be basing their decisions on only a partial understanding of the risks they face.

By leveraging finished intelligence gathered by external subject matter experts, executive protection teams no longer need to waste time sifting through uncurated data. This buys back bandwidth for teams to focus on establishing appropriate defence measures based on comprehensive, accurate and relevant information.

Communicating with stakeholders across the organisation

In order to justify their decisions and gain access to necessary resources, executive protection teams must effectively communicate risk to relevant stakeholders across the organisation. Without concise reporting created with high-level consumption in mind, however, stakeholder communication can be yet another roadblock preventing executive protection teams from taking quick and effective action.

Finished intelligence reports are designed for dissemination to high-level stakeholders, offering bulleted key takeaways highlighting need-to-know information without the investigating individual having to read through a full report, followed by lengthier, more detailed reporting of interest to front line defenders. This eliminates the need to further distil intelligence for internal audiences, freeing up additional time for building an effective defence strategy. 

Assessing executives’ online exposure

The Internet’s integral role in daily life can lead to a surprising wealth of information about individuals ending up online. Business leaders are no exception. As such, in a broader and more strategic sense, executive protection extends beyond physical security to encompass digital exposure as well.

It’s crucial for organisations to be aware of any potentially damaging or sensitive information pertaining to executives available online. However, since personal data may be spread across various social media platforms, web archives and, in some cases, illicit Dark Web communities, many teams lack the capacity or ability to fully assess online exposure.

To address this capabilities gap, organisations can leverage individualised executive exposure reports gathered by external analysts to assess what information is out there and determine appropriate mitigation measures and contingency plans.

Given the importance of protecting business leaders and their data, failure simply isn’t an option when it comes to acknowledging and anticipating relevant threats.

Glenn Lemons is Senior Director of Customer Success at Flashpoint

About the Author
Brian Sims BA (Hons) Hon FSyI, Editor, Risk UK (Pro-Activ Publications) Beginning his career in professional journalism at The Builder Group in March 1992, Brian was appointed Editor of Security Management Today in November 2000 having spent eight years in engineering journalism across two titles: Building Services Journal and Light & Lighting. In 2005, Brian received the BSIA Chairman’s Award for Promoting The Security Industry and, a year later, the Skills for Security Special Award for an Outstanding Contribution to the Security Business Sector. In 2008, Brian was The Security Institute’s nomination for the Association of Security Consultants’ highly prestigious Imbert Prize and, in 2013, was a nominated finalist for the Institute's George van Schalkwyk Award. An Honorary Fellow of The Security Institute, Brian serves as a Judge for the BSIA’s Security Personnel of the Year Awards and the Securitas Good Customer Award. Between 2008 and 2014, Brian pioneered the use of digital media across the security sector, including webinars and Audio Shows. Brian’s actively involved in 50-plus security groups on LinkedIn and hosts the popular Risk UK Twitter site. Brian is a frequent speaker on the conference circuit. He has organised and chaired conference programmes for both IFSEC International and ASIS International and has been published in the national media. Brian was appointed Editor of Risk UK at Pro-Activ Publications in July 2014 and as Editor of The Paper (Pro-Activ Publications' dedicated business newspaper for security professionals) in September 2015. Brian was appointed Editor of Risk Xtra at Pro-Activ Publications in May 2018.

Related Posts