SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Crisis Management Consulting, LLC
313.671.6123
Internet and Social Media Monitoring, Investigations & Threat Mitigation
Who’s monitoring your brand? When and how do you learn when a former or disgruntled employee is
tarnishing your brand or threatening your company’s employees? Many times a company’s social media
and internet monitoring is the responsibility of its marketing department, with understandably, little or
no experience identifying threats to company executive staff and employees or risks to the enterprise.
Crisis Management Consulting, LLC (CMC) takes a unique approach with experience in Executive
Protection, Threat Identification and Operational Risk.
With over 15 years providing intelligence to leading executive personnel CMC specializes in:
 Threat identification
 Provision of advice which enables threat mitigation
 Enterprise wide holistic Risk Management
 Identification of vulnerabilities using social media and internet
 Crisis Management & Early Warning alert mechanisms
 Collection of open source intelligence using government recognized methodology
 Consulting with leading companies developing security operation center’s intelligence
capabilities
 Athletes, Celebrities & High Net Worth Individuals (HNWI) privacy measures
 Counter-Measures providing security to HNWI to mitigate risks
As a Director of Security the last thing you want to have is your company’s operations disrupted by a
protest or demonstration you had no knowledge of in advance. CMC provides threat awareness and early
warning products when pre-established event or risk thresholds are exceeded.
 Advance vulnerability surveys complement your existing Executive Threat Assessments
The use of social media is an adversary’s way to build momentum around grievances, be they legitimate
or otherwise. CMC does advance adversarial identification prior to company events such as shareholder
meetings, executive travel, site selection, product, new market entry, and other important revenue
generating or governance activities. Alerts and risk reports are then generated so your crisis management
team can lead an inter-agencies response to disrupt planned protests and other threats to the enterprise.
If your company has been, or is likely to be targeted by activists – or if employees, competitors or other
groups have been attempting to tarnish your image and reputation there are a wide range of options
available to you including;
 Baseline packages include vulnerability identification to identify personal information disclosure
 Monitoring package to include early warning notification
 Pre-employment social media investigation
 Executive and family member internet exposure and social media auditing
 Language Translation Search Services
Contact Crisis Management Consulting to discuss your existing exposures and learn how we can mitigate
risks to your executives and enterprise.
Crisis Management Consulting, LLC
313.671.6123
About Crisis Management Consulting
Our team understands your business and the threats it faces in a dynamic and unsteady world. With
decades of experience in public and private sector threat mitigation, Crisis Management Consulting can
help you manage those risks.
Andrew Dailey, CPP
Andrew Dailey CPP, is the President of Crisis Management Consulting, LLC. He specializes in
Security & Risk Mitigation Services delivering Executive Protection, Business Continuity, Crisis
Management, Travel Risk and Supply Chain Management solutions to the security industry
and Fortune 1000 companies. Dailey was the lead security consultant on Rock Ventures
Security Operations Center including the physical design, hiring and development of team
members to service Quicken Loans and Rock Ventures Family of Companies. Additionally, he
provides risk assessment services and intelligence based products to Rock Ventures. He was
formerly with Electronic Data Systems in the roles of Regional Operational Risk Manager -
Americas and Regional Security Manager. Prior to joining EDS, Dailey was the Manager of
Security Information at General Motors Crisis Center. While managing GM’s Crisis Center, Dailey was responsible for
traveler security, crisis management and the identification of threats and risk-based events against GM's global
operations and supply chain. Dailey developed numerous intelligence briefs for GM’s executive staff, including the
Global Information Snapshot distributed by the DHS and FBI under the United States Public Private Partnership
Program. He also served as an Advisor to the GM Global Crisis Management team. He is a Certified Protection
Professional by the American Society for Industrial Security, with more than 25 years in the Security Industry. Dailey
has written several articles related to terrorism analysis, including Terrorism Foreseeability: No longer a crystal ball
and Foreign Fighter Networks: Implication for Multinational Corporations published by the United Kingdom’s
Continuity Central. In addition, Dailey has written on risk mitigation tools in Geographic Information Systems as a
Supply Chain Risk Management Tool as published Directions Magazine & Supply & Demand Chain Executive.
Chris Rawley, Counter-terrorism Expert
Chris Rawley is CMC’s lead terrorism subject matter expert and has over twenty years of
military and corporate security experience. As a Captain in the U.S. Navy, he deployed to Iraq,
Afghanistan, Africa, and the Persian Gulf for force protection and counter-terrorism
operations. During the onset of Operation Iraqi Freedom, he led riverine and port security
patrols in Southern Iraq protecting mine sweeping forces and humanitarian shipping. Later,
served tours with the nation’s elite Joint Special Operations Command (JSOC) and as a planner
at Special Operations Command’s (SOCOM) Interagency Task Force. While at SOCOM he
worked closely with the Federal Bureau of Investigation, Joint Terrorism Task Forces, and
numerous other national, state, and local agencies to pursue high value terrorist targets. Most
recently deployed as the Deputy Commander for Special Operations Command Forward-East Africa, where he led
Navy and Army special operations forces in combating Islamic terrorism in the Horn of Africa. There his team
pioneered the military’s use of social media threat monitoring.
Mr. Rawley has also held a number of civilian management roles including the Director of Global Security Operations
for a Fortune 100 corporation. He has experience across a range of industries, including air transportation,
information technology, and commercial real estate. He has an MBA from George Washington University, and is a
graduate of Texas A&M University and the Naval War College. Mr. Rawley is the author of Unconventional Warfare
2.0 and numerous articles on terrorism online and in professional military journals.

Más contenido relacionado

Similar a Internet and Social Media Monitoring and Investigations with Bios

Internet and Social Media Monitoring and Investigations
Internet and Social Media Monitoring and InvestigationsInternet and Social Media Monitoring and Investigations
Internet and Social Media Monitoring and InvestigationsAndrew Dailey, CPP
 
Maven risk management services
Maven risk management servicesMaven risk management services
Maven risk management servicesRichard Mojel
 
Talon Security Solutions - Sell Sheet (1)
Talon Security Solutions - Sell Sheet (1)Talon Security Solutions - Sell Sheet (1)
Talon Security Solutions - Sell Sheet (1)Tom Coyle
 
Hospitality Security and Safety Solutions
Hospitality Security and Safety SolutionsHospitality Security and Safety Solutions
Hospitality Security and Safety Solutionspfarina
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksAronson LLC
 
Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementMighty Guides, Inc.
 
Incident Response with LDM Global_ A Comprehensive Approach to Handling Crisi...
Incident Response with LDM Global_ A Comprehensive Approach to Handling Crisi...Incident Response with LDM Global_ A Comprehensive Approach to Handling Crisi...
Incident Response with LDM Global_ A Comprehensive Approach to Handling Crisi...LDM Global
 
Reputation Management In The Age Of Social Media Revised
Reputation Management In The Age Of Social Media RevisedReputation Management In The Age Of Social Media Revised
Reputation Management In The Age Of Social Media RevisedJames Kane
 
'Unsustainably Sustainable' by Dr Carl Ungerer and Vanessa Liell at Mumbrella...
'Unsustainably Sustainable' by Dr Carl Ungerer and Vanessa Liell at Mumbrella...'Unsustainably Sustainable' by Dr Carl Ungerer and Vanessa Liell at Mumbrella...
'Unsustainably Sustainable' by Dr Carl Ungerer and Vanessa Liell at Mumbrella...Brittany Ferdinands
 
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board MembersExpert Webcast
 
CIS Security Risk Mgmt Solutions Brochure
CIS Security Risk Mgmt Solutions BrochureCIS Security Risk Mgmt Solutions Brochure
CIS Security Risk Mgmt Solutions BrochureJeff Ezell
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyMighty Guides, Inc.
 
Managing Online Reputation. How to Protect Your Company on Social Media
Managing Online Reputation. How to Protect Your Company on Social MediaManaging Online Reputation. How to Protect Your Company on Social Media
Managing Online Reputation. How to Protect Your Company on Social MediaCharlie Pownall
 
Managed IT Services – CRI Advantage
Managed IT Services – CRI AdvantageManaged IT Services – CRI Advantage
Managed IT Services – CRI AdvantageCRI Advantage
 
Cyber Security Experts Forum
Cyber Security Experts ForumCyber Security Experts Forum
Cyber Security Experts ForumMelissa Krasnow
 
CHAPTER 34Turning Crisis into OpportunityBuilding an ERM.docx
CHAPTER 34Turning Crisis into OpportunityBuilding an ERM.docxCHAPTER 34Turning Crisis into OpportunityBuilding an ERM.docx
CHAPTER 34Turning Crisis into OpportunityBuilding an ERM.docxketurahhazelhurst
 

Similar a Internet and Social Media Monitoring and Investigations with Bios (20)

Internet and Social Media Monitoring and Investigations
Internet and Social Media Monitoring and InvestigationsInternet and Social Media Monitoring and Investigations
Internet and Social Media Monitoring and Investigations
 
Ciso NYC
Ciso NYCCiso NYC
Ciso NYC
 
Maven risk management services
Maven risk management servicesMaven risk management services
Maven risk management services
 
2016 Top Security Threats
2016 Top Security Threats2016 Top Security Threats
2016 Top Security Threats
 
Marc D. Schein Bio-v3
Marc D. Schein Bio-v3Marc D. Schein Bio-v3
Marc D. Schein Bio-v3
 
Talon Security Solutions - Sell Sheet (1)
Talon Security Solutions - Sell Sheet (1)Talon Security Solutions - Sell Sheet (1)
Talon Security Solutions - Sell Sheet (1)
 
Hospitality Security and Safety Solutions
Hospitality Security and Safety SolutionsHospitality Security and Safety Solutions
Hospitality Security and Safety Solutions
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
 
MP_OneSheet_VulnThreat
MP_OneSheet_VulnThreatMP_OneSheet_VulnThreat
MP_OneSheet_VulnThreat
 
Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability Management
 
Incident Response with LDM Global_ A Comprehensive Approach to Handling Crisi...
Incident Response with LDM Global_ A Comprehensive Approach to Handling Crisi...Incident Response with LDM Global_ A Comprehensive Approach to Handling Crisi...
Incident Response with LDM Global_ A Comprehensive Approach to Handling Crisi...
 
Reputation Management In The Age Of Social Media Revised
Reputation Management In The Age Of Social Media RevisedReputation Management In The Age Of Social Media Revised
Reputation Management In The Age Of Social Media Revised
 
'Unsustainably Sustainable' by Dr Carl Ungerer and Vanessa Liell at Mumbrella...
'Unsustainably Sustainable' by Dr Carl Ungerer and Vanessa Liell at Mumbrella...'Unsustainably Sustainable' by Dr Carl Ungerer and Vanessa Liell at Mumbrella...
'Unsustainably Sustainable' by Dr Carl Ungerer and Vanessa Liell at Mumbrella...
 
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members
 
CIS Security Risk Mgmt Solutions Brochure
CIS Security Risk Mgmt Solutions BrochureCIS Security Risk Mgmt Solutions Brochure
CIS Security Risk Mgmt Solutions Brochure
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
Managing Online Reputation. How to Protect Your Company on Social Media
Managing Online Reputation. How to Protect Your Company on Social MediaManaging Online Reputation. How to Protect Your Company on Social Media
Managing Online Reputation. How to Protect Your Company on Social Media
 
Managed IT Services – CRI Advantage
Managed IT Services – CRI AdvantageManaged IT Services – CRI Advantage
Managed IT Services – CRI Advantage
 
Cyber Security Experts Forum
Cyber Security Experts ForumCyber Security Experts Forum
Cyber Security Experts Forum
 
CHAPTER 34Turning Crisis into OpportunityBuilding an ERM.docx
CHAPTER 34Turning Crisis into OpportunityBuilding an ERM.docxCHAPTER 34Turning Crisis into OpportunityBuilding an ERM.docx
CHAPTER 34Turning Crisis into OpportunityBuilding an ERM.docx
 

Internet and Social Media Monitoring and Investigations with Bios

  • 1. Crisis Management Consulting, LLC 313.671.6123 Internet and Social Media Monitoring, Investigations & Threat Mitigation Who’s monitoring your brand? When and how do you learn when a former or disgruntled employee is tarnishing your brand or threatening your company’s employees? Many times a company’s social media and internet monitoring is the responsibility of its marketing department, with understandably, little or no experience identifying threats to company executive staff and employees or risks to the enterprise. Crisis Management Consulting, LLC (CMC) takes a unique approach with experience in Executive Protection, Threat Identification and Operational Risk. With over 15 years providing intelligence to leading executive personnel CMC specializes in:  Threat identification  Provision of advice which enables threat mitigation  Enterprise wide holistic Risk Management  Identification of vulnerabilities using social media and internet  Crisis Management & Early Warning alert mechanisms  Collection of open source intelligence using government recognized methodology  Consulting with leading companies developing security operation center’s intelligence capabilities  Athletes, Celebrities & High Net Worth Individuals (HNWI) privacy measures  Counter-Measures providing security to HNWI to mitigate risks As a Director of Security the last thing you want to have is your company’s operations disrupted by a protest or demonstration you had no knowledge of in advance. CMC provides threat awareness and early warning products when pre-established event or risk thresholds are exceeded.  Advance vulnerability surveys complement your existing Executive Threat Assessments The use of social media is an adversary’s way to build momentum around grievances, be they legitimate or otherwise. CMC does advance adversarial identification prior to company events such as shareholder meetings, executive travel, site selection, product, new market entry, and other important revenue generating or governance activities. Alerts and risk reports are then generated so your crisis management team can lead an inter-agencies response to disrupt planned protests and other threats to the enterprise. If your company has been, or is likely to be targeted by activists – or if employees, competitors or other groups have been attempting to tarnish your image and reputation there are a wide range of options available to you including;  Baseline packages include vulnerability identification to identify personal information disclosure  Monitoring package to include early warning notification  Pre-employment social media investigation  Executive and family member internet exposure and social media auditing  Language Translation Search Services Contact Crisis Management Consulting to discuss your existing exposures and learn how we can mitigate risks to your executives and enterprise.
  • 2. Crisis Management Consulting, LLC 313.671.6123 About Crisis Management Consulting Our team understands your business and the threats it faces in a dynamic and unsteady world. With decades of experience in public and private sector threat mitigation, Crisis Management Consulting can help you manage those risks. Andrew Dailey, CPP Andrew Dailey CPP, is the President of Crisis Management Consulting, LLC. He specializes in Security & Risk Mitigation Services delivering Executive Protection, Business Continuity, Crisis Management, Travel Risk and Supply Chain Management solutions to the security industry and Fortune 1000 companies. Dailey was the lead security consultant on Rock Ventures Security Operations Center including the physical design, hiring and development of team members to service Quicken Loans and Rock Ventures Family of Companies. Additionally, he provides risk assessment services and intelligence based products to Rock Ventures. He was formerly with Electronic Data Systems in the roles of Regional Operational Risk Manager - Americas and Regional Security Manager. Prior to joining EDS, Dailey was the Manager of Security Information at General Motors Crisis Center. While managing GM’s Crisis Center, Dailey was responsible for traveler security, crisis management and the identification of threats and risk-based events against GM's global operations and supply chain. Dailey developed numerous intelligence briefs for GM’s executive staff, including the Global Information Snapshot distributed by the DHS and FBI under the United States Public Private Partnership Program. He also served as an Advisor to the GM Global Crisis Management team. He is a Certified Protection Professional by the American Society for Industrial Security, with more than 25 years in the Security Industry. Dailey has written several articles related to terrorism analysis, including Terrorism Foreseeability: No longer a crystal ball and Foreign Fighter Networks: Implication for Multinational Corporations published by the United Kingdom’s Continuity Central. In addition, Dailey has written on risk mitigation tools in Geographic Information Systems as a Supply Chain Risk Management Tool as published Directions Magazine & Supply & Demand Chain Executive. Chris Rawley, Counter-terrorism Expert Chris Rawley is CMC’s lead terrorism subject matter expert and has over twenty years of military and corporate security experience. As a Captain in the U.S. Navy, he deployed to Iraq, Afghanistan, Africa, and the Persian Gulf for force protection and counter-terrorism operations. During the onset of Operation Iraqi Freedom, he led riverine and port security patrols in Southern Iraq protecting mine sweeping forces and humanitarian shipping. Later, served tours with the nation’s elite Joint Special Operations Command (JSOC) and as a planner at Special Operations Command’s (SOCOM) Interagency Task Force. While at SOCOM he worked closely with the Federal Bureau of Investigation, Joint Terrorism Task Forces, and numerous other national, state, and local agencies to pursue high value terrorist targets. Most recently deployed as the Deputy Commander for Special Operations Command Forward-East Africa, where he led Navy and Army special operations forces in combating Islamic terrorism in the Horn of Africa. There his team pioneered the military’s use of social media threat monitoring. Mr. Rawley has also held a number of civilian management roles including the Director of Global Security Operations for a Fortune 100 corporation. He has experience across a range of industries, including air transportation, information technology, and commercial real estate. He has an MBA from George Washington University, and is a graduate of Texas A&M University and the Naval War College. Mr. Rawley is the author of Unconventional Warfare 2.0 and numerous articles on terrorism online and in professional military journals.