CEOs Under Attack – The Growing Risks for Corporate Leaders

This article was first published in Chief Executive Officer


The recent assassination of UnitedHealthcare CEO Brian Thompson has cast a spotlight on the vulnerabilities faced by many corporate leaders and is a great example of how C-Suite executive’s safety can affect not only their personal wellbeing, but also can drastically affect a company’s reputation and stock. According to News Nation, UnitedHealth Group shares are down more than 14% since Thompson was shot and the company is counting its losses in billions.

While many corporations see security as an unnecessary financial loss and many won’t consider it in their budget, history has shown us that failing to protect their executives can cause an enormous financial loss. As we have seen, there have been many reported incidents surrounding violence towards C-suite executives. Some of the most well-known cases, the kidnappings of the Toronto crypto company CEO who got kidnapped last November and was held for $1M ransom before being released, the murder of the tech executive Bob Lee, founder of Cash App in San Francisco, in 2023, and the death of another tech executive Vivek Taneja, who was assaulted in downtown D.C. on February of the same year and succumbed to his injuries a day later. These incidents, along with many others, bring again to light potential dangers that corporate leaders face today.

Photo by Tima Miroshnichenko on Pexels.com

Reality Check

While the general public assumes that all high-profile individuals, including celebrities, have security, the reality is that many C-suite executives operate day-to-day without any security presence. Whether they are traveling for business, attending meetings and conferences, or simply going about their daily routines, these individuals often find themselves exposed to various threats without the support of a dedicated security team.

The reasons for this vary. In some cases, the cost of executive protection is not prioritized within the company’s budget. In others, reductions in force (RIF) have affected the security team. Additionally, even when security is provided, many executives resist it, preferring to avoid the perceived inconvenience of having protection around them. One of the biggest challenges when assigning security to specific individuals is their non-compliance, as they believe they will lose their privacy and be forced to change how they live their lives.

Significant Incidents Involving CEOs:

Brian Thompson was the latest victim, but not the only one by far:

  • Pava LaPere, a 26-year-old tech entrepreneur, was found dead on the roof of her building, half-naked, strangled, and brutally beaten.
  • 51-year-old Forrest Hayes, the former senior director of Apple’s worldwide operations, was killed by a high-priced prostitute who injected him with a lethal dose of heroin and then left him to die on his luxury yacht.
  • In 2019, Tushar Atre a tech executive and founder of a Santa Cruz-based web design company, was kidnapped from his home on October 1, 2019. He was later found dead in his girlfriend’s BMW SUV. Several suspects, including former employees, were arrested in connection with his death.
  • In 2022, Artemis Seaford, a high-level executive at Meta and dual U.S. – Greek national, was found to be surveilled by surveillance-for-hire software for around one year.
  • In 2015, Tadas Kasputis, one of the founders of CoinStruction and the ExMarkets crypto-exchange was kidnapped in his hometown Kaunas city in Lithuania by criminals who wanted to gain access to his crypto wallet.
  • In 1998, Bill Gates, was hit in the face with a cream pie as he was about to enter a building for a meeting in Brussels.
  • In 2018, Jeff Bezos had his mobile phone “hacked” after receiving a WhatsApp message.

As we can see from multiple cases, threats towards these individuals can come from any direction and at any given opportunity. Those of wealth or stature in society find themselves becoming a target or being “condemned” by groups who feel that they somehow deserve more and that their goal is best obtained through violence of some sort.

We all saw how executives and personnel from pharmaceutical companies were targeted during the Covid lockdowns and how specific minorities (Asian) have been singled out for harassment recently due to stories surrounding the supposed origins of Covid as well as the tedious political arena of U.S/Chinese relations. Russian businessmen/women have become victims of various crimes against themselves, their families, assets, and companies.

The Need to Protect the Brand

One thing that often escapes the attention of many corporate boards is that CEOs and other high-level C-suite executives are not just leaders of their organizations, they are the face of the company, the human embodiment of the Brand. Protecting these individuals extends far beyond safeguarding their lives; it is also about safeguarding the brand’s reputation, market value, and future stability.

The visibility of executives today has grown exponentially. Shareholders, clients, and the media closely associate a company’s identity and trustworthiness with its leadership team. When a CEO or prominent executive is harmed, whether through assassination, kidnapping or any other physical harm, the ripple effects can be catastrophic for their organizations. Such events can erode stakeholder confidence, shake public perception, and cause financial volatility.

For example, and as we mentioned earlier, following the tragic assassination of UnitedHealthcare CEO Brian Thompson, the company’s stock value reportedly dropped over 14%, resulting in billions of dollars in losses. This kind of damage is not limited to financial metrics alone; it can also impact on employee morale, customer trust, and the company’s ability to attract new business.

The brand-equity connection is further amplified in industries like technology, finance, crypto and healthcare, where executives are often seen as visionaries or cultural icons. Consider figures like Bob Lee, founder of Cash App, whose untimely death not only shocked the tech world, but raised concerns about safety for executives in high-risk urban environments. In these scenarios, the absence of robust protection not only puts lives at risk but also undermines the strength of the brand narrative and leadership continuity.

Corporate boards must understand that executive security is not just some numbers in your budget as an expense, but a proactive and strategic investment in their brand protection. While the first thing that comes to mind is the importance of preserving human lives, organizations have to also realize that any harm done to their executives and employees will have a tremendous impact on their business.

The loss of the leaders in their business (the brains behind their products), the loss of their intellectual property, and the disturbance of their daily operations will cause the employees, customers and investors to lose faith in them. Failing to protect their own executives leaves companies vulnerable, not just to physical threats but to reputational damage that can take years to repair.

Photo by Pavel Danilyuk on Pexels.com

The Giant With Feet made of Clay

One thing that has become increasingly apparent in light of these recent incidents is how surprisingly easy it can be for individuals, often with limited resources, minimal planning, and very little experience, to approach, harm or embarrass high-profile public figures, including CEOs and other C-suite executives. These events expose a concerning vulnerability: corporate leaders, who represent power and authority can still be physically or reputationally damaged with alarming ease.

The very perception of strength that many companies project, be it through financial dominance, market influence, or industry leadership, can quickly crumble when their most visible representatives are attacked or harmed. It reveals the “giant with feet made of clay”: an entity that appears powerful and unstoppable on the surface but, in reality, cannot adequately support or protect its executives, leaving them exposed to danger.

This illusion of invincibility creates a dangerous dichotomy. While corporations may excel at presenting their resilience in business operations, their failure to ensure the security of their leadership undermines their credibility. Each time a CEO or executive is harmed (whether through kidnapping, physical assault, or character assassination) it sends a message to stakeholders, employees, and even competitors that the “giant” is vulnerable. The company’s façade of stability cracks, and the repercussions can be severe:

  • Financial Fallout: Attacks on executives often trigger stock price drops, erode investor confidence, and cause millions, if not billions, in losses.
  • Reputational Damage: If a company cannot protect its leadership, what message does that send to clients, employees, and the public?
  • Operational Disruption: The absence or incapacitation of key executives can destabilize decision-making and hinder long-term strategic goals.

High-profile incidents, like the assassination of UnitedHealthcare CEO Brian Thompson or the kidnapping of crypto executives such as WonderFi’s Dean Skurka, are not anomalies, they are warning signs. They demonstrate that harm can come, not just from organized, well-funded adversaries or criminal organizations, but also from individuals acting alone with limited means. These cases emphasize a critical truth: public figures, especially those in leadership roles, are increasingly accessible targets.

Companies must reassess their priorities and abandon the illusion that their leaders are untouchable simply because they are perceived as powerful. Executive protection for your C-Suite executives is not a luxury or a budget allowance; it is a necessity. A company that fails to shield its most visible assets, its leadership, risks becoming a symbol of fragility rather than strength.

What Comes Tomorrow?

For those closely following the latest incident, the aftermath of UnitedHealthcare CEO Brian Thompson’s assassination reveals troubling insights into public perception and growing hostility toward corporate leaders. Social media platforms quickly became a breeding ground for disturbing reactions. The majority of users were seen mocking or justifying Thompson’s death, with some going so far as to openly encourage similar attacks against other CEOs.

This online vitriol has already inspired real-world consequences. In a concerning copycat case, Briana Boston, a 42-year-old Florida woman, was charged after allegedly making a threatening call to BlueCross BlueShield over a rejected medical claim. While her actions did not escalate to violence, the threat underscores how quickly frustrations directed at executives can boil over into actionable hostility.

The assassination of Brian Thompson has set off a dangerous chain reaction. According to a recent warning issued by the New York Police Department (NYPD), US healthcare executives now face a heightened risk to their safety. Authorities uncovered an online “hitlist” circulating in the wake of Thompson’s death, featuring names, photos, and salaries of numerous other health insurance executives.

This list has amplified the sense of vulnerability. Executives who were once seen as inaccessible are now being publicly targeted. Compounding the issue, “wanted” posters featuring the faces and personal details of healthcare CEOs have appeared throughout Manhattan. These acts, whether meant as intimidation, protest, or a precursor to violence, signal a troubling escalation of hostility toward corporate leadership.

We are dealing with a disturbing growing phenomenon: digital outrage is no longer contained to online spaces. Social media platforms, already rife with grievances about systemic inequities, economic struggles, and corporate distrust, are now amplifying calls for real-world action against executives. Online forums and posts can radicalize individuals, especially those with personal frustrations or grievances, encouraging them to take matters into their own hands.

What comes tomorrow is not limited to healthcare. Brian Thompson’s assassination and its fallout serve as a stark warning to leaders across all industries. CEOs and C-suite executives are increasingly vulnerable, both as visible symbols of power and as targets of systemic frustrations.

Companies that fail to recognize and respond to this evolving threat landscape risk not only the lives of their leaders but also the stability of their operations and the trust of their stakeholders. The time for reactive measures has passed. A proactive, strategic approach to executive protection is now a necessity.

Don’t Be The “Giant With Feet of Clay’’

The evolving threat landscape necessitates a proactive approach to C-Suite executive protection. Companies should start thinking proactively, stop placing security as the first budget cut and must balance the need for security with the personal preferences of their executives, ensuring that protection measures are both effective and minimally intrusive.

  1. Prioritize Executive Security: They should start treating executive protection as an integral part of corporate strategy, not an afterthought.
  2. Adopt Proactive Risk Management: Conduct threat assessments, monitor vulnerabilities, and implement protective measures before incidents occur.
  3. Invest in Discreet and Effective Security Solutions: Develop security protocols that do not disrupt executives’ lives but still provide robust protection.

As we have seen, the message is clear: the world has changed, and so must corporate priorities. CEOs and other C-suite executives are not only the face of their organizations, but they are also vital assets whose safety directly impacts a company’s stability, reputation, and bottom line. Ignoring this reality exposes businesses to unnecessary risks that can have catastrophic consequences.

The “giant with feet made of clay” is no longer a metaphor; it is a warning. Companies must shed the illusion of invincibility and untouchability and take decisive, proactive action to protect their leadership. By prioritizing security, managing risks effectively, and implementing discreet security measures, businesses can protect not only their executives but also their brand, market value, operations, and future success.

In an era where a single incident can bring a giant to its knees, the choice is simple: adapt and fortify, or remain vulnerable and hope you are not next.

Keeping C-Suite Executives Safe

There have been many reported incidents surrounding violence towards C-suite executives, with the most well-known case, the murder of the tech executive Bob Lee, founder of Cash App in San Francisco, last year and the death of Vivek Taneja, who was assaulted in downtown D.C. on February 2nd and succumbed to his injuries a day later. These incidents, along with many others, bring again to light the ongoing issue with crime rates in specific areas and the potential dangers that corporate leaders may face. We can all agree that in today’s world, the safety and security of high-profile individuals, particularly C-Suite executives, has become paramount. Targeted attacks, opportunistic attacks, kidnappings, thefts, workplace violence, cyber threats, natural disasters, and active shootings are some of the frequent risks that can pose a threat to their safety.

Photo by Christina Morillo on Pexels.com

The Reality for Many Executives

One thing that the public does not know is that, unlike high-profile politicians or celebrities who often have round-the-clock security details, many C-Suite executives operate day-to-day without the constant presence of protective teams. Whether they are traveling for business, attending business meetings and conferences, or simply going about their daily routines, these individuals may find themselves exposed to various threats without the support of a security entourage. Often, the cost of their safety is not considered to be within their company’s budget, and many of them are fairly resistant to having a team of protectors consistently around them.

Opportunistic and Targeted Threats

  • Pava LaPere, a 26-year-old tech entrepreneur, was found dead on the roof of her building, half-naked, strangled, and brutally beaten with a brick. She was killed by Jason Billingsley who, having been under police surveillance for another woman’s sexual abuse, was allowed to enter the building by LaPere herself.
  • 51-year-old Forrest Hayes, the former senior director of Apple’s worldwide operations, was killed by a high-priced prostitute who injected him with a lethal dose of heroin and then left him to die on his luxury yacht.
  • In 2019, Tushar Atre was kidnapped from his own home early in the morning hours and later on found dead. He was stabbed and shot multiple times.
  • In 2022, Artemis Seaford, a high-level executive at Meta and dual US. – Greek national, was found to be surveilled by surveillance-for-hire software for around one year. Seaford was another victim of the “Greek Watergate,” for which the Greek government has been accused of spying on a number of its own citizens, including politicians, journalists, activists, and business owners.

As we know and can clearly see from multiple cases, threats can come from any direction and at any given opportunity. Those of wealth or stature in society find themselves to becoming a target or being “condemned” by groups who feel that they somehow deserve more and that their goal to achieve is best obtained through violence of some sort. We all saw how executives and personnel from pharmaceutical companies were targeted during the Covid lockdowns and how specific minorities (Asian) have been singled out for harassment recently due to the tedious stories surrounding the supposed origins of Covid as well as the tedious political arena of U.S/Chinese relations. Russian businessmen/women have become victims of various crimes against themselves, their families, assets, and companies.

Photo by Rebrand Cities on Pexels.com

How many Americans are targeted while overseas during their business or leisure trips, and how many executives are regularly targeted during company layoffs as well? While the first thing that comes to mind is the importance of preserving human lives, organizations have to also realize that any harm done to their executives and employees will have a tremendous impact on their business. The loss of the leaders in their business (the brains behind their products), the loss of their intellectual property, and the disturbance of their daily operations will cause the employees and customers to lose faith in them and they won’t feel safe within their facilities anymore.

Keeping Executives Safe

One may ask, how then can executives be safe and protected against natural disasters or physical and cyber security threats if they cannot be provided with a security team? The different attacks, the threat level, the fast social-political-geopolitical changes, and incidents that have already taken place, underscores the critical need for C-Suite executives to be better prepared and equipped with basic safety procedures and skills to ensure their well-being in the absence of dedicated protection.

Corporations have a responsibility to invest in the education and training of their executives to mitigate risks and safeguard their well-being. By providing specially designed safety training programs, companies can empower their leaders with the tools and knowledge necessary to protect themselves and make informed decisions in challenging circumstances. Not only will a safety training program benefit the individuals and organizations by saving lives, but it will also help with mitigating legal and financial risks, protecting intellectual property, protecting daily operations, improving productivity and morale, demonstrate corporate social responsibility, and enhance company’s reputation. We know that not all organizations have physical security teams for their executives. Some may not have the budget for it, and some, though the evidence is quite clear, do not see the necessity for it. However, there is a way for all businesses, big and small, to make their people safer.

Safety Educational Programs for Executives

Our team at LeMareschal has had the pleasure of conducting private classes for C-Suite executives and tech companies’ employees in the past. From our experience, we found out that many approach the training with an open mind and realize early on how much they need it, and some even say “I wish I would have done this earlier”. When you decide to provide these type of training options to this specific target group, you should consider who these people are and which environments they exist, create, and travel within.  The purpose of these training programs is to provide them with the situational awareness that is required to navigate in the society that we live and travel in, and the knowledge and skills needed to protect themselves and their employees from potential safety risks. In today’s world, personal safety is increasingly important for everyone!

Considering the fact that many of these executives and employees are very busy individuals, there is a time restriction issue that you will always have to compete with. The training has to be long enough to give them a solid understanding of included topics, but also short enough to make it possible for them to attend. Sometimes people and organizations may be interested, but the timeframe required doesn’t allow them to give it any serious consideration.

 

What Topics Should an Executive Be Trained in?

As we’re sure there are quite of number of opinions on this subject, we have listed below some of the topics that we have found to be most helpful.

Situational Awareness – How to be aware of their surroundings and identify potential threats. This includes identifying dangerous areas, suspicious individuals, and potential safety hazards.

Body Language and pre-attack indicators – How to identify suspicious individuals according to their body language and facial expressions. This will also teach them how to identify deceit.

Basic Threat Assessment – How to assess potential threats to their safety, including identifying potential risks in their work environment, while traveling, and even in their homes.

Cybersecurity Awareness – Executives must be taught the importance of cybersecurity and how to protect their personal and professional devices and their confidential information from online threats.

Travel Safety – How to stay safe while traveling, including how to navigate unfamiliar locations, how to use public transportation safely, how to avoid common travel scams, how to be safe in regards to hotels, how to identify and estimate risks while travelling, how to plan for a safe trip and what to consider when preparing in advance.

Cultural Etiquette – How to avoid risk and embarrassment and how to draw less attention by adapting to local cultural behaviors.

Emergency Preparedness – Executives will gain the knowledge and skills needed to respond to emergencies, including natural disasters, medical emergencies, and active shooter situations.

Active Shooters – How to respond in the case of an active shooting situation. What steps to take to protect themselves and others.

Security Measures – How to secure their homes, offices, and personal belongings to reduce the risk of theft and burglary and how to use personal protective equipment and apps.

Stalking and Harassment – How to identify stalking signs, how to report it, and how to deal with it before it escalates.

Conflict Management – How to identify different categories of conflict, how to manage it properly, and how to de-escalate situations as they arise.

First Aid – This will help executives learn the basic first aid skills in case they have to respond to medical emergencies and injuries until professional help arrives.

 

In an era where threats to personal safety are ever-present, investing in the education and training of executives is not just a prudent business decision, but a wise preventative strategy. By equipping the ‘’brains’’ of your organization with the necessary skills and knowledge to protect themselves, your corporation can mitigate risks, protect your most valuable assets, and demonstrate a commitment to the well-being of your leadership team.

LeMareschal’s subject matter instructors are ready to come alongside and instruct your organization on how to be safe, more aware, and thus highly productive.

Any further questions? Give us a call for a free consultation.

Event Security for High Profile Individuals

In the last months, we have seen many videos from what one may label a ‘failed’ security operation where public figures were attacked or embarrassed during their public appearance at an event. Protecting high-profile individuals during an event or public speech requires very careful and detailed planning. Despite the big challenges for the security team, public events are essential for high-profile individuals, especially for politicians, celebrities, or business leaders who need to engage with their fans, audience, or electorate.

Event Security is a uniquely separate topic, and one needs to spend quite some time studying it and implementing all the necessary steps. Unfortunately, most EP schools do not teach it, and some invest very little time in it considering the fact that the key to Event Security is to manage and mitigate the risks with thorough planning, intelligence, and coordination of multiple parties involved.

The protective measures for any event will depend on the event size (private, public, big, small), event purpose (political, cultural, educational, etc.), threat levels, speakers’ public visibility, and value to their organization. (what is the value of each speaker if they get harmed or embarrassed?)

Understanding the complexities involved in securing high-profile individuals during public events and why such events can pose several inherent risks for high-profile individuals.

Visibility: Public events mean the high-profile person is largely exposed, making it easier for potential attackers to locate, approach, or target them. When your clients are on the platform (Behind the podium) or anywhere on the stage, they are vulnerable targets.

Predictability: Public events are almost always scheduled and provide potential attackers with the time to plan their actions. Even with meticulous security planning, knowing the timing and location of an event in advance gives adversaries a significant advantage.

Crowd Control and Media Challenges: Large gatherings are inherently harder to control. Even with barriers and security personnel, managing a crowd can be unpredictable. Someone with malicious intent could potentially blend in or infiltrate as the event support help or basic crowd control, making detection harder and giving them very proximal access. The media coverage that accompanies many public events involving high-profile individuals can be a double-edged sword. While it spreads the message of the event from a marketing aspect, it also broadcasts the vulnerabilities and security arrangements in real time.

Multiple Access Points: Venues for public events often have multiple entry and exit points, which can be difficult to secure completely.

Multiple Parties Involved: Event organization involves the coordination of multiple parties, vendors, venue management, event organizers, and even different security entities. Your client is not the only one with a security detail, most of the time you will find the presence of law enforcement, uniformed guards, and Executive Protection teams for multiple public figures who are present. More involved parties make the coordination harder as communication or logistical breakdowns among these parties can create security vulnerabilities and confusion.

Sniper and Active Shooter Threats: Open-air events or events with vast, unobscured perimeters can pose sniper threats, especially if there are high vantage points nearby. An active shooter can be another threat for events since one can find many people who share the same ideas, and goals (political, social, etc.) gathered in the same place.

Terrorist Attack and Bomb Threats: Crowded areas are high-impact targets for those wanting to cause mass harm. This makes guests and staff screening, detection of explosives (K9 is best), and managing evacuation protocols critically important.

Public Sentiment: High-profile individuals, especially politicians or controversial figures, can evoke strong emotions. Public events can attract not just fans and supporters, but also protestors or individuals with negative or hostile intentions.

Reliance on Local Infrastructure: High-profile individuals and their security teams often have to rely on local infrastructure, which they might not be familiar with. This includes clearly understanding local threats, coordination and relying on local law enforcement, and navigating unknown, or lesser-known, venues. How many times have you found yourself in an event where if it was for you, you would have never chosen that place from a security standpoint? The thing to always remember is that security teams, for the most part, have very little or no say in the venues and must work with and do their best to function with and plan around, the circumstances, locations, and other plans made by individuals who do not have security protocols in mind.

Basic Considerations for Securing Your Client during Public Events:

Photo by Werner Pfennig on Pexels.com

Advance Planning & Risk Assessment: Conduct a thorough risk assessment of the venue, identifying potential threats and vulnerabilities. Scout the location beforehand. Look for multiple entry and exit points, chokepoints, and rooms that can be used as safe rooms. Assess local threat intelligence and political climate.

Physical Security: If you are responsible for the event security, establish a secure perimeter around the venue with barricades or barriers. Control access points with security personnel, metal detectors, and possibly explosive-detection canine units. Inspect the stage/platform and immediate surroundings for potential threats and listening devices. Ensure that there’s an emergency evacuation route and a safe room or fallback position. If you have no control over the event security planning and your client is invited as a speaker/guest then consider gathering as much information you can for the established security measures, evacuation plans, and other speakers/guests (your client may be at risk because he is present in an event where another speaker who is targeted is present). Now is your chance to put your soft skills into action and make friends with event organizers, event security, and law enforcement.

The Podium: In public speeches, when your client is on the podium, he is the perfect target, all lights and attention are on him. The podiums are usually lightweight and small. If the threat level is high, you should consider placing armored plates for better ballistic protection. Consult your client to avoid unnecessary movements from the podium. Consider placing your own protective agents as close as possible to the podium and in crucial spots where they can react if needed be. Establish a plan for reaction and evacuation, rehearse it with your team, and make sure your client is briefed on it as well.

Seating Arrangements: If possible, consider having the client seating in a location that is lower than the security team so that he is less visible. Bear in mind that depending on how many high-profile speakers/guests will be present, the number of seats for the security team will be very limited. On many occasions, you won’t be able to sit next to or close to your client. As all the spots are reserved for guests only. The ideal seating plan would be half-moon (semicircular) shaped with the front row being lower than the back. When the threat level is high, serious consideration should be given to armoring the chair and the speaking podium with armored plates. If possible, arrange to have known personnel, to you and your client, seated next to or close to him.

The Stage: If you are the one responsible for the event security, consider keeping a good distance from the stage to the first row of seats of at least 7-8 meters. In this area, only security personnel or individuals accompanied by security team members should move. The first row of seats should be empty to act as a barrier to anyone from the crowd wanting to approach the stage. The second row should be for individuals who are speakers. When these individuals would need to go on stage, only half of the seats should be reserved so that they approach from one side and return to their row from the other. This way, the front of the stage will never be filled with people which someone could use as cover for an attack. The security team members should be positioned around the guests to have a full visual check of the audience. They should be able to intervene anywhere throughout, and no one should be able to get near the stage unaccompanied.

Personnel: If you are responsible for the event’s security, deploy both uniformed and plainclothes security personnel who can blend in with your guests. Screen all the vendors, catering, and anyone who has access and a presence at the event. Consider having an emergency medical team on standby.

Communication: Establish a clear communication plan among all security teams. Designate codewords for specific emergencies, code names, use encrypted radios, and have a backup communication method.

Surveillance & Counter-surveillance: Use CCTV to monitor the crowd and surroundings. Deploy undercover agents in the crowd for counter-surveillance and to identify suspicious behavior. Each report should be immediately evaluated for relevance and threat level.

Vehicle Security: The driver always stays in the vehicle. Plan multiple egress routes from the location to account for different scenarios.

Screening & Access Control: Ensure that everyone entering the venue undergoes thorough screening. Control VIP areas and ensure only authorized personnel have access. Use a guest list or invitation-only system if possible.

Public Interaction: If your client plans to interact with the audience or media, pre-plan your team’s positions and manage the crowd accordingly. Watch out for anything/anyone that stands out as unusual and always watch the hands of those close to your client. Are they holding something that can harm or embarrass him? Be prepared to extract your client swiftly in the event of a disturbance. Hands, hands, hands…And scan your zone of responsibility and scan again.

Intelligence & Coordination: Do your intelligence gathering and evaluation. Monitor social media for any potential threats or discussions that might indicate planned disruptions. Digital forensics can also play a role in pre-event threat assessment. Liaise with local law enforcement and potentially federal agencies (depending on who your client is, on the country and threat level). Gather intelligence on any known threats or groups that may target your client, or other speakers at the event.

Case Studies: Highlight previous incidents involving security breaches or attacks on high-profile individuals during public events. Discuss what went wrong and the lessons learned from each incident.

Utilize Technology: This includes surveillance drones, facial recognition systems, biometric access controls, and AI-driven threat detection systems.

Liaison with Other Entities: Collaboration with other guests’ security teams, agencies, and private security firms can provide additional resources and intelligence. Highlight the importance of sharing information and working in tandem.

Psychological Profiling: Make sure your team has a good understanding of crowd psychology and potential attacker profiles. This can help in preempting potential threats. Using COVPRO agents in the crowd will always give a significant advantage when providing a proactive response.

After-Action Reviews: After every event, conduct a debriefing session. Discuss what went well, what could be improved, and any potential threats that were identified. This helps in refining strategies for future events.

Legal and Ethical Considerations: Discuss the balance between ensuring security and respecting individual rights. In many jurisdictions, there are legal limitations on what security personnel can do, especially concerning personal searches, data collection, and surveillance.

Remember, during events, the goal is to have multiple layers of security so that if any one layer fails, another can immediately respond. The most effective protection details work quietly in the background, providing a safe environment while being as unobtrusive as possible.

Do you want to learn more about Event Security and our specialized courses? Contact Us Today!

#eventsecurity #EventSecurityTips #HighProfileProtection #PublicAppearanceSafety #CelebritySecurityTips #PublicEventsProtectionStrategies #BusinessLeaderSafety #SecurePublicEngagements #EventRiskManagement #PublicEventsSecurityRisks #ProtectiveLayersForVIPs #LeMareschalSecurity #EventSecurityTraining #SecurityMasterclasses

Conflict Management In Protective Operations

One of the most underestimated qualifications for executive protection professionals is their ability to deal with #conflict as it pertains to incidents that occur while on duty, as well as off duty. Every #security professional, regardless of their role, will inevitably encounter disagreements and confrontations. These conflicts can arise from differing opinions, expectations, or agendas. However, the way these conflicts are dealt with can be the difference between a safe resolution and a potentially uncontrolled, threatening situation. The ability to manage conflict effectively is, therefore, a non-negotiable skill set for any security professional. How you deal with a tense situation and how fast you resolve it can be crucial for everyone, particularly for the safety of your client, your team’s, and yours.

If conflict remains unsolved or mismanaged, it may lead to a dangerous environment. A disgruntled fan, for instance, who is denied a photo opportunity with their idol, may react unpredictably if their emotions are not appropriately managed. Conflicts, in this context, arise from disagreements or clashes of interest between two or more parties. This could be an irate client, an aggressive member of the paparazzi, a restless fan, or even a stressed family member of the client.

Conflict situations often rise up quickly and can be potentially triggered by strong emotions, such as anger, sadness, insult, or embarrassment. An effective conflict manager must also possess emotional intelligence to control their own emotions, remain calm, use clear and polite language, and maintain a positive attitude. This is as much, or more, about managing yourself as it is about managing the overall conflict.

Understanding Conflict in Protective Operations

Conflict is a natural part of human interaction. It arises when individuals have differing viewpoints or when their expectations aren’t met or are misunderstood. While it’s impossible to agree with everyone on every issue, how one manages these disagreements is crucial, especially in the executive protection sector. For instance, an agitated fan waiting in line for hours might react unpredictably if their emotions, driven by a need to be recognized, aren’t addressed appropriately. The way you approach a conflict situation can change during the course of the situation, but it can also change the result of it.

Why is it important for executive protection agents to be trained in conflict management?

It is important for executive protection agents to be trained in #conflictmanagement for several reasons:

1. Prevention of Violence/De-escalation: EP agents often work in high-stress environments where conflicts can escalate quickly, leading to #violence or other security #risks. By having the skills to manage and resolve conflicts effectively, EP agents can prevent situations from getting out of control and reduce the risk of harm to their clients, themselves, their colleagues, and/or the public.

2. Maintaining Safe and Secure Environments: Conflict can disrupt the normal functioning of an organization or community, and it can have negative impacts on #safety and security. EP agents who are trained in conflict management can help to maintain safe and #secure environments by quickly identifying and resolving conflicts before they escalate.

3. Enhancing Communication Skills: Conflict management training can enhance the communication skills of EP agents, which are essential for effective conflict resolution. Effective communication skills can help to de-escalate conflicts and foster positive relationships with the client, household personnel, the public, colleagues, and other stakeholders.

4. Better Decision-Making: Conflict management training can also improve the decision-making skills of EP agents. When faced with a conflict, these professionals must make quick and effective decisions that are in the best interest of public safety and their client’s safety. Conflict management training can help security professionals to make informed and rational decisions in high-pressure situations.

5. Operational Excellence: Conflicts can also arise in the context of security #operations, such as during #event security or protective operations. Effective conflict management techniques can help ensure that these activities are carried out in a way that minimizes harm to anyone involved and maintains the security of the operation.

Different types of conflict

There are several types of conflict, including Interpersonal conflict, Organizational conflict, Economic conflict, Intergroup conflict, Societal conflict, Internal conflict, External conflict, and Intra-personal conflict. Each type has its own unique characteristics, causes, and potential solutions. Effective conflict resolution strategies often depend on accurately identifying the type of conflict and tailoring the approach to the specific situation.

What kind of conflicts are more common for Executive Protection agents to encounter in their work?

  • Interpersonal Conflicts: EP agents may encounter conflicts between individuals, such as disagreements between co-workers, customers, the public, clients, and their family members.
  • Organizational Conflicts: EP agents may encounter conflicts within their organization, such as disputes between management and employees or conflicts over policies and procedures.
  • Legal Conflicts: EP agents may encounter conflicts related to legal issues, such as disputes over contracts, liability, payment, or work conditions.
  • Cultural Conflicts: EP agents may encounter conflicts related to cultural differences, such as conflicts related to language barriers, customs, or religious practices.
  • Conflict with law enforcement or regulatory authorities: EP agents may need to deal with conflicts that arise between their organization and law enforcement or regulatory authorities, such as disputes over compliance or licensing requirements.
  • Conflict with external groups or individuals: EP agents may need to manage conflicts that arise between their organization and external groups or individuals, such as protesters or activists who disagree with the organization’s policies or actions.
  • Conflict related to security risks: EP agents may need to manage conflicts related to security risks, such as disagreements over the best approach to mitigating a security threat or managing the consequences of a security breach.
  • Conflict related to resource allocation: EP agents may need to manage conflicts related to resource allocation, such as disputes over budget allocations or competing priorities for security resources.

What causes conflict?

It is important to understand the underlying causes of conflict to effectively manage and resolve conflicts. As we will see there are many causes and sources of conflict, which can vary depending on the context and the parties involved.

Most common causes and sources of conflict:

  • Bad Communication
  • Differences in values and beliefs
  • Competition for resources
  • Power imbalances.
  • Personality clashes
  • External factors
  • Historical Grievances

What are the consequences of conflict mismanagement in protective operations?

Mismanaging conflict in protective operations can have serious consequences, including:

  • Escalation of violence: If conflicts are not managed effectively, they can quickly escalate and turn violent, posing a risk to the safety of the EP agent, the client, and the public.
  • Compromised security: Conflict can distract the EP agents from their primary duties, leaving vulnerabilities that can be exploited by #criminals or other #hostile actors.
  • Damage to reputation: Mismanagement of conflict can damage the #reputation of security organizations and reduce public trust in their ability to maintain safety and security.
  • Legal consequences: If conflicts are mishandled, EP agents and their organizations may face legal action or #liability, which can be costly and damaging to their reputation.
  • Employee turnover: Unresolved conflicts can lead to high levels of #stress and dissatisfaction among executive protection personnel, leading to higher turnover rates and reduced productivity.
  • Reduced effectiveness: Mismanaged conflicts can reduce the effectiveness of protective operations, as personnel may be distracted by ongoing conflicts and unable to focus on their primary responsibilities.

Managing Conflict Situations

***Conflict resolution starts with understanding what is happening and why is happening***

Effective conflict management in executive protection settings involves several key principles, including active listening, clear communication, respect for different perspectives, and a focus on finding mutually beneficial solutions. By using these principles to manage conflicts, EP agents can build trust and maintain positive relationships with the public, while also preventing or de-escalating potential security threats.

The key to successful conflict management lies in communication. A good understanding of both verbal and non-verbal communication can help defuse tensions, as can empathizing with the aggrieved party and acknowledging the problem. Overarching all of these is the respect we must have for differences, be it cultural, professional, religious, or economically driven.

Photo by Andrea Piacquadio on Pexels.com

Essential Conflict Management Skills

  • Professionalism and Positivity: Always maintain a professional demeanor. Use clear, polite language and remain calm. Having a positive and peaceful approach will begin to lower any tension.
  • Effective Communication: Vital for defusing potential conflicts. Listening actively and speaking clearly can prevent misunderstandings.
  • Stress Management: Stay alert and calm, even under pressure. A calm demeanor aids in understanding both verbal and non-verbal cues. Be able to manage your own stress levels, when you are calm, you can have a better understanding of both verbal and nonverbal communication.
  • Emotional Regulation: Emotions can be contagious, especially emotions like fear, anger, and anxiety. Another person’s emotion may affect your actions, thoughts, feelings, and vice versa. By controlling your own, you can prevent escalating the situation. Remember that in most cases you may be called names, be insulted, or accused of things that are not true. If you can control your own emotions, you will be able to use a calmer voice, proper words, and use positive body language therefore the other person won’t feel, threatened, insulted, challenged, or frightened of you.
  • Empathy and Respect: Recognize the importance of others’ feelings and always be respectful of differences, whether cultural, religious, or otherwise. No matter how unimportant to you a matter may seem, to that person, it is very important and apparently has made them feel that way (angry, sad, disappointed, insulted, etc.). Always be mindful and respect the diversity of cultural, professional, religious, economical, etc. backgrounds. Avoid any word or gesture that may be disrespectful or be seen, or misunderstood, as a slur or stereotypical judgment.

Identify, Assess, and Mitigate Risks in Conflict Situations

Recognizing potential #threats, assessing the situation and the people involved, and adjusting responses accordingly, are essential steps in conflict #mitigation. It may also be necessary to take a step back and/or call for help or assign someone else to deal with the situation. If you have gotten too close to the situation, having someone new handle the de-escalation can bring about a more peaceful conclusion to the conflict. In many cases, adopting an assertive behavior rather than an aggressive one, maintaining personal space, and calmly building rapport with the aggrieved party can also significantly decrease the tempo and reduce risks associated with the conflict.

Risk Mitigation in Conflict Situations:

  • Understand the Individual: Listen honestly and actively to their concerns and emotions.
  • Empathy and Apology: Even if not directly at fault, acknowledging their feelings can de-escalate tensions.
  • Acknowledge the Problem: Reassure them of your intent to help and provide solutions.

Conflict Management Strategies to Reduce Risk

  • Recognize potential threats.
  • Assess the situation and environment.
  • Adjust your response based on the assessment.
  • Maintain personal space and adopt a non-aggressive stance.
  • Remain calm, remember that your demeanor can influence the other person’s behavior.
  • Avoid physical contact.
  • If necessary, relocate the conversation to a more suitable location.
  • Listen actively and be aware of your own biases and assumptions.
  • Clearly communicate your role and intent.
  • Adopt assertive, not aggressive, behavior.
  • Try to view the situation from their perspective.
  • Show empathy.
  • Explore options.
  • Be respectful and avoid blaming or shaming.
  • Ask open-ended questions.
  • Be proactive.
  • Avoid arguing, being defensive, making threats and ultimatums.
  • Use “I” statements.
  • Be firm but fair.
  • Know your limits. If the situation doesn’t improve, consider switching with a colleague for improved communication.
  • Document the incident.

Never forget that conflict management in security operations is not about winning or losing, it’s about #mitigating #risks, maintaining #safety, ensuring respect, and fostering understanding. With the right approach, conflict can transform from a potentially explosive threat into an opportunity for growth, understanding, and learning.

If this interests you, or you would like to have your employees trained in Conflict Management please reach out to us!

#ExecutiveProtection #ConflictManagement #SecurityProfessionals #Bodyguards

#FemaleBodyguards #DeescalationTechniques #ProtectiveOperations #RiskMitigation

#EPTraining #SecurityRisks #EffectiveCommunication #EmotionalIntelligence

#SafetyFirst #ProfessionalConflictResolution #SecurityOperations #AggressionManagement

#CrisisManagement #ProtectiveAgents #ConflictResolutionSkills #SecurityThreats

#SecurityBestPractices #CorporateSecurity #EventSecurity

The Rise of Boutique Security

A New Era of Personalized Protective Solutions for Individuals, Families and C-Suite Executives

In the glossy pages of lifestyle magazines, we often read about the latest trends in fashion, travel, and luxury. However, there’s a new trend that’s quietly making waves among the elite, and it’s all about security. Not just any #security, but boutique security companies. Companies that provide security for the families of the rich and famous are not something new, however, what is new is the rise we see in Boutique Security Companies.

Photo by RDNE Stock project on Pexels.com

As the world becomes increasingly complex and threat actors evolve, the demand for specialized, personalized security solutions is on the rise, especially among #celebrities, top corporations, and high-net-worth (HNW) and ultra-high-net-worth (UHNW) individuals.

Why Boutique Security?

The term ’boutique’ often brings to mind images of #exclusive, high-end shops offering unique, tailor-made products. In the realm of security, the concept is no different. Boutique security companies are not the average security providers, they are a class apart, offering a level of service that is both exquisite and unparalleled but also specialized in tailored made #concierge type of security solutions. These companies can see the needs of their customers and create unique solutions. In 2002, when we saw the need for female executive protection agents, and we created Athena Worldwide, and in 2008 we created Nannyguards, a hybrid service combining #childcare and #security. Today through our main company LeMareschal LLC, not only can we provide a variety of specialized security solutions to our customers, but we can also create unique services based on their needs.

What makes a Boutique Security Company Special?

  • Customization: Unlike larger security firms that offer one-size-fits-all solutions, or do not have the time and personnel dedicated to each one of their clients, boutique security companies can not only be more flexible in their approach, but they do care for client’s satisfaction. They understand that every client is unique, with specific needs and desires, and they put a lot of emphasis on customer service. This allows them to craft individualized security solutions, ensuring that clients receive the utmost care and protection.
  • Exclusivity: With premium services and dedicated attention, come premium prices. This often results in a select and high #standards clientele, allowing boutique security firms to dedicate more resources and attention to each client. Something to highlight is that the smaller size of these firms doesn’t diminish their value, on the contrary, it ensures that every client is treated with the importance they deserve and that the solutions they receive are tailor-made for them.
  • Expertise: The majority of boutique security firms are owned by #seasoned security professionals who know the importance of such services and are deeply invested not only in their business’s success but their clients’ safety and #satisfaction. Their reputation is on the line, ensuring a high level of #accountability, commitment, and unparalleled service.
  • Lifestyle Integration: In the world of opulence and grandeur, where every experience is curated to exude #luxury, boutique security firms effortlessly blend into this high-end #lifestyle. Their specialized security teams are not just trained to protect you but are also skilled in the art of discretion. Whether it’s a star-studded gala, an exclusive art auction, or a private island getaway, boutique security personnel are virtually invisible, ensuring a seamless experience. They are attuned to the nuances of high society, understanding when to fade into the background and when to step in, all without disrupting the event’s ambiance or the guests’ enjoyment. Imagine having a #bodyguard who not only protects you but also knows the perfect moment to step aside so you can enjoy a private conversation or a breathtaking view. It’s this harmonious integration that makes boutique security not just a service, but an essential component of the luxury lifestyle narrative.
  • Global Perspective: As elite customers travel around the world, the nuances of boutique security shift, reflecting the unique #cultural, #political, and #social landscapes of each region. In the opulent cities of the Middle East, boutique security often intertwines with royal protocols, ensuring that protection aligns with age-old traditions and customs. Meanwhile, in the bustling metropolises of Asia, the emphasis might lean towards technological integration, harnessing the latest technological and counter-surveillance innovations. Europe, with its rich tapestry of history and aristocracy, sees boutique security firms offering services that respect and preserve the sanctity of historic events and venues. Over in the Americas, the focus often pivots to #personalization, with security details tailored to the individual lifestyles of Hollywood celebrities, tech moguls, and other high-profile personalities. This ability to shift approaches across continents not only underscores the #adaptability and #versatility of boutique security but also highlights its universal appeal and relevance in today’s interconnected world.
Photo by Tima Miroshnichenko on Pexels.com

LeMareschal, is a boutique security company that was created to stand out for its commitment to #excellence. Offering tailor-made #security, #travel, and #transportation solutions, LeMareschal is not just about security, it’s about offering a complete package service for #HNW, #UHNW, #celebrities, and C-Suite Executives who value #concierge type services and their peace of mind. Whether you are looking for protective teams (bodyguards), residential security, luxury and secure transportation, female executive agents, or child protection specialists, LeMareschal can provide the best for the best in your life.

In today’s world, the need for personalized security solutions has never been more critical. Boutique security firms, with their focus on customization, exclusivity, and expertise, are leading the way in providing the elite with the protection they deserve.

#BoutiqueSecurityServices #BoutiqueSecurityFirm #EliteProtection #HNWProtection

#UHNWSecurity #ConciergeSecurity #LuxuryProtection #TailoredSecurity

#ExclusiveSafety #HighEndSecurity #BoutiqueProtection #CustomizedSecurity

#EliteSafetySolutions #PremiumProtection #LeMareschalSecurity #Nannguards

#AthenaWorldwide #FemaleBodyguards #Bodyguards #CelebrityProtection #RoyalFamilyProtection #SecuritySolutions #SecureTransportation #SafeTravels #TravelSecurity #ExecutiveProtection

Reading the Room

Can you read the room? One of the most critical skills for executive protection professionals is the ability to ‘’read the room’‘. This skill goes beyond traditional security protocols and involves a keen understanding of human behavior, emotions, and the ability to anticipate potential #risks before they materialize. Being able not only to read your client, but also your teammates, the general public, and any other person you come in contact with during your daily operations, is valuable beyond measure.

A room, in the context of #executiveprotection, refers to any environment or space in which a protected individual operates. It can range from your client’s vehicle, a small meeting room to a large conference hall, a corporate boardroom, or a public event venue. Reading the room involves grasping the nuances of the environment, the people present, and the emotions prevailing within the space. It requires constant vigilance and adaptability to ensure proper communication, positive cooperation with the client, and everyone else surrounding them, as well the client’s safety and well-being at all times.

“Reading the room” enables executive protection agents to detect emotions and adapt their approach, conversational tone, or in most cases just remain quiet. By closely observing body language, facial expressions, and interactions among attendees, staff, corporate members, and even family members, agents can identify not only ‘’moods’’ but also individuals who may pose a risk to the client’s #safety.

A protector’s presence alone can influence the room’s atmosphere. By maintaining a calm and composed demeanor, these professionals can create a sense of security among anyone near or involved with their client. This feeling of #safety is essential for a productive and focused environment, especially during events like high-stakes meetings or public appearances.

We all know that events and situations can change rapidly, especially in the world of executive protection. Agents must be adaptable and quick-thinking, able to adjust their strategies, personalities, and conversational tones on the fly. By reading the room, they can gauge shifts in emotions or intentions, allowing them to respond appropriately and ensure safety remains a top priority.

Reading the room also involves understanding the unspoken cues and dynamics among people in the environment. This understanding can help executive protection agents facilitate effective communication between the client, themselves, and others. By being attuned to the mood and emotions of the room, agents can identify when, or when not, to interject or offer support discreetly, creating a seamless and professional interaction.

In high-pressure situations, emotions can run high, potentially leading to conflict or crisis. Agents who can read the room have a better chance of de-escalating tense situations before they escalate into something more significant. Their ability to identify the triggers of potential conflicts and address them promptly can prevent violence and ensure a safe resolution.

The role of an executive protection agent is far more complex than just providing #physicalsecurity. It demands a holistic approach that includes the ability to “read the room” effectively. By understanding the environment, emotions, and potential threats within a space, #protectors can create a #secure and productive atmosphere for their clients. This skill is paramount in ensuring the safety and well-being of those under their care, making it an indispensable aspect of the executive protection profession.

#ExecutiveProtectionInsights #ReadTheRoom #BehavioralAwareness #SecurityBeyondProtocols #EmotionalIntelligence #AnticipateRisks #BodyLanguageMastery #DeescalationSkills #HolisticProtection #SafetyFirstAlways #EmotionDetection #ProtectionBeyondSecurity #ExecutiveProtection #Bodyguards #FemaleBodyguards #ExecutiveProtectionCompany #SecurityServices #CorporateSecurity #FamilyProtection #CelebrityBodyguards

Thinking Outside the Box-The Key to Success for Executive Protection Agents

How many times have you seen companies place “Able to think outside of the box” in their job description, or executive protection agents list this term as a skill in their resume? Thousands of times! The question is, can you actually think outside of the box? Do you imagine the unimaginable? Can you see solutions where others only see problems?

According to the Cambridge Dictionary, thinking outside of the box means ‘’to think imaginatively using new ideas instead of traditional or expected ideas’’. And according to the Merriam-Webster Dictionary, it means ‘’to explore ideas that are creative and unusual and that are not limited or controlled by rules or tradition’’. We can find that there are plenty of definitions with similarities, and it is considered a “skill” in many professional industries, one that is particularly hard sought after by corporations for their upper management staff.

When we approach this from the #executiveprotection industry, “think outside of the box” is a metaphorical expression that means to approach a problem or situation in a creative, innovative, and unconventional way. In simple words, be able to think beyond the usual or traditional constraints, rules, limitations, or training that are commonly accepted or imposed in a particular context. The phrase “the box” represents the established boundaries or conventional thinking patterns that people often operate within and the training they have received from various schools. When someone is encouraged to “think outside of the box,” they are being prompted to break away from these usual patterns of thought and consider alternative solutions or perspectives that may not have been considered before. Ones that offer significant solutions to unique problems.

Thinking outside of the box for an executive protection agent means approaching the task of protecting the client in a manner that goes beyond conventional methods and strategies, very often outside the norm. There are so many traditional ways to approach scenarios and while the primary goal of an EP agent is always to ensure the #safety and #security of the client, thinking outside of the box allows them to be more proactive, adaptable, and creative in their approach.

Some interesting Synonyms one will find for thinking outside of the box are:

  • pull a rabbit out of a hat.
  • rise to the challenge.
  • square the circle.

Now we’re sure that as an EP agent, there have been many moments in your career when you have had to ‘’pull a rabbit out of a hat’’, “rise to the challenge’’ or ‘’square the circle’’. Clients, protective details’ needs and circumstances can change within seconds and if you are not on your toes and a quick thinker, you won’t be able to solve problems, and you won’t have longevity in this industry.

Photo by August de Richelieu on Pexels.com

For example, there are many colleagues who will, no matter what they face or where they are, practice the same #protective methods. They’ve learned something on a training course, and they will try to apply it in their professional life without wondering if that specific thing is even suitable to their specific situations, clientele, or specific environment. As we always love to observe people, we once saw a solo EP agent who was escorting his client in downtown Athens, Greece. The agent was staying about a meter back from his client, off to his side, but as they were approaching a building, he kept himself in the same position, now putting himself between the wall and his client! The wall poses no threat to his client so why didn’t he place himself on the other side (the most vulnerable one near the street)? Because he wasn’t taught that.

What people fail to understand is that during a class you will learn the very basic concepts and probably 10 scenarios. But real life has 10,000 different scenarios and requires you to be able to think and swiftly react within seconds. A protective detail is like a living organism, and it changes and mutates constantly, and you have to adapt your methods according to the needs and environment.

Although, as we mentioned earlier, while thinking outside of the box is a valuable skill in many fields, including business, science, arts, and everyday life, it is vital for executive protection agents, especially considering you can not micromanage someone in this kind of job. Thinking outside of the box will equip EP agents with the mindset and skills needed to excel at their Craft. By combining traditional #securitypractices with #creativethinking, they can provide a higher level of protection and maintain a competitive edge in the ever-evolving #securityindustry.

Here are some examples of where EP agents must think outside of the box:

  • Risk Assessment: Instead of solely relying on standard #security #protocols, different risk platforms, and risk matrix, an EP agent who thinks outside of the box will conduct a thorough #riskassessment specific to their client’s unique circumstances, which will allow them to identify potential vulnerabilities and tailor their security measures accordingly (we was vastly disappointed when we received an #RTVA from a very reputable security company addressed to a female client and no one had bothered to include registered sex predators in her area or sex crimes rates). Being able to be creative and think like the “bad guys” will give you a different perspective to work on with your risk assessment. If you were going to commit a crime against this person(s), how would you do it? What methods would you use to overcome current security protocols? Where are the weaknesses?
  • Adapting to Different Situations: As we already mentioned, a protective detail is like a living thing and is consistently evolving, changing organism. Unforeseen situations may arise during your assignment. New #threats, changing security needs, and what you can and cannot do. Thinking outside of the box means being able to adapt quickly and make split-second decisions based on the circumstances at hand. Nothing is ever a set of little yellow footprints laid out on the ground for you to follow. During a protective detail, you don’t have much time to think, play scenarios out, or do calculations in your head. You have to be fast and effective!
  • Discreetness: While it’s essential for an EP agent to be #vigilant and #protective, sometimes blending into the background can be equally important. An innovative agent will find ways to remain discreet while ensuring their client’s safety. Observe your environment quickly and be able to come up with a behavior, and persona that will justify your presence but not give away your purpose. The days of highly overt agents are becoming more outdated every day. Discreet, quiet, discerning agents are in high demand, and we must adapt to fill these needs.
  • Understanding Client’s Needs: Each client is different, with their own preferences and concerns. Each protective detail is different, with its #threatlevels and its own #protectiveplan. As an EP agent thinking outside of the box, you will be able to understand your client’s needs, the team’s operational needs, and tailor your approach accordingly. One thing that many clients bring up as a complaint, is that they feel “suffocated” by the presence of their EP teams. While it is understandable to have the protective triangle, box, rhombus (you name it) tighter in crowded places, you need to consider the overall circumstances and loosen up the distance between you and the #protectee when the situation and environment allows for it. Knowing how close to be and when to allow space is a very important skill to sharpen for the client’s sake and their overall experience. One wise old practitioner once told us, “Close enough they can see you and nod if they need you…Far enough away that they never have to introduce you.”
  • Preventative Measures: If you are creative when you do your #riskassessments and #threatanalysis, you will have quite a different perspective of risks and threats involved, and this will make you implement better preventative measures to anticipate potential risks.

One may ask, “Do I have to forget what I have been taught?” Absolutely not! Thinking outside of the box does not require one to forget or abandon the knowledge and training they have received. Instead, it encourages the integration of their existing expertise with creative thinking and problem-solving to enhance their effectiveness as an executive protection professional. It really becomes a question of how you can build on what you have been taught and expand on it further through creativity. The “bad guys” use creativity to develop their strategies to overcome your best-laid plans…How can you outthink them? Standard security practices and methods are the essential foundations of the field of protection. They are tried-and-tested approaches that have proven to be effective in various situations and are based on years of experience and research (and learning from mistakes!). These practices provide a structured and reliable framework for handling security challenges and a foundation for ensuring the safety of your clients. Now you must take what you’ve been taught and expand your thought processes to encompass these new ideas and possibilities. So, when you find yourself in situations that may demand a unique or unconventional approach…Can you really think outside of the box?

#ProblemSolvingSkills #UnconventionalThinking #EPIndustry #RiskAssessment #AdaptabilitySkills #DiscreetProtection #covertprotection #covertep #PreventativeMeasures

#EPProfessionals #SecurityChallenges #EPAgentSkills #bodyguards #femalebodyguards #corporatesecurity #familyprotection #executiveprotection #celebrityprotection #protectiveservices #softskills #epcareers #closeprotection #professionalbodyguards

The Necessity of a Client Questionnaire for Executive Protection Operations

One of the most important and basic functions that a majority of the companies who provide executive protection services are failing miserably to obtain, is the client questionnaire. How many of you have been called by a company to provide services and you found yourself with not enough information about the client, besides a name and a location, and you had to literally fight to get more information from the project manager or the person in charge for the specific client? Don’t worry, we already know the answer and most of you have found yourselves in this situation.

The most important part in an executive protection detail is not to get the client or the contract, but to deliver great services and to excel. In a profession where excellence is directly connected not only with professionalism but also with the level of protection, it is vital for the industry to make sure basic steps are constantly applied. However, no matter how vital it is, many colleagues fail to maintain a questionnaire out of pure laziness, or because they do not know what to ask the client or are too afraid of the client to ask the important questions.

A client questionnaire is the first thing you must provide from the moment you secure that client/contract. You can either send the document to the client or the POC, or you can fill it yourself with the information you gather as you speak with the client or the POC. It is a very crucial document for executive protection professionals as it enables them to gather vital information, conduct risk assessments, customize security measures, establish client expectations, and facilitate effective collaboration. It serves as a valuable tool for developing comprehensive security plans and ensuring the safety and well-being, not only of the client but also your personnel.

Client questionnaires can help your operation in several ways:

It can help you gather essential operational information about the client and their specific needs. This includes details such as the client’s personal and professional background, their routines and schedules, travel plans, known threats or risks, and any specific concerns they may have. This information helps the protection team tailor their services and develop a comprehensive security plan that addresses the client’s unique requirements.

It will be a helpful tool for your risk assessment and threat analysis. Although some companies believe that one should perform a risk and threat assessment ONLY if they charge the client for it, so if the client isn’t paying, they won’t provide one. Crazy? Yeah! And it happens more often than one may think. But this topic is for another time to discuss. Just keep in mind, you don’t run a risk and threat assessment because the client is buying the ‘’product’’, you run one because IT IS part of your functions, and it will undoubtedly benefit your team on the ground. So, when you run a client questionnaire by collecting information about the client, their activities, and their environment, the information gathered enables you to conduct an initial risk assessment and threat analysis. It will help you identify potential risks, vulnerabilities, and areas of concern that need to be addressed to ensure the client’s safety and security. It allows your protection team to develop effective strategies and countermeasures to mitigate these risks.

As we all know, each client and each operation have its own needs that can vary significantly depending on factors such as their professional background, public visibility, lifestyle, specific circumstances, and geographic location. The information obtained through a client questionnaire enables you to customize your security measures to suit the client’s specific protective needs. This may involve determining the level of security personnel required, implementing access control measures, arranging secure transportation, establishing secure communication protocols, or any other necessary precautions. By knowing your client’s needs, you will also be able to establish clear expectations between you, your protective team, and them. By utilizing a client questionnaire, you enable your clients to have the opportunity to communicate their concerns, preferences, and any specific requirements they may have (Remember, in our industry, what the client wants matters as well). By understanding your client’s expectations upfront, you and the protective team can align your services, accordingly, ensuring a satisfactory and effective security operation.

As a project manager or company owner, you also have a duty toward the people you are hiring. Since you are the one who makes that first contact (services sales as well) with the client, you must be sure you require specific information to pass on to your team on the ground. There is nothing more unprofessional, unhelpful, and inconsiderate than to send your team unprepared and expect them to do a great job. Unfortunately, as we mentioned earlier, it happens way too often. Some people are just lazy to do what it needs to be done, others are terrified of the client and believe if they ask questions (which are necessary for a protective operation) will make the clients angry, and some do not know what to ask! Now we can’t do anything about those who are just lazy, however for those who fear the client, let us assure you that, nothing else shows more professionalism and that you know your field, than when you show interest and make the necessary questions that will enable a smooth and successful protective operation. Consider the fact that, for the majority of the time, you won’t be dealing with the client himself/herself, but with their PA, security manager, agency, etc. Those people will be able to provide this information to you because they already know most of the answers, and for those they do not know, they already have communication, trust, and the confidence of the client. So don’t be afraid to do what your job may dictate.

Now for those who do not know what to ask

Photo by JESHOOTS.com on Pexels.com

Think of the client questionnaire as a mini and first risk and threat assessment. Ask yourself, what would I need to know if I was the agent on the ground hired for this specific client to provide professional and successful protective services? Divide the questionnaire into sections such as:

  • Personal Information, including full name, DOB, nationality, religion, home address, contact information, and person in charge (if not the client).
  • Professional Information, including current occupation or business, employer/company name, job title, and business address.
  • Lifestyle and Routine, including daily routines and schedule, locations frequently visited (home, office, public places), regular activities (sports, social events, hobbies), any upcoming special events or engagements, associations (social, professional, religious, political), travel frequency and destinations, public exposure, or visibility.
  • Known Threats and Concerns, including any previous security incidents or threats, specific concerns or risks identified by the client or his immediate environment, information about any stalkers, disgruntled individuals, or potential adversaries, any information about the client or anyone in their immediate sphere of influence (SOI) to have been involved in controversial activity (public speech, professional decision, etc.)
  • Travel Information, including planned or anticipated travel destinations, travel dates, and duration, purpose of travel, mode of transportation (private jet, commercial airline, etc.), accommodation preferences (hotels, rental properties, etc.)
  • Support Personnel, including names and contact information of personal assistants, drivers, or other personnel involved in the client’s daily activities.
  • Security Measures, including any current security arrangements, if any (i.e., RST, security systems, surveillance cameras, alarm systems, etc.), details of any existing security personnel or teams involved in the client’s protection, how many people are to be protected, any family members traveling with the client (what, if any family members are NOT included in this assignment), and length of assignment (days, hours per day).
  • Communication Preferences, including preferred methods of communication (phone, email, text), emergency contact information (family members, close associates),
  • Medical Information, including any pre-existing medical conditions or allergies, details of any required medications or medical treatments, emergency medical contact information, and any dietary restrictions, or intolerances.
  • Legal Considerations, including any legal issues or ongoing litigation that could impact security measures or confidentiality.
  • Likes and dislikes regarding his/her EP detail – Additional Information, including the client’s preference about the security team, if they have ever hired any EP services before, why they are not using that firm anymore, and any other specific requirements or concerns the client or the POC wants to address.

Bear in mind that the questions in a client questionnaire may vary based on the unique needs and circumstances of the client, and it may need to be tailored with additional questions or sections. The preferable option is to have a document sent to the client, their PA, or POC for the specific detail and ask them to fill it out for you. That way you can have an extra layer of protection (even a legal one) if anything happens due to information not given to you.

#ExecutiveProtection #ClientQuestionnaire #SecurityServices #RiskAssessment #ThreatAnalysis #SecurityMeasures #ProtectiveServices #ClientSafety #SecurityPlanning #Professionalism #SecurityOperations #ClientExpectations #RiskManagement #SecurityConsulting #ClientRelations #bodyguards #femalebodyguards #womeninprotection #closeprotection #corporatesecurity #corporateprotection #celebrityprotection #protectiveintelligence #threatassessment #lemareschal #lemareschalexecutiveprotection

Contract Management for Security Providers

One of the biggest challenges that the majority of the security companies will have to deal with is not so much being able to obtain a contract, but to be able to properly maintain that contract once it’s signed and done. We are all quite aware of how many times the intricate contracts for various clients have changed hands over the years. While some might think it is hard to land a good contract, maintaining it professionally and properly while providing what you are being paid for may be very difficult for some companies. According to numerous studies, the average company loses nearly 10% of their clients due to their poor contract management. Why is that? Well, managing contracts (and the corresponding projects) is an overlooked form of corporate leadership and a large part of a company’s operational function and market viability. Project and contract managers must be able to interact frequently with their agents in the field, subcontractors, vendors, stakeholders, family offices and, more often as not, the client himself/herself.

‘’The International Association for Contract & Commercial Management (IACCM) identifies 7 major areas of contract management weakness:

  • Disagreement regarding contract scope
  • Weaknesses in contract change management/retention
  • Performance failures due to over-commitment
  • Performance issues related to a disagreement/misunderstanding over what was committed or requested
  • Inappropriate contract structures
  • Disputes over pricing
  • Issues with subcontractors’’

Now let’s discuss some of the most common causes that may cost a security provider one of their contracts:

  1. You are charging significantly more than is proper (Faulty Pricing)

At some point we have to admit that quite a number of companies will overcharge a client merely because of who the client is and not particularly what their security needs or threat level may be. You cannot begin to expect one client/contract to change your own wealth status or single handedly build your company’s gross revenue and/or profit. It is neither ethical nor professional for your corporation to make 2 to 3 times more profit than the agents working the detail on the ground. We all have our levels of operational expenses, but don’t pass that bill on to the client or your protective agents. Make a profit, but make one within logical expectations.

2. You are ‘’suffocating’’ your  client

Either: A) You have placed more agents than are needed (Again, this comes back around to profit: The more agents  on the ground, the more you can charge), B) Your agents are not exercising proper situational awareness and how to be flexible with protection levels versus the client’s perception of asphyxiation, or C) The company holding the contract has not done a proper Risk/Threat/Vulnerability Assessment and/or are not trained, experienced or knowledgeable enough to ascertain proper staffing and logistics. Some companies will ‘’overreact’’ on the threat level to make their services appear quite necessary to the client, while in reality, achieving the opposite result.

3. Not being able to provide services as promised

A protective detail is comprised of many elements and sometimes you have to be able to provide additional services as you go. You must be the one who can foresee what is or will be needed and provide it before the client even asks for it. We have heard of many companies who fail to render even the basics of what they agreed to provide. We have seen details operating with less manpower than what was requested or changing the personnel so often because they fail to keep the professional agents or cannot staff it properly. Have in mind, clients need stability and familiarity and will become unsettled when they see or must become accustomed to new faces.

4. Failure to accommodate clients needs and solve operational issues (Lack of Customer Insight)

We’ve all heard the phrase, “The client is always right”, correct? Well, from the moment you signed that contract, you alone are the one who must do whatever it takes to construct a smooth protective detail and provide peace of mind to the person who hired you. You alone are the one who must be stressed, work long hours and find a way to solve any issue with the security team or the client’s needs, not the client. It must appear as though all is under control and operational.

5. You are not providing services to a level or standard that is expected and required

We can all agree that our prospective clients will want 3 things: A) To be protected, B) To have the best close protection agents, staff and logistics that their finances can obtain (they fully believe they are paying for the best either way) and C) To have peace of mind. If your corporation is hiring unqualified, unprofessional or unethical agents, or utilizing contractors of the same substandard quality because you refuse to pay for the ‘’good ones’’, the client will soon start looking for another company.

6. Your Project or Contract Manager has no vested interest in the contract (Neglected Contracts)

This occurs so many times when the person who is working for an ‘A’ list company, as a Project or Contract manager, simply doesn’t care to deal with the issues, stay intricately involved or maintain the contract for his company. Most fail to have good communication skills, which is one of the key elements when dealing with clients, vendors, staff, stakeholders or agents in the field. How you communicate during common, day to day interactions with people or personalities will be just as valuable, or more in some cases, as to how you react during a crisis situation and the solutions you are expected to provide. Merely having a project or contract manager on your staff isn’t nearly enough. You must have an individual who can be extremely flexible, can develop a strategy out of thin air and be able to solve complex issues, without raising undue alarm, if they arise.

      While these are just a few of the common pitfalls that a contract manager may find themselves encumbered with, each client and contract are unique and every company needs their respective contract managers to be creative, innovative, and highly observational so as to catch any of these issues far before they become problematic and present solutions to overcome them. Our task is not just to sell the client on our services and then walk away, but we are expected to, and should without failure, continue to provide the highest level of service and commitment to our clients that they have come to expect. The sale is the easy part…How we treat and care for the client and their contract once we sign on  the dotted line will either build our reputation and lead to more success or it will cause a loss of trust and failure that cannot be easily repaired or regained resulting in the loss of the contract.

Chris Grow

AUS Global Special Services Travel Team

Managing Partner LeMareschal LLC

Denida Zinxhiria Grow

Founder & CEO

Athena Worldwide & Nannyguards

Managing Partner LeMareschal LLC

Marketing tips for Executive Protection Agents

Perception is everything, protect yourself and build your reputation on solid ground.

*These are part of a panel of personal opinions formulated from my experience in the industry as an EP agent, business owner and recruiter for other corporations. Keep in mind that just because I preach it, doesn’t mean I haven’t made the mistakes. It’s actually the fact I have made some of these and it’s caused me to learn what can work and what doesn’t. You may not agree with me or follow up with the suggestions, but experience is an amazing teacher…”Let he who has ears…”*

1) Know what you know and know your value. (Know what you are willing to sacrifice as well, working more hours, night shifts, holidays, for how much, or how little.)

2) Know what you don’t know and either leave it to someone else or study it (There is nothing worse than someone who is trying to operate in many different fields, and yet, have quite limited knowledge on each field and act as though they’re the authority on it.) Focus on what you are most interested in and master it. Only move on to something else when you have a solid foundation on a topic and you are prepared to expand to something else.

3) “Listen more and talk less” Comment or post on social media only if you have something constructive to say and always stay on point and use professional language.

4) Post or comment only on subjects you know well, subjects you have studied, and subjects you know from real-life experience. There is no need to post daily or non-related posts.

5) It takes specific work and, quite simply, boots on the ground to consider yourself experienced. Having worked EP two or three days a month doesn’t make you qualified enough to disagree or raise your voice with people who have been doing this for 10+ years. Neither are you an expert after one or two years in the industry (You can always see who is who and what they know and don’t know by what they post on social media). Stay humble, lay low and learn your trade well…Your day will come.

6) Maintain a professional image on all business-related social media sites. A suit and tie picture will always be better than a tank top or a duckface selfie.

7) Build a professional LinkedIn Profile, highlight your skills and post all your professional and educational achievements.

8) Stop posting sensitive information, IDs, and license numbers on social media (You are a security professional! If you fail to protect even your own personal information, what does that tell me about how you handle your clients’ information??)

9) Always maintain OPSEC in every post you make. Always think, “How could this be used to harm my client or my team?

10) Protect your data! We have seen more and more security professionals warning their connections that they have been hacked! If your ex-girlfriend can hack your Facebook or LinkedIn profile, then you are probably not very good at keeping your clients or your information safe.

11) Keep high school drama out of social media.

12) Control your emotions, and remain professional at all times…You are your client’s close protection, NOT his/her “Buddyguard”. Friendly at all times, not Friends.

13) Be careful of your connections and the people that you recommend or work with. Have you heard of death by association? Make no mistake, it is a very real factor in our business!

14) Build a professional-looking CV. Keep it simple and to the point. There is no need to hire a CV writer, you know what you have done, trained for, and accomplished.

15) Invest time in building connections. Spend time talking to others or helping them with their projects. I have gained many contracts after the interviews I did with others.

16) Offer pro bono services to companies you respect and want to be involved with.

17) If you are single and have no family commitments, perhaps you work that shift on Christmas or other holidays so someone else can spend the day with his children. You have no idea how being understanding can help you in the long term.

18) Study your clientele and any potential clients. The industry has changed significantly, and the new wave of clients are IT gurus, app developers, cryptocurrency investors, reality stars, etc. Always be knowledgeable on current trends and topics.

19) Be informed on local and international news, threats, and events that affect the industry and the needs or operational aspects of your clients.

20) Don’t be arrogant, there is a fine line between being confident and arrogant. Never cross it…There usually is no way back once the damage is done.

Denida Zinxhiria Grow

Founder & CEO

Athena Worldwide

Athena Academy

Nannyguards

Managing Partner

LeMareschal LLC