Internal threats are as damaging as external threats.

The consequences of an internal threat can be devastating to a company. Our internal investigations team will quickly put an end to the uncertainty and protect your company’s reputation.

Don't Risk a Lawsuit

When an enterprise's business and brand are at risk as a result of wrongdoing, companies and boards turn to the Chesley Brown Group for expert guidance. Our team of experienced investigators help our clients navigate complex internal investigations so they can take informed, strategic steps to manage crises, avoid full-scale regulatory actions, and limit legal and reputational exposure. 

Internal threats can be as damaging as external threats. These threats can take on many different forms, including corporate misconduct, accounting fraud, theft of company property, theft or manipulation of data and/or intellectual property, employee dishonesty, forgery, embezzlement, threats, or sexual harassment and other types of inappropriate behavior or communication. 

The internal investigation process can be managed by the employer's management team, HR team, outside counsel, or an independent expert. Typically, an investigation of this type will be conducted when there are indications that fraud, criminal activity, or a potential regulatory action threatens the organization.  

The types of allegations that typically lead to an internal investigation are 

  • Sexual harassment 
  • Physical violence 
  • Breach of confidence 
  • Workplace discrimination 
  • Whistleblower claims 

Internal investigations are a key element for many professional practices. These include law firms, financial institutions, and public accounting firms. They are also an important tool for government agencies and government contractors with federal compliance mandates. 

By using a variety of investigation techniques and best practices an expert can build a comprehensive investigation plan that addresses your organization's concerns in a thoughtful and strategic way. Internal employee-related investigations serve a number of purposes. Ultimately though, internal investigations are a means of protecting the organization from unlawful conduct on the part of its employees or shareholders. In all of these investigations, the purpose is to uncover the truth. Therefore, any investigation findings should rely on data and facts as their primary sources. 

When an investigative report is completed, the investigators often present their findings to the company with recommendations for remedial action. Successful investigations serve a number of purposes, including: 

  • Uncovering a crime or wrongdoing 
  • Protecting the organization from unlawful conduct on the part of its employees 
  • Taking remedial measures to prevent an unlawful act from occurring 
  • Solving Ethical Issues 
  • Exposing the truth  

Conducting Fast, Defensible Internal Investigations 

When it comes to conducting a fast and defensible internal investigation, there are a few things you can do to make sure things go smoothly. The first is to remember that the investigation is a search for the truth, not a search for a scapegoat or a defendant. As such, the main goal of the investigation should be to find out what went wrong and how to prevent future incidences from happening. It is also important to determine the severity of the offense. In less severe cases, it may be more appropriate to settle with the employee than fire them. 

At all costs, the investigation should be speedy, but thorough. If the offender is to be terminated, it is important that the investigation has uncovered all possible grounds for dismissal. This includes any evidence of criminal activity. 

A good investigator knows how to gather information quickly without compromising quality. A great investigator understands that speed does not mean sloppy work. Speed is achieved through proper planning and preparation. Proper planning ensures that the investigator gathers enough relevant information to complete their task within the time allotted. Preparation involves gathering everything needed before beginning the investigation.  

For example, this might involve collecting documents, interviewing witnesses, reviewing emails, etc. Once the investigator begins the actual investigation, they must remain focused and avoid distractions. They need to stay organized so as to ensure that they collect all pertinent information in one place at one time. Finally, once the investigation is over, the investigator must write up his notes and conclusions in a clear manner.

Testimonials

Once the decision was made to renovate the entire property's electric security system, Chesley Brown began developing specifications and identifying prospective bidders. After this was accomplished, Chesley Brown was with us to manage the bid process, award the bid and oversee the installation of the new system.

General Manager

Office Complex, Georgia

Our unique property required a firm that tould customize a security management program that addressed our property's individuality. Chesley Brown was the only firm that had the flexibility and experience to make it happen.

General Managed

Regional Shopping City, Missouri

Expert Risk Analysis

By working directly with your stakeholders, law enforcement, cybersecurity professionals and industry experts our risk analysis team can determine the likelihood of any particular threat, prioritize action plans, recommend appropriate security measures implement solutions, and when necessary, conduct penetration testing to ensure resiliency. Data and facts should be your be your source of truth when implementing or improving new security systems or frameworks, that's why we've made it so easy to get started. Here's how:

Regulatory Investigations icon
01

Schedule a Strategy Call

Our first job is to gather as much information as possible about your organization's unique challenges and concerns.

step-2-create-plan
02

Create a plan

After studying the problem, our team of experts will get to work crafting a bespoke strategy that protects all aspects of your business, and enables continued growth.

step-3-execute
03

Let’s execute that plan together

We’ll work directly with you and your stakeholders to implement and manage your new strategy, helping you navigate any pitfalls along the way.

What are you waiting for?

Let's Talk!

Why Clients Choose Chesley Brown

Chesley Brown is an industry leader in providing Security Risk Management and security consulting services. Importantly, only Chesley Brown has the capabilities to offer:

A Single Point of Contact – we make your job easier via streamlined coordination and reporting
Our Global Resources – allowing us to provide consistently reliable security management services at any or all of your locations around the world
Agility – our range of service options allows us to act quickly and decisively to address any issues or threats that may present themselves over the lifetime of your business.

In addition to over 100 years of collective experience, all Chesley Brown officers and directors are supported by cutting-edge technology to assist in making their recommendations timely and effective.

Internal Investigations: The Risks and Benefits

An Internal investigation can be beneficial to an organization for any number of reasons. Some of the most common reasons are to identify the root cause of an inefficient process, figure out who's responsible for a mistake, identify if someone is stealing company resources or time, and to review company policies. There are also times when an Internal investigation is necessary to protect the company from any legal consequences - also known as self-policing. 

The first concern an organization may have when deciding to conduct an internal investigation is the risk of a leak. When an individual, the media, or the government receives information from an internal investigation, it can be damaging to the company's brand. The reason for this is because those who are not involved in the investigation may decide to take their business elsewhere as a result of the findings.  

Another risk is that a poorly-conducted investigation can lead to a so-called witch hunt, where people are investigated for any perceived wrongdoing generating a lot of anxiety, bad feelings, and sometimes even false accusations. This often leads to long-term consequences for the company’s workplace culture by generating ill feelings, distrust, and anger which can result in retaliation or resignations. 

In order to help reduce this risk, working with seasoned experts who not only understand investigations, but who understand the intricacies of running a business can save a lot of time and worry. Organizations should establish strict guidelines governing what can be said and who can be interviewed by those conducting the investigation. Non-disclosure agreements are an absolute must when working with 3rd parties, and should be signed prior to any engagement. Establishing a clear chain of command and chain of custody for the investigative report once it is delivered will also help streamline any remediation process and reduce the likelihood of leaks. 

Often times an internal investigation is an organization's last option. Protecting the company's future while not completely upending the company's culture can be a difficult balancing act. However, when done properly an internal investigation will allow a company to better understand what happened following an incident and identify the best strategies for preventing future problems. If a company makes a commitment to conducting investigations when evidence of misconduct is found, they are less likely to face lawsuits or experience unexpected losses due to theft or fraud. 

Simply put, if your business has been affected by an internal threat, you can’t afford to ignore the problem. Internal threats affect every business, of every size. Without proper safeguards your company could be the next news headline. Our investigative experts are here to help ensure that never happens. For over 30 years we've helped some of the most recognizable brands in the world protect their most vital assets. Never lose another night's sleep worrying "what-if." Our experts will help you anticipate and a navigate risk before it becomes a crisis, so you can focus on your business. Click below to learn more about our internal investigation services. 

Frequently Asked Questions (FAQ)

Our corporate partners often have lots of questions. We have gathered the most common ones together with responses directly from our team of experts. If you have ever wondered whether your company or organization needs a corporate investigator, this will hopefully help you find the answers you need.

Corporate investigators can uncover facts about any specific problems your company has through interviews, interrogation, and data analysis; identify facts and corroborate complaints within a written report with the facts surrounding the situation, equip you with options to deal with the offending employees, or bad actors and provide guidance on how to improve business operations to avoid recurrence.

Personal problems of employees such as substance abuse or gambling, inner-office relationships, complaints of racism or sexual harassment, intellectual property theft, disruptive divorce proceedings, moonlighting, criminal charges, conflicts of interest, personal use of corporate resources, excessive sick time, workman's comp or fraud are generally the most common issues we see.

Conducting effective witness interviews can be one of the most demanding steps in an internal corporate investigation. At Chesley Brown we rely on the investigative experience of our prosecutors and former federal agents to develop investigative strategies based on the specific facts and circumstances involved in each investigation we handle.

If an internal investigation of the company shows evidence of employee misconduct, generally this means that several actions will be taken immediately. Depending on the specific misconduct in question, this could include any combination of the following:

  • Update company policies and procedures
  • Taking corrective action internally
  • The discipline of the employee (or employees) involved
  • Self-disclosing the issue to the appropriate federal authorities.

How a company deals with federal regulators requires a measured, strategic, and forward-thinking approach. If the wrongdoing triggers an obligated self-disclosure, federal authorities are already investigating your company's business or registration practices, or there's a chance that a federal investigation can happen soon, the risk management team of the company will need to make informed decisions and engage an external adviser to chart a course of action that mitigates the risk of civil or criminal penalties or reduces exposure.

Additional Resources:

Risk Takers Podcast Series Episode 1 - Aldrich Ames Spy Case
https://chesleybrown.com/the-risk-takers-podcast-series-launches-today/

Risk Takers Podcast Series Episode 1 - Surveillance Detection Routes (SDRs)
https://chesleybrown.com/the-risk-takers-podcast-series-launches-today/

Safe Passage / Safe Travel
https://chesleybrown.com/corporate-investigation-services/safe-passagetravel/

Political unrest prevention, Community safety during elections
Blog
Last-Minute Security Tips for Election Season
Ensuring Safety and Reducing Disruptions With Election Day only a week away, businesses and community leaders are in the final sprint to prepare for any ...
Read More
Preventing mail room theft: tips for securing business mail and protecting sensitive information
Blog
Mail Room Theft and Fraud: Securing Your Business’s Mail Handling Processes
Your office building’s mail room could be an unexpectedly easy target for thieves looking to steal everything from banking information to brand-new electronics worth thousands ...
Read More
Workplace safety, standards, safety measures, employee training
Blog
Ensuring Workplace Safety: Best Practices for Protecting Employees
Written by: James Hart In a world like ours, businesses can’t afford to take workplace safety for granted. There’s a long list of reasons why ...
Read More
Crisis communication in action standing near a firetruck. Emergency safety. Protection, rescue from danger.
Blog
Building a Crisis Communication Strategy: Effective Communication During Emergencies
Written by: James Hart During a crisis, good communication can save lives. That’s especially true for larger office buildings.  Some properties hold thousands of people ...
Read More
de-escalation training: An image of a young woman at the center of a crowd feeling overwhelmed practicing de-escalation techniques
Blog
Effective De-escalation Techniques: Conflict Resolution Strategies
Written by: James Hart If your job requires you to talk to other human beings, then you could probably benefit from de-escalation training.  De-escalation is ...
Read More
a consultant and an executive walking the property discussing Residential Security
Blog
Home Security Tips: Safeguarding Residential Properties
Written by: James Hart Everyone deserves to feel safe in their own home.  Unfortunately, that can be harder for corporate executives, celebrities, wealthy families and ...
Read More
businesswomen on the street - premium security at trophy property security
Building Security
How Premium Security Services Set Trophy Properties Apart
Written by: James Hart It’s one of the most frustrating, longest-lasting effects of the pandemic: The market for office space continues to struggle as companies ...
Read More
festival security - concert goers having a great time at a festival
Blog
Crisis Management at Festivals: Strategies for Event Organizers
Written by: James Hart Nothing beats spending the day at an outdoor festival. Who doesn’t love being part of a large, happy crowd enjoying delicious ...
Read More
guest service agent greeting a mature businessman wearing a suit in a lobby.
Blog
The Role of Guest Service Agents
Written By: James Hart To compete for tenants, more commercial properties are adding a new type of role to their security presence: the guest service ...
Read More
Small business workers discussing digital security - Small business assets protection
Blog
Security Solutions for Small Businesses: Safeguarding Digital Assets
Written by: James Hart Even if you don’t think your small business has any valuable information, the average cybercriminal will probably disagree. The last few ...
Read More
Emergency Response Plans - Firemen near their truck on the street having rest after they put out a fire at night. Emergency , danger, service concept. Firemen at work.
Blog
Emergency Response Planning for Shopping Centers, CIDs, Entertainment Districts and Other Large Locations
Written by: James Hart It takes hard work and careful thought to create an effective emergency response plan for office towers and other commercial properties.  ...
Read More
Two ladies looking out window discussing how neighborhood watch programs help redisents feel safe.
Blog
Neighborhood Watch Programs: Empowering Residents
Written by: James Hart The neighborhood watch, one of the oldest tools for community crime prevention, can still be a useful tactic today for combating ...
Read More
Archie Dinwiddie - Corporate Director of Compliance and Risk Management
Blog
Archie Dinwiddie Promoted to Vice President Risk Management, Training, & Compliance
We are thrilled to announce the promotion of Archie Dinwiddie to Vice President of Risk Management, Training, & Compliance at Chesley Brown. With an impressive ...
Read More
Image of a stressed business owner with her head in her hands to reresent business continuity and crisis management
Blog
Disaster Recovery Strategies: Business Continuity in Crisis
Written by: James Hart The best advice on disaster recovery and business continuity might actually come from the movies. As Rocky Balboa said: “It ain’t ...
Read More
A group of people walking outside to represent how Community Policing Strategies can bring communities closer
Blog
Community Policing Strategies: Building Trust and Safety
Written by: James Hart It’s always important to remember: Private security officers aren’t police, and police aren’t security officers. The two roles are both important, ...
Read More
Securing Infrastructure - A view from under a bridge looking out towards the shipping yard.
Blog
Securing Infrastructure: How to Prepare for Disruptions to Critical Services and Systems in Your Business
Written by: James Hart Infrastructure is one of the great blessings of the modern age. Flip a switch, turn on a faucet, launch a browser ...
Read More
Two women browsing at a shopping center: Security Challenges in Shopping Centers
Blog
Security Challenges in Shopping Centers — and How to Overcome Them 
Written by: James Hart  Overcoming the Biggest Security Challenges in Shopping Centers The retail business has never been for the faint of heart. In recent ...
Read More
Securing Office Buildings - The façade of a class A office tower - best practices for commercial building security
Blog
Securing Office Buildings: Best Practices for Property Managers Seeking a Safer, More Secure Environment
Written by: James Hart As competition for tenants remains high, property managers must not overlook the importance of effectively securing their office buildings, according to ...
Read More
Picture of a man (Director Ray Strobel) wearing a suit standing in front of a Chesley Brown Flag.
Blog
Introducing Ray Strobel: Director of the Waterfront
We're thrilled to announce the promotion of Ray Strobel to the role of Public Safety Director at the Waterfront in Pittsburgh's Steel Valley! Ray brings ...
Read More
Isabella Mazza - Business Development Analyst
Blog
Employee Spotlight: Isabella Mazza
We're thrilled to introduce Isabella Mazza, the newest rockstar on our team at Chesley Brown International. Ready for some real talk and a sneak peek ...
Read More
how security enhances Commercial Property Values
Blog
The Economic Benefits of Private Security: Enhancing Commercial Property Values
As the world becomes increasingly unpredictable, it’s no surprise that businesses are focused on protecting their assets. While public security initiatives have long been at ...
Read More
Maximizing security with a limited budget
News
Maximizing Security Without Breaking the Bank: Practical Tips for Organizations with Limited Budgets
In today's digital landscape, security threats are everywhere and no organization is immune to them. However, with limited budgets for security measures, organizations often face ...
Read More
Electric vehicle charging station. Image is used to show EV fire hazards
Blog
The Hazards of EV Charging Stations
Written by: Andy Marsh Fire and Life Safety Manager Chesley Brown International Technological advances have been the driving force behind the way we communicate, the ...
Read More
An engineer and the safety team walking a construction site discussing risk awareness
Blog
How to Foster a Culture of Risk Awareness and Responsibility
In a world where new threats seem to emerge every single day, how can businesses protect themselves from the next danger hiding around the corner?  ...
Read More
Two young professionals working on Organizational Resilience
Blog
Organizational Resilience: How Companies Can Navigate Security Threats — and Even Grow Stronger as a Result
It’s impossible to prepare for every single security threat facing your business. You can identify all the potential dangers that you’ve seen before —- petty ...
Read More
Woman unlocking a door with a key card - The best Business Security Systems for Property Managers
Blog
Secure Your Business: The Top Business Security Systems for Property Managers
As a property manager, you are responsible for the security of your business premises and the assets that are within it. With criminal activities on ...
Read More
businessman man handing a tenant keys to their new property. How Security Can Help Property Managers Combat High Tenant Vacancy Rates.
Blog
How Security Can Help Property Managers Combat High Tenant Vacancy Rates
Across the country, office occupancy rates are the worst they’ve been in years. According to Cushman & Wakefield, national vacancy rates rose to 18.6% during ...
Read More
Blog
Natural Disaster Preparation: 6 Keys for Safeguarding Your Company from Hurricanes, Storms, Fires and Other Emergencies
The question isn’t if your business will face a natural disaster. It’s when.  Over the past 50 years, the world has seen a five-fold increase ...
Read More
brand protection Services helps brands protect their intellectual property
Blog
Brand Protection: How Businesses Can Identify and Stop Intellectual Property Theft
Adam Shipley was furious. He spent years building up his company’s brand of elite fishing gear, and now someone was selling counterfeits — even using ...
Read More
Dell Spry being promoted to Vice President Emeritus
Blog
Dell Spry Promoted to Vice President Emeritus
Dell Spry is an attorney by education a investigator by passion. He has been in law enforcement for over 30 years. In that time he ...
Read More
Construction worker and business man in suit shake hands after an in-depth asset search
Blog
Why your business may need an asset search
Written By: James Hart Linda Daly didn’t know exactly what was wrong, but something was off about her latest business deal.  A month earlier, Daly ...
Read More
How to Secure Intellectual Property - featuring a picture of a woman scientist in a lab
Blog
How to Secure Intellectual Property and Trade Secrets
Anything that has value is at risk of being stolen, and unfortunately, that includes your company’s ideas and information. After all, intellectual property generates tremendous ...
Read More
a consultant discusses How to Respond to a Whistleblower’s Report
Blog
How to Respond to a Whistleblower’s Report
In theory, it should be a good thing when employees come forward with a whistleblower report.  They’ve spotted a threat to your organization and are ...
Read More
Human Resources team conducting internal investigations with current employees
Blog
The First Steps for Conducting Internal Investigations
Written by: James Hart When the call finally came, Raquel Henderson lunged for the phone on her desk.  Henderson was less than three months into ...
Read More
theft of trade secrets: A business man with his head in his hands dispairingnover the loss of his trade secrets. Theft of trade secrets is big problem for businesses.
Blog
Theft of Trade Secrets: How to Prevent the Loss of Key Intellectual Property
Written by: James Hart The names have been changed, but the following story is a compilation of real situations faced by real businesses. Doug Medford ...
Read More
Blog
How to Prepare for a Cyberattack
Written by: Dell Spry At Chesley Brown, nothing is more sacrosanct than the safety and security of our clients. It is our intention to keep ...
Read More
Picture of the Empire State Building in the foreground on September 11th with the buring World Trade Towers in the background
Blog
How the Events of September 11th Have Impacted National Security
How Has National Security Evolved Since September 11th, 2001? Written by: Dell Spry As I sit and write this paper, Afghanistan is collapsing.  It is ...
Read More
The Colonial Pipeline Attack revealed how underprepared our nation's critical infrastructure is to outside threats.
Blog
A Nation Under Attack: The Colonial Pipeline Attack
Written by: Dell Spry Introduction: Before the Colonial Pipeline Attack In earlier centuries wars were fought between nation states to acquire water and fertile land. ...
Read More
security risk firm at a class A office tower
Blog
Reasons to Hire an Outside Security Risk Firm
The security services industry is one of the fastest growing industries in America today. With so many disruptive technologies, emerging threats, and the growing frequency ...
Read More
preventing economic espionage, trade secret theft and intellectual property theft
Blog
The Ultimate Guide for Small Businesses to Combat Economic Espionage
For decades, the US has been a victim of economic espionage — a foe that is now costing American companies billions of dollars in lost ...
Read More
Protestors storming the captiol in an act of civil unrest, insurection
Blog
Preventing Civil Unrest
We’ve all recoiled in disbelief and horror as we watched scenes of violence stream across our TVs. The violent insurrection we saw in the U.S. ...
Read More
Vulnerability assessments and management in the new risk landscape. Threat assessment
Blog
What Achilles can Teach us About Threat Management
By: Dell Spry There are numerous similar, seemingly inconsequential, soft targets scattered across our country unprotected by a single surveillance camera or even a strand ...
Read More
The solarwinds supply chain hack represented by 6 locks, one of which is a different color
Blog
The SolarWinds Supply Chain Attack: What Businesses Need to Know
What is the SolarWinds Supply Chain Attack? SolarWinds, the Austin-based cybersecurity firm, found itself in the middle of a catastrophe due to internal security lapses. ...
Read More
Picture of downtown Nashville Tennessee a dusk. Lessons learned from the nashville bombing
Blog
Lessons Businesses Must Learn from the Nashville Bombing
The sound of gunfire punctuated the peaceful hush of Christmas morning. According to one witness, “It sounded like an automatic weapon.” About 10 minutes later ...
Read More
Hallway camera in a school providing a safe and secure learning environment, How to optimize school safety for COVID-19
Blog
3 Simple Practices to Optimize School Safety During Covid-19
Maximizing safety for students and employees If you’re anything like me, keeping your family safe is your number one priority. During the Covid-19 pandemic, this ...
Read More
a puzzle with a misisng piece revealing a dollar as a symbol of business impact analysis
Blog
4 Crucial Things To Know About Business Impact Analysis
Risk is not optional. If you own a business, chances are, you will confront risks at some point. What’s more, as your business grows, potential ...
Read More
sign cautioning people to remain six feet apart at a shopping mall or retail space for COVID-19 precautions
Blog
2 Painless Ways to Transition Your Retail Business to Touchless Technology
Why your business should be transitioning to touchless tech right now As a business owner in the retail industry, adjusting to the Covid-19 pandemic is ...
Read More
Family and friends enjoying a carefree holiday meal because they know to destress during the holidays
Blog
3 Overlooked Tips to Destress During the Holidays
Bring home holiday gifts without the baggage It’s that time of the year. Some would say the most wonderful time. But for others, the lights ...
Read More
Blog
Top 5 Problems Facing the Retail Industry
And the best ways to solve them We’ve all heard the Black Friday stories of fist fights breaking out in aisles of the local big-box ...
Read More
family playing outside while traveling for the holidays
Blog
Holiday Safety Tips
3 practical ways to stay safe in 2020 We’ve all heard humorous holiday tales. They make for great entertainment around the table during a turkey ...
Read More
police prepare for election day civil unrest as a political protest moves through a downtown area during a moment of civil unres
Blog
Election Day: Planning for Civil Unrest
4 Guaranteed Ways to Prepare Your Business The 2020 presidential election is approaching and the possibility of election day civil unrest is very real, according ...
Read More
Lighthouse on a lonely dirt road preventing the threat of shipwrecks
Blog
The Transformational Power of Threat Assessments
Ignoring Risk won't make it go away Cyber crime is one of the most insidious threats facing businesses. As reported here, more than 50% of ...
Read More
small business team smiling after sucessfully navigating a crisis using their crisis management plan
Blog
3 Practical Strategies to Protect Your Small Business During Covid-19
October 15, 2020 / Justin Hayes Ensure the Future of Your Company Small to medium-sized enterprises (SMEs) comprise a massive portion of American industry. In ...
Read More
overhead view of business people working on a crisis management plan outside
Blog
The Anatomy of a Crisis Management Plan
4 key strategies to protect your business against risk By Justin Hayes No executive expects a crisis to strike. But every day organizations fall prey ...
Read More
Podcast
risk-takers #9. Joe Sheram – The Turnaround Guru
https://media.bcast.fm/682pl1p8.m4aBrent sits down with corporate turnaround expert Joe Sheram to discuss financial risk, corporate theft, the importance of cash, and some of the biggest challenges ...
Read More
Podcast
Podcast | Risk Takers Series #9. Joe Sheram – The Turnaround Guru
Brent sits down with corporate turnaround expert Joe Sheram to discuss financial risk, corporate theft, the importance of cash, and some of the biggest challenges ...
Read More
Podcast
Podcast | Risk Takers Series #08. The State of Security – SPECIAL EPISODE
2020 has been a year full of change. In this week's special episode Brent sits down with Vice Presidents Bryan Taylor, Josh Noland and Max ...
Read More
Podcast
risk-takers #08. The State of Security – SPECIAL EPISODE
https://media.bcast.fm/jwq0nyq8.m4a2020 has been a year full of change. In this week's special episode Brent sits down with Vice Presidents Bryan Taylor, Josh Noland and Max ...
Read More
Business COntinuity Plan Illustration
Blog
What is Business Continuity?
Before completely rewriting your Business Continuity Plan, it helps to understand the fundamentals of business continuity. I put together the following FAQ to give you ...
Read More
Podcast
Podcast | Risk Takers Series #07 Jack Barsky – Former KGB Spy
As part of our on going conversation around corporate espionage, we decided to sit down with a real KGB spy for some insider knowledge. In ...
Read More
Podcast
risk-takers #07 Jack Barsky – Former KGB Spy
https://media.bcast.fm/j8ym6q58.m4aAs part of our on going conversation around corporate espionage, we decided to sit down with a real KGB spy for some insider knowledge. In ...
Read More
Podcast
Podcast | Risk Takers Series #06. Human Trafficking with Bazzel Baz
Human trafficking touches nearly every city, county, state and locality in America. Yet law enforcement remains critically under prepared to handle this insidious business. Bazzel ...
Read More
Podcast
risk-takers #06. Human Trafficking with Bazzel Baz
https://media.bcast.fm/lwvmny48.m4aHuman trafficking touches nearly every city, county, state and locality in America. Yet law enforcement remains critically under prepared to handle this insidious business. Bazzel ...
Read More
Podcast
Podcast | Risk Takers Series #05 Corporate Counterespionage
Its not always the stuff of cold war spy novels but corporate or economic espionage continues to affect businesses all over the world both large ...
Read More
Podcast
risk-takers #05 Corporate Counterespionage
https://media.bcast.fm/5wljl47w.m4aIts not always the stuff of cold war spy novels but corporate or economic espionage continues to affect businesses all over the world both large ...
Read More
Podcast
Podcast | Risk Takers Series #04 Brad Orsini – Community-based Security
Visiting our places of worship shouldn't be dangerous. Unfortunately, faith-based organizations are facing the difficult challenge of how to protect their congregations from religion-motivated violence, ...
Read More
Podcast
risk-takers #04 Brad Orsini – Community-based Security
https://media.bcast.fm/z86p6l78.m4aVisiting our places of worship shouldn't be dangerous. Unfortunately, faith-based organizations are facing the difficult challenge of how to protect their congregations from religion-motivated violence, ...
Read More
Podcast
Podcast | Risk Takers Series #3 Surveillance Detection Routes (SDR)
Have you ever had a gut feeling you were being followed? You might not be so crazy after all. It's a frightening thought. You've spent ...
Read More
Podcast
risk-takers #3 Surveillance Detection Routes (SDR)
https://media.bcast.fm/xw7klzxw.mp3Have you ever had a gut feeling you were being followed? You might not be so crazy after all. It's a frightening thought. You've spent ...
Read More
Blog
How to Prepare for Economic Risk
Best Strategies for Building Resiliency How to position your business for uncertainty If there is one aspect of business that is certain, it's uncertainty. It ...
Read More
Podcast
Podcast | Risk Takers Series #2 Terry Fisher — Electronic Countermeasures
Have you ever stopped to ask yourself what it is about your business that is truly valuable? When you really think about it, any business ...
Read More
Podcast
risk-takers #2 Terry Fisher — Electronic Countermeasures
https://media.bcast.fm/08m9ljk8.mp3Have you ever stopped to ask yourself what it is about your business that is truly valuable? When you really think about it, any business ...
Read More
Blog
The Risk Takers Podcast Series Launches Today!
Chesley Brown Launches the Risk Takers Podcast Series Security Risk Management experts Chesley Brown Companies today announced the launch of "The Risk Takers Podcast Series" ...
Read More
Podcast
Podcast | Risk Takers Series #1 The Aldrich Ames Espionage Case
Dell Spry, a former FBI investigator and counterespionage expert, sits down to discuss the biggest case of insider theft in U.S. History: The Aldrich Ames ...
Read More
Podcast
risk-takers #1 The Aldrich Ames Espionage Case
https://media.bcast.fm/18pln668.mp3Dell Spry, a former FBI investigator and counterespionage expert, sits down to discuss the biggest case of insider theft in U.S. History: The Aldrich Ames ...
Read More
hand stopping dominos from falling, represent a crisis being prevents or stopped
Blog
10 Steps for Building a Crisis Management Communication Strategy
Small changes have a big impact. As a public health crisis of worldwide proportions comes into focus, it is imperative for individuals, organizations, and nations ...
Read More
Blog
7 Tips the Pros Won’t Tell You About Budgeting For Risk
Every business must create its own process for identifying, testing, and budgeting for risk. We studied the data and talked to several industry-leading CSOs to ...
Read More
Two people riding a moving sidewalk into a bright white void to represent transformation
Blog
The Future of Work
The Future of Work: Protecting Trade Secrets Written by: Dell Spry Many businesses, both large and small, are desperately seeking ways to keep their companies ...
Read More
Graphic of two people Looking at charts and graphs representing a risk assessment
Blog
Managing Risk During a Pandemic
5 Tips for Conducting Better Risk Assessments for a Pandemic In earlier sections, we discussed the need for a risk-based approach and outlined 6 New ...
Read More
6 new business risks crom Coronavirus
Blog
6 New Risks for Businesses post COVID-19
Coronavirus: 6 New Business Risks Your risk management strategy can and should play an important role in managing your business's response to the coronavirus outbreak. ...
Read More
Crisis Management Process Framework diagram
Blog
5 Tips for Creating Better Crisis Management Plans
Like a lot of people, you may be wondering what comes next for your business or organization following the Coronavirus outbreak (or any other crisis ...
Read More
Blog
FREE DOWNLOAD Securing a New World: Security, COVID-19, and Boots on the Ground
SECURING A NEW WORLD Thank you for your interest In this free report we have outlined the most effective strategies for protecting your home, school, ...
Read More
Blog
When it Comes to Corporate Espionage, Harvard’s Dr. Lieber is Just the Tip of the Iceberg
When it Comes to Espionage Harvard's Dr. Lieber is Just the Tip of the Iceberg From Chesley Brown International By Dell Spry Renowned Harvard Professor ...
Read More
Blog
Chesley Brown Launches Initiative to Fight Human Trafficking
Chesley Brown Launches New Initiative to Fight Human Trafficking From The Chesley Brown Group Risk Management [dpArticleShare] Chesley Brown, the security management experts, announced today ...
Read More
Blog
Spotlight: Bryan Taylor Promoted to Vice President
Chesley Brown Spotlight: Bryan Taylor Promoted to Associate Vice President From Chesley Brown International Employee Spotlight [dpArticleShare] Chesley Brown is excited to introduce our newest ...
Read More
Blog
Spotlight: Christian Kalinski Promoted to Senior Director of Security
Chesley Brown Spotlight: Christian Kalinski Promoted to Senior Director of Security From Chesley Brown International Employee Spotlight [dpArticleShare] We’re always looking to spotlight the amazing ...
Read More
Blog
An Open Letter on 9/11
An Open Letter on Sep 11th from Managing Director Dell Spry Shared by Chesley Brown International By: Dell Spry [dpArticleShare] They died that day. They ...
Read More
Blog
Chesley Brown Announces Counterespionage Unit
Chesley Brown Announces New Special Operations Unit to Combat the Global Rise in Corporate Espionage From Chesley Brown International Risk Management PROTECT YOUR COMPETITIVE ADVANTAGE ...
Read More
Blog
Account Protection with Password Manager
Account Protection with a Password Manager What good is a password if anyone can read it? From Chesley Brown International Risk Management [dpArticleShare] Password managers ...
Read More
Blog
Chesley Brown Announces Addition to Senior Team
Dell Spry Joins Chesley Brown Team To support the ongoing growth and demand Chesley Brown is pleased to announce Marvin O. “Dell” Spry has joined ...
Read More
Happy kids with rucksacks walking leaving school
Blog
Federal Commission on School Safety Releases Comprehensive Report
  Federal Commission on School Safety Comprehensive Report Released From Chesley Brown International Risk Management [dpArticleShare] President’s Federal Commission on School Safety Releases Comprehensive Report ...
Read More
Blog
Fighting Terrorism with Strong Private Sector Relationships
Fighting Terrorism with Strong Private Sector Relationships From Chesley Brown International Risk Management [dpArticleShare] "Threat mitigation is a team effort; it’s this relationship and collaboration ...
Read More
face recognition, automatic face recognition biometric identification; biometric authentication; identity verification
Blog
Facial Recognition: the First Catch
Facial Recognition Makes its Grand Entry The new technology, deployed in airports across the country, makes its first catch. From Chesley Brown International Risk Management ...
Read More
hands on a keyboard as if hacking into something
Blog
Are Employees an Unintentional Security Risk for Cyber Attacks?
Are Your Employees an Unintentional Security Risk for Cyber Attacks? In these times when malware is prevalent and easily disguised as email attachments or seemingly ...
Read More
Blog
DHS and Canada Team up for First Responders
DHS and Canada Team Up to Develop Resources for First Responders From Chesley Brown International Risk Management [dpArticleShare] Artificial Intelligence Meets Boots on the Ground ...
Read More
preventing economic espionage, trade secret theft and intellectual property theft
Blog
Supreme Court Decision Regarding the Privacy of Digital Data
Supreme Court Decision Personal Rights and the Expectation of Privacy in the Digital Age From Chesley Brown International Risk Management [dpArticleShare] In Major Privacy Case, ...
Read More
Blog
The Evolution of School Security
Special E-Brief June 2018 In the current climate of school shootings, we have anguished over the potentials that may follow the ongoing rise in active ...
Read More
Blog
Threats Our Kids Face Online
Protecting Our Children Against Online Threats Teaching our kids to be wary onlineChesley Brown E-Brief May 2018 From Chesley Brown International Risk Management [dpArticleShare] Cyber ...
Read More
risk management
Blog
10 Steps for Developing An Emergency Response Plan
The Property Manager's Guide to Risk Management From Chesley Brown International Bomb Threats and Suspicious Packages The recent bombing incidents in and around Austin, Texas ...
Read More
first responder on the scene of a disaster
News
10 Steps for Developing An Emergency Response Plan
Bomb Threats and Suspicious Packages The recent bombing incidents in and around Austin, Texas serve as an unfortunate reminder that those responsible for all properties ...
Read More

Additional Chesley Brown Solutions

Clients that rely on Chesley Brown Security Consulting and Management services often request additional services including: