Elevating executive protection with data analytics amid rising threats

April 4, 2025
In response to the assassination of United Healthcare CEO Brian Thompson, companies are reassessing their executive protection strategies, with 360 Privacy leveraging data analytics to stay ahead of modern threats.

In a volatile socioeconomic climate, the role of executive protection has undergone rapid evolution. Traditional security measures, including manned guard forces and physical surveillance, are no longer sufficient to mitigate modern threats. The tipping point erupted in raw video footage on December 4 last year when United Healthcare CEO Brian Thompson was assassinated outside his New York City hotel. Thompson was alone on the street with no security detail despite having received recent threats from the killer.

Unfortunately, this type of executive behavior is not uncommon. Many organizations either downplay or ignore executive protection at the request of their personnel. However, following the tragic events surrounding the Thompson murder, these same companies are reassessing their policies and approaches to protecting high-value individuals.

In a recent SecurityInfoWatch article by Rick Mercuri, a Senior Advisor for Corporate Security at Rebel Global Security, he stated: “The hard truth is that short-term security surges or simply hiring a security detail are more performative than substantive, and security theater is more than actual security. These quick and easy fixes are not a substitute for a well-planned executive protection (EP) program that is thoughtfully designed and horizontally integrated with other security functions, including intelligence, physical security, cyber security, and crisis management, supported by clear policies, procedures, and training.”

Disrupting the Attack Planning Cycle

One of the core principles guiding this evolution is the concept of disrupting the attack planning cycle. This six-step methodology includes phases such as target selection, surveillance, and planning. Historically, bad actors conducted physical surveillance to gather information on their targets. However, today’s perpetrators often operate digitally, leveraging open-source intelligence (OSINT) to obtain executive data without leaving their homes.

 

“We aim to disrupt this process by removing key pieces of data from their reach,” says Trinity Davis, Managing Director of Strategic Intelligence, 360 Privacy a leader in executive protection with a background in military operations and two decades in the executive protection industry, who explains that the integration of data analytics has emerged as a powerful force in the realm of protection. “It may sound counterintuitive, but we aim to push them back into the physical space, where they are more likely to be detected—whether by a trained security driver, CCTV, or physical security personnel.”

 

This proactive approach significantly enhances the effectiveness of physical security measures. By pushing adversaries into observable environments, organizations increase the likelihood of identifying and neutralizing threats before they escalate.

The Socioeconomic Impact on Security

The growing wealth gap and heightened public resentment toward corporate leadership have intensified the need for robust executive protection. Recent incidents, including the assassination of the UnitedHealth Group CEO, have underscored the reality of these threats. Even more troubling is the public support some perpetrators receive, as demonstrated by the substantial fundraising efforts following such attacks.

“We are seeing a shift where CSOs are gaining influence in the boardroom. Organizations now recognize the fiduciary responsibility of protecting their executives, not only for safety reasons but also to mitigate financial and reputational risks,” Davis says. “Due to this growing hostility, CSOs are now gaining a seat at the boardroom table, where they previously had limited influence. Companies are beginning to recognize their fiduciary responsibility to protect executive leadership, not just for safety reasons, but also because attacks on executives can result in significant financial devastation.”

The financial repercussions of executive attacks can be severe. In the aftermath of the UnitedHealth CEO's death, billions of dollars in market value were lost overnight.

The financial repercussions of executive attacks can be severe. In the aftermath of the UnitedHealth CEO's death, billions of dollars in market value were lost overnight. This stark example has prompted organizations to reconsider their risk management strategies and elevate the role of executive protection within their corporate governance models.

Bridging the Gap: Physical and Cybersecurity Integration

A significant aspect of modern executive protection involves the convergence of physical security and cybersecurity. Historically, these two domains operated in silos. However, the increasing prevalence of digital threats necessitates a more integrated approach. Bridging that gap is essential because both teams are responsible for executive protection.

“When an executive’s personal information is exposed online, it creates a tangible physical risk,” Davis said. “CSOs and CISOs must collaborate to ensure a seamless protection strategy that covers both the digital and physical realms.”

This collaboration includes activities such as monitoring dark web forums for leaked information, removing executives’ personal data from public databases, and ensuring cybersecurity measures extend to personal devices and accounts. By aligning physical and cybersecurity teams, organizations can establish a comprehensive risk management framework.

Davis stresses that “this approach can provide a sustainable and effective security framework when implemented correctly.”

Developing a Tailored Protection Strategy

Every organization operates within a unique risk environment. Davis emphasized the importance of conducting comprehensive vulnerability assessments to identify specific threats that executives face. This process involves analyzing data from various sources, including:

  • Open web activity, such as social media posts and public reviews.
  • Data breaches that expose personal information.
  • Gaps in online privacy protections.

Once vulnerabilities are identified, security teams can implement targeted mitigation strategies. These may include removing sensitive data, enhancing digital privacy settings, and providing executives with cybersecurity awareness training.

Adapting to Evolving Threats

As the nature of threats continues to evolve, executive protection strategies must remain agile. Many CEOs, particularly those unaccustomed to heightened security, may resist a constant security presence. In response, organizations are adopting hybrid protection models that balance overt and covert measures.

“We need to create adaptable models that align with the company’s culture and the executive’s comfort level,” Davis explained. “Scalable protection allows companies to respond to emerging threats without disrupting daily operations.”

Additionally, continuous training and scenario-based exercises help security teams stay prepared for new and emerging threats. Threat intelligence platforms that leverage machine learning algorithms can provide real-time insights, enabling proactive decision-making.

“We started as a physical security company. Most of our team comes from operational backgrounds, whether from special operations, the intelligence community, or, like me, the military. I’ve spent the last two decades focusing on the physical security aspect of the executive protection model. However, our primary goal has now changed,” adds Davis.

The Role of Strategic Investment

Davis also highlighted the significance of FTV Capital’s recent investment in his organization. This financial backing will drive advancements in technology, expand operational capabilities, and enhance data analytics capabilities.

“This investment is a game-changer for us. As threat tactics evolve, we must stay ahead by continually improving our strategies. These funds will help us enhance our technology, expand our capabilities, and scale our operations. We currently work with 32 Fortune 100 companies, and our goal is to develop this market share by continuing to innovate and deliver proactive security solutions,” says Davis..

Conclusion

The future of executive protection lies in a data-driven, collaborative approach. By integrating cybersecurity with physical security, conducting continuous risk assessments, and leveraging advanced analytics, organizations can safeguard their leaders more effectively than ever before.

As Davis succinctly states, “We’re no longer just talking about gates, guards, and guns. We’re in the era of gates, guards, guns, and gigabytes. For organizations committed to proactive risk management, this evolution represents both a challenge and an opportunity to strengthen their security posture in an increasingly complex world.”

 

About the Author

Steve Lasky | Editorial Director, Editor-in-Chief/Security Technology Executive

Steve Lasky is Editorial Director of the Endeavor Business Media Security Group, which includes SecurityInfoWatch.com, as well as Security Business, Security Technology Executive, and Locksmith Ledger magazines. He is also the host of the SecurityDNA podcast series. Reach him at [email protected].