Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.


Check here if you're human


Executive Security

The Problem: This newspaper headline depicts how low a criminal will go. Celebrities, high profile executives or even low profile moneyed individuals and their families are often targeted by criminals due to what they may have access to, their notoriety or financial status. Kidnapping, assaults, robberies, home invasions and even high tech crimes are often perpetrated on unsuspecting affluent families.

The Solution: Develop a proactive strategy that protects and preserves without impeding quality of life. A comprehensive security program is based on threat and risk level as well as the probability that a real threat exists. Coordinating a risk management strategy involves extensive research and customization. Risk mitigation revolves around the threats that a person or family is up against as well as their individual situations. Whether at home, traveling abroad or taking the kids to school, a system needs to be in place to reduce risk and increase the likely hood of avoiding and removing oneself from a dangerous situation.

You’ll Learn:

  • How to determine your level of risk, what issues have you faced, what problems are in your future.
  • Predicting and preventing violence, threats and theft.
  • Fundamentals of premise security including – gates, guard, dogs, cameras, securing mail boxes, points of entry and exit.
  • Effective home security features including bullet proof doors, shatter proof glass, alarms, secure phone lines, safes and safe rooms.
  • Incorporating a multilayered approach to personal and physical security.
  • Proper screening of employees and vendors including background checks on grounds employees, maids, nanny, butlers, pool maintenance and gardeners.
  • Effective evacuation plans in case of and intrusion or natural disaster.
  • Protecting children at home, on the way to, and at school, workers interacting with them, including nannies, piano and tennis instructors, internet safety and more.
  • Secure transportation, safe vehicles, armored, trained drivers, defensive driving, selected routes, tracking devices and emergency plans.
  • How to train employees including nannies, staff, gate guards on security and medical emergencies.
  • Protecting computers, data and internet files from being hacked and identity theft.
  • Protecting privacy in the public eye on the web and keeping personal info-personal.
  • Securing vacation properties and second homes, travel security and safety.
  • Threat assessments to determine who your enemies are and what their motivation may be.

Download PDF version

Similar Posts from the Security Blog

  • Evaluating Physical and Information Security Risks
    When it comes to protecting an organization’s information, flaws with this can involve either implementing strong technology to protect too much trivial data, or inadequate protection of important and sensitive data.
    In short, not enough attention is cast upon a company’s most important information; there’s a gap between the IT department and the operational units of
  • How to protect your network from malicious insiders
    You may be putting your company at risk simply by hiring a new employee. Why? Because that person could have a hidden, malicious agenda.
    This is known as an inside threat, and it means that someone within your organization is planning or conducting activities meant to harm the company.
    There is a pattern that most insider threats
  • 11 Ways to Mitigate Insider Security Threats
    Companies are constantly attacked by hackers, but what if those attacks come from the inside? More companies than ever before are dealing with insider security threats.Here are 11 steps that all organizations should take to mitigate these threats and protect important company data:

    Always encrypt your data If you want to minimize the impact of

  • Safety and Security on College Campuses
    Robert Siciliano Identity Theft Expert

    You’re in high-school and you’ve been having numerous discussions with friends and family about what colleges you want to go to. Maybe you’ve even applied to a few and have been accepted and in some cases rejected. Your search for schools generally involves the type of education you will receive, costs,

  • Data Breaches: How To Protect Your Business From Internal Threats
    The biggest threat to your data may not come from external hackers. Find out how to guard against intentional or accidental internal cyber breaches.
    The NSA leaks we keep hearing about are a constant reminder of just how vulnerable data is and how this vulnerability can result in data breaches by organization insiders. As Reuters reported,


Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in