AI & Security Podcast

Episode 3 Artificial Intelligence in Threat Monitoring

On Sep 21, 2018

 Podcast Imagie for TM 2

I first met Brian Szady at the then ASIS International Annual Show, now called GSX in September of 2017.  Although he and I had spoken many times, this was the first time I had met him in person.  I knew from his LinkedIn photo that he didn't look like your stereotypical "security guy", and when I met him in person,  that opinion did not change.  Particularly when he stood next to his father, David Szady, the retired Associate Director of Counter Intelligence with the FBI.  The reason he didn't look the part of the "security guy" was simple, he isn't. 

Brian comes out of Silicon Valley, with a past history of successful technology start ups.  He is bringing his technology experience, particularly with artificial intelligence, and integrating them with the best practices he has learned from the FBI and CIA in the intelligence gathering processes and created a product called Threatminder.

Threatminder has been in development for over a year, as they have worked closely with Allied Universal (AUS), several key investigative agencies, and their clients to further develop the product.  The full version will be released in the fall of 2018.  When he started on this journey, Threatminder wasn't the planned result.  The original idea was around brand sentiment, but as he talked more with his father and his colleagues at AUS, he realized that the same core algorithms could be applied in a slightly different manner to create a threat monitoring service that would allow customers to proactively protect and respond to threats, risks and liabilities.  This product isn't your standard open source intelligence sorter, rather the idea is to focus on specific assets allowing a user to conduct a one time investigation or establish on going monitoring.  The assets could be people,  locations, brands, or many other options.  With their ability to scrap data from open sources, social media, and more importantly, the deep and dark web, Threatminder can provide many different angles of information for the security professional, the investigator, the human resource manager, the lawyer, or many other people to review and determine if a threat exists. 

In today's podcast, Brian and I talk about how he has applied artificial intelligence, or as he prefers to call it, "applied machine learning", to the product.  We talk about the value proposition, how he has worked to create an easy to use user interface, and how the product will only get better as the algorithms process more and more data.  

Please listen here or on iTunes and please leave your comments below.  You can subscribe to the AI & Security podcast on iTunes or where ever you get your podcasts.  Enjoy.

Dennis Crowley

By Dennis Crowley

Dennis is the Managing Member of Belenus Holdings. With over 25 years in the security industry, he has extensive experience within the manned guarding industry as well as the security technology sector. Dennis is a graduate of the University of Massachusetts, Harvard University, and Suffolk University Law School. He is a member of the Massachusetts Bar, ASIS International, BOMA International, and YPO.

Blog Comments