Your Content Goes Here
Your Content Goes Here

Corporate Security Management Course: A Protective Intelligence Program 

Approved for post 9-11 VA benefits for all ESI core residency programs. There are two dates in 2022 for the Corporate Security Management residency.

  • 2022 Spring Corporate Security Management April 17 thru May 7, 2022.
  • 2022 Fall Corporate Security Management September 11 thru October, 2022.

*It is best to register for the class at least 60 days prior to the start date. This ensures that you have a seat in the class that works best for you. 

Greg Sherrill teaching a class on corporate security management

The Corporate Security Management Course (CSM) is a 21-day residency and trains Corporate Security Professionals and Executive Security Officers to manage risks in a corporate setting. The program covers best practices in a wide range of issues confronting corporate security personnel. These issues include monitoring, tracking, and responding to global crises whether human or natural.

The 21-Day Corporate Security Management Course is divided into four blocks of instruction:

  1. Intelligence-driven corporate security and protective services.
  2. EP program manager/team leader.
  3. Crisis Management
  4. Basic Technical Surveillance Counter Measures (TCSM).

Course Descriptions

Filippo Marino, Tegumen Inc.

EP Program Manager / Team Leader

Filippo Marino is the Founder and Managing Partner of Tegumen, a risk mitigation advisory firm focused on intelligence-driven brand, operations, and personnel protection strategies. Over the course of his career, Filippo has developed, led or optimized security, intelligence and risk management operations as both an adviser and functional leader. In his most recent corporate role, he established and managed McDonald’s Global Risk Intelligence & Executive Protection programs.

Overview of Course

EP Team Leadership and Program Management

The objective of the course is to introduce students to the fundamentals of Executive Protection programs management, and qualify them for a functional leadership role in a corporate context.

Class participants are introduced to planning, design, and management principles – both strategic and tactical – associated with leading successful Executive Protection programs and details in a small, medium or large corporate environment. The program will emphasize 3rd-generation EP principles of adaptive and intelligence-based operations, guiding students through realistic scenarios and applications of the PROTECT decision-support framework for planning and executing complex protective details.

The course is based on real-world experience and industry best-practices, presenting applicable insights across the following management aspects:

  • People

Be it the protectees and their entourage, or your team members and contractors, no EP program or operation can succeed without effective stakeholders engagement. We will explore who they are, how they could derail your efforts, and how to turn them into assets.

Training Modules:

  • Defining Success: Recognizing (and Pursuing) a Great EP Program
  • Resources Management: Internal vs. Outsourced Personnel
  • Building Organizational Trust & Alliances
  • Ethical standards, Confidentiality, and Professional Boundaries
  • Risks

Any effective risk mitigation function (such as EP) rests on deep and accurate understanding of the risks, threat, and vulnerabilities affecting not only the protectee, but any aspect of a protective security program. We will review fundamental definitions of risk, how it is measured, and exercise proven assessment models befitting EP operations.

Training Modules:

  • 3rd generation EP Programs Objectives
  • The Executive Risk and Vulnerability Assessment
  • Risk Assessment for Protective Ops
  • Intelligence & Information Technology

3rd-generation EP programs are known for being intelligence and circumstance-driven. Protection professionals require stronger than ever ICT competencies to manage the growing data deluge and effectively operate across back-office and mobile platforms, applications, and tools.

Training Modules:

  • Protective Intelligence 2.0
  • Introduction to Judgment & Decision-Making (JDM)
  • Core ICT Competencies & Requirements
  • Measurement & Metrics

There are few, if any, aspects of an EP program that could and should not be measured. In most enterprise contexts, the ROI, value proposition, and performance metrics are directly tied to the function’s effectiveness and longevity. We will explore how to embed metrics in standard operating procedures, and how to best leverage and present the information to increase your program’s credibility and success.

Training Modules:

  • Selecting and Implementing Program & Performance Metrics
  • Effective Budgeting for EP Programs and Details

Intelligence-Driven Corporate Security & Protective Services

Overview of Course

This course is designed to allow risk mitigation professionals to develop and lead an intelligence-driven security and risk management role within a corporation or multinational organization. The course of instruction will stress functional knowledge of the intelligence, risk management, and decision making domains in a business application.

Risk Intelligence and The Intelligence Cycle

Students will learn the corporate applications of the intelligence cycle, standards of practice, and code of conduct appropriate to the modern enterprise. Students will learn how to use open sources of social media, methods, tools available, and what are the best practices for information management, report writing, and circulation to upper management in a timely and useful format.

As an intelligence-driven course, students will learn measurement principles and methods for risk management and protective operations. They will learn metrics and measurement challenges and how to identify risk priorities and communicate the results to management.

Crisis Management

This course teaches the state of practice of crisis management across corporate America, and how critical information and crisis is managed and communicated within the organization. The student learns how issues of management converge with executive protection.

In addition to critical executive services, the student will learn the terms of major event security planning whether they are natural or human disasters; they will learn the key roles of operations planning and responsibilities. The course covers managing critical organizational and external liaisons.

Intelligence and Corporate Protective Services

This course covers program design for protective services and common management principles. Students learn the PROTECTION MODEL for modern corporations as well as Adaptive vs. Protocol based protective operations.

This course covers executive protective services as a special category within corporate security. The student will learn how protective service practices have evolved in modern and multinational corporations in the information age. Students will learn how to manage information gathered on Groups or Persons of interest (GOI/POI).

Students will learn to distinguish between routine and extemporaneous activities, and how to manage close protection in both environments. Incident Management is an integral component of protective services whether human or natural.

Crisis Management with Greg Nelson

Critical Incident Team Management

Mr. Nelson is a privacy, protection, and preparedness advocate, with over twenty-five years of security industry experience building value-added security strategies for businesses, organizations, communities, and individuals. His expertise draws on a deep and diverse background, which includes professional and volunteer experiences in the public and private safety sectors, as well as years of corporate security work with various Fortune 500 companies.

This course introduces the student to the basics of crisis planning and management across corporate America, and provide insight into the practical steps involved in managing and responding to natural or man-made disasters.

Students are exposed to the steps involved in planning for disasters, the key roles to be filled during a disaster, and how information is passed and acted on as a crisis unfolds. They will learn the major responsibilities and priorities of a disaster plan, and how they affect and impact executive protection duties.

The course covers the strategies and tactics of navigating at all levels of crisis management, from decision making and communications to pre-planning and resource allocation. It provides the student with practical knowledge to respond to a crisis appropriately while maintaining the integrity of their protective operations.

Through the use of real-world examples and case studies, students are exposed to the challenges and lessons learned from previous crises. Using table-top scenarios and team focused assignments, students will understand the steps needed to properly and successfully plan for, and manage a variety of disaster situations, whether natural or man-made.

Technical Surveillance Counter Measures (TSCM) for Protection Agents

Overview of Course

Information Security is a critical aspect of corporate operations, whether it is Voice, Data, or a mixture of both. Every corporate security professional needs to have a working understanding of the problem and how to develop solutions. The first priority is to understand the problem, and the need to keep the information safe and secure. Corporate security agents use these skills at corporate headquarters, and as a part of the Executive Protection Protocols for teams in the field.

Risk Assessment of Technical Surveillance

This course concentrates on teaching students how to conduct information Risk Assessments, as well as to conduct basic Information Countermeasures. Basic TSCM skills are taught using equipment that the staff carries on assignments. Students will learn basic computer security countermeasures with software and available PCs.

Covert Technical Surveillance Techniques

The course covers basic covert surveillance techniques to give the student a working knowledge of issues they will be facing during the course. The legal aspects of both spying and countermeasures are discussed to help ensure that the students understand their responsibilities and the legal pitfalls of counter-espionage casework.

The course covers the development of an espionage case from the point of view of the attacker and the methods used in developing their plan for acquiring the information they need. Each team in the course is given an assignment of collecting information that is required from the victim for a successful attack. They will learn to utilize the extraction techniques in the most efficient ways to obtain the necessary information.

The instructors will teach the various technical means of gathering the information to include case studies of corporate espionage attempts and successes. Students will learn which equipment is the most applicable for the given assignment.

Sweep Equipment

Students will learn how to select instruments for a Go-Bag of espionage equipment and how the instruments are used to conduct a basic counter-espionage sweep of executive suites and meeting sites. The same scenarios will be used to show the students both the capabilities and limitations of counter-espionage equipment.

Hacking Threat

Students will learn how hackers acquire information from unsecured computers and the best practices to secure personal and business computers. Students learn cybersecurity methods while on the road with traveling executives and how best to defend their own systems in the process.

Students will learn all of the above in practical exercises with a team and individual applications. They will graduate from this course with a basic understanding of how to conduct technical surveillance sweeps of physical spaces as well as computer equipment and the legal implications in a corporate environment.

Cyber Breaches & Countermeasures

Cyber Security has become a buzz word in the media for the last 5+ years that has caused a significant amount of interest in either understanding what Cyber is or to educate themselves to prepare for Cyber-Related Incidents.

Complementing the TSCM course by former Secret Service, Rich Roth, this course will start with the student’s perception of the threat landscape. This primer course immerses students in the arena of cyber threats and provides close protection agents with some essential tools to protect their clients without the necessity of years of experience.

  • Conducting a Vulnerability Assessment
  • Presenting findings from Vulnerability Assessment
  • Evaluating Cyber Security and Communication Security
  • Integrity safeguards for advance, covert, and private sector operation engagements
  • Audit, Inspect and Evaluate an organization’s Regulatory Compliance
  • Assess an organization Regulatory Risks based on OSINT
  • Quick Observation timing constraints
  • Developing secure communication channels,
  • and enacting emergency communication
  • Identify Indicators of Compromise to Public, Private, and Security Related organizations.
  • Successfully deploying a believable phishing campaign
  • Development and execution abilities to detect, deter and counter, offensive Cyber Tactics

Emotional Intelligence with Brandon Delcamp

First of all, you must understand that training at ESI is different. There are many EP training events and schools around the country, ranging from a couple of days of online webcasts to in-person courses with durations of days or weeks. Many are still using the same methods and instilling the same skill sets from past decades, ignoring the fact that those methods are sorely outdated and have been proven to be much less effective in the field than initially thought. ESI has been training Executive Protection Agents for 40 years and we constantly evaluate the effectiveness of our training, with input from our graduates and our business partners who hire our graduates, so our training methods and priorities can evolve to meet new realities. Our training constantly evolves.

Probably the biggest evolution in our training is downplaying the intense physical skills that have been stressed in past years and concentrating on methods that actually bring success in the modern world. This segment of training teaches “Emotional Intelligence” or “EQ”, which is an indispensable attribute in any workplace and certainly in the protection arena. One of the most frequently requested skills from our business partners who hire ESI Graduates is Emotional Intelligence. EQ enhances communication, problem solving, teamwork, management, and relationships in the workplace. It is a learned skill that can be taught and developed and is one of the skills that helps our graduates become team leaders rather than just team members.

In this course, you will learn to develop better self-awareness and self-control, work better in a team environment, develop better self-motivation skills, more quickly adjust to changes in the workplace, critically elevate the workplace environment and improve the overall efficiency of you and your team. Following graduation, you will find that you automatically apply these skills in your personal interactions for a positive impact on your home life and personal interactions.

A common trait among top performers in almost every industry is high Emotional Intelligence, and an overwhelming percentage of the traits that help individuals succeed is related to EQ. (Communicate, Persuade, Inspire, Lead) Why does ESI feel so strongly that Emotional Intelligence training is critical? It is because we want our graduates to have these skills and abilities in their toolbox to make them the most effective EP Agents possible.

Overview of Course

Emotional Intelligence is understood to be an indispensable skill set in any workplace. When talking with companies seeking ESI Graduates one of the most frequently requested skills was Emotional Intelligence. Emotional Intelligence or EQ enhances communication, problem-solving, teamwork, management, and relationships in the workplace. It has been tied to and a better predictor of workplace success than IQ and is a learned skill that can be taught and developed.

In this program, you will be able to develop better self-awareness and self-control, work better in a team environment, develop better self-motivation skills, better adjust to changes in the workplace, elevate the workplace environment, improve productivity and efficiency and even apply these skills in your personal interactions for a positive impact on your home life and personal interactions.

Studies have shown that 90% of top performers across multiple industries have high EQ, and 80-90% of the traits that make them successful are EQ not IQ.  Based on a standard IQ threshold, during peer evaluation asking what makes an individual a top performer, responses were 100% EQ focused….(Communicate, Persuade, Inspire, Lead).

Why Emotional Intelligence Training:

  • Helps to understand complex issues
  • Simplifies conflict resolution
  • Overcome life challenges
  • Better workplace environment
  • Better time management
  • Productivity increase
  • Influence team members
  • Reduces anxiety and stress
  • Improves relationships
  • Better teamwork
  • More flexible in making adjustments
  • Higher motivation
  • Work calmly under pressure
  • Staying positive in difficult situations


Upon completion of any of the three Core Programs, the student is awarded a Certificate of Completion. An ESI Credential is awarded for Certified Protection Specialist ™C.P.S, Certified Security Management Specialist, Certified Protective Operations Specialists, and the highest award is granted for a Certified Security Specialist upon achieving the ESI Standard Grade Point Average of 80% or above.


If a student enrolls in the Residency format, the course is completed in a three-week period and the student is awarded the Certificate at the time of completion. It is possible to break the three-week curriculum into smaller modules and the student accumulates credit as the modules are completed.

ESI is approved by Sallie Mae, a federally approved student tuition loan company.

The cost of administration and initial registration is separate from the cost of the individual courses, which are itemized.

Enroll Online
Training Dates