Big Interview: Tracy Reinhold

Tracy Reinhold, former Deputy Head of National Security and current CSO of Everbridge highlights the importance of communication strategies and proactive intelligence  

Could you give us a brief insight into who you are? 

I began my career in law enforcement, dedicating 22 years to the FBI. During my tenure, I rose through the ranks and ultimately retired as the Deputy Head of National Security in Washington DC, a role that honed my skills in managing complex security operations and strategies at a national level. Following my service at the FBI, I transitioned to the private sector and became the first ever Chief Security Officer at Fannie Mae, which is known for its critical role in the secondary mortgage market in Washington DC. 

At Fannie Mae, I was exposed to Everbridge’s services as we were a client of theirs. My experience as a customer allowed me to see firsthand the value and impact of Everbridge’s technology in the security space, which influenced my decision to join the company. At Everbridge, I am not in a conventional Chief Security Officer role; my responsibilities extend beyond typical security tasks. I am actively involved in developing and implementing our security strategy, ensuring it aligns with business objectives and enhances our operational resilience. I also interface directly with our customers, providing them with strategic insights and support, especially to other Chief Security Officers. Additionally, I serve as an evangelist for leveraging technology in security practices, promoting innovative solutions that advance our field. This role allows me to blend my extensive security experience with forward-thinking technology applications to enhance our company’s and our clients’ resilience and safety. 

We are here to talk about business resilience. If a business has discovered a potential threat from a single source, what would you recommend they do?  

The initial step is to pause and thoroughly assess the information received. It’s crucial to not rush into a reactive stance. In dealing with potential threats, especially those that may seem urgent or severe, the verification of information is key to forming a rational response. Multi-source authentication plays a vital role here; it allows you to validate the credibility and seriousness of the threat. 

When the threat emerges from less reliable sources, like social media—which is known for its rapid dissemination but lower reliability—it becomes imperative to corroborate this information through more reliable channels. This could involve cross-referencing with open-source communications, consulting mainstream media outlets, or engaging directly with local or national law enforcement agencies. 

Such a comprehensive review process is essential because it prevents the organisation from making precipitous decisions based on possibly inaccurate or incomplete information, which could lead to actions that might negatively impact the business. This strategic patience ensures that any response is well-considered, measured, and appropriately scaled to the actual level of threat, thus safeguarding the business against overreaction and its potential repercussions. 

Can you discuss the importance of proactive intelligence and technology in handling threats?  

Proactive intelligence is crucial as it empowers us to anticipate and prepare for threats before they escalate into significant issues. By harnessing the power of AI and machine learning, we can sift through and deconflict a vast amount of intelligence from our extensive network of over 25,000 sources. This technological capability not only speeds up our access to critical, actionable information but also enables us to form effective mitigation strategies well in advance of potential disruptions. 

Moreover, the integration of these advanced technologies with traditional physical security systems dramatically enhances our overall security posture. For example, when AI is combined with video surveillance systems, it greatly improves our ability to detect and respond to threats promptly. This synergy allows for a more dynamic defense mechanism against a variety of threats, providing a robust security framework that is proactive rather than reactive. By leveraging both cutting-edge technology and conventional security measures, we ensure a comprehensive and preemptive approach to organisational safety and resilience…

Read the full article for free in our latest issue here.

Never miss a story… Follow us on:
Security Buyer
 @SecurityBuyer
 @Secbuyer

Media Contact
Rebecca Morpeth Spayne,
Editor, Security Portfolio
Tel: +44 (0) 1622 823 922
Email: [email protected]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Christina Alexander Judge - SecurityBuyer

Christina Alexander Announced as Security Buyer Awards Judge

Security Buyer is proud to announce Christina Alexander as the latest addition to the distinguished judging panel for the Security…
Milestone - SecurityBuyer

Milestone Systems updates across XProtect, BriefCam, Arcules

Milestone Systems today announced updates across its complete security technology portfolio with releases for XProtect
Big Interview Abdullah Tanoli

Big Interview – Hero of Leicester Square

Rebecca Spayne of Security Buyer has the privilege of speaking with a real-life hero, Abdullah Tanoli, the hero of Leicester Square..
SentinelOne & AWS - Security Buyer

SentinelOne Teams with AWS to bring Cloud Security Protection

SentinelOne announced that it is a launch partner for the new AWS Security Hub. The new collaboration builds on a long standing..
Genetec - Security Buyer

Genetec and Hanwha Vision

The latest in our ongoing series introducing Hanwha Vision’s pioneering partners, leads us to Ben Durrant, Account Executive at Genetec Inc.
Altronix - SecurityBuyer

Altronix POE367 Delivers 277VAC Support

Altronix has expanded its power product line with the new POE367 power supply/charger designed specifically for 277VAC input environments.
IFPO x GSA - Security Buyer

New Corporate Members for IFPO

The Global SecurAlliance (GSA)summer meeting on 16 June was held again at the stunning Château de Méry-sur-Oise on the outskirts of Paris.
Product Spotlight - HID

Product Spotlight – HID

Access control is evolving into a smart, responsive platform—integrating embedded apps, IoT, and cybersecurity to deliver…
Genetec

Genetec brings new capabilities to Security Center SaaS

Genetec announced new updates to Security Center SaaS, the company’s enterprise-grade Security-as-a-Service (SaaS) solution..
I-Pro

i-PRO Launches Revamped EMEA Partner Program

i-PRO announced a major expansion of its EMEA Partner Program. The move supports i-PRO’s long-term growth strategy and…
Scroll to Top