• Eps 8 | The Truth About Security Robots
    Apr 29 2026

    Security leaders deploy cutting-edge robotics because they want to supercharge their environments, but the programs often fail publicly because they neglected the "quiet" operational discipline required to maintain trust.

    In this episode of SecuriTea, Xander sits down with John Palmer, Co-Founder and President of Operations at @Servexousa , to peel back the curtain on why high-profile security pilots, like the recent security robot shutdowns, actually collapse.

    What’s Interesting About This (The Y):
    While most people blame the "tech," the real breakdown is almost always found in communication, governance, and the "boring" work of operational maintenance. John shares his 20+ years of experience supporting federal agencies and high-level infrastructure to explain why "Resilience is Operational".

    In this episode, you’ll learn:
    The top 3 non-negotiables for protecting public trust during a tech rollout.Why silos can actually be a "good" thing if managed with "pipes" of communication. The specific metric that proves your security program is working without eroding trust.Practical steps to take this week if you are planning a pilot.

    Connect with us:
    If you want us to cover a specific headline, drop it in the comments, I’ll bring the receipts.
    Subscribe for more SecuriTea.

    Show More Show Less
    10 mins
  • Eps 7 | NSA Just Told You To Do What?!
    Apr 29 2026

    The National Security Agency says to reboot your router but that’s not real security.

    In this video, we break down what this warning actually means and why rebooting is just a temporary fix, not a strategy.

    If your network can be “fixed” with a restart, it was already compromised.

    We cover:

    Why most networks are still vulnerable
    The hidden risks behind “quick fixes”
    What modern security leaders are doing differently

    Because in today’s world…
    security isn’t about uptime, it’s about unseen compromise.

    Show More Show Less
    2 mins
  • Eps 6 | Identity Is Infrastructure (And You’re Being Left Out)
    Apr 29 2026

    📌 EPISODE SUMMARY
    NIST just updated its Digital Identity Guidelines, but this isn't a technical refresh—it’s a signal that identity is now fundamental infrastructure. In this episode of SecuriTea, Lee Odess (CEO of the Access Control Collective) explains why identity leaders are facing a crisis of influence.

    We dive into why the biometrics industry has a "story problem," favoring technical "spec-offs" over true value creation. If you want to stop being "downstream" of major architectural decisions, Lee shares the specific marketing shifts and metrics you need to get back in the room.

    TIMESTAMPS
    0:00 - Identity is Infrastructure: Decoding the NIST Signal.
    0:47 - Lee Odess & The Access Control Collective.
    1:45 - "In the Room": Why Identity Leaders are Downstream.
    5:18 - Beyond Security: Why HR, IT, and the CFO are Your New Stakeholders.
    7:06 - Old Truths vs. New Truths in Access Control.
    11:43 - The Biometrics "Story Problem".
    13:42 - Utopian vs. Dystopian: Telling the Right Story.
    15:23 - Actionable Shift: Prioritize Marketing & Storytelling Talent.
    16:31 - The Influence Metric: Tracking Where Opportunities Originate.

    👤 ABOUT OUR GUEST
    Lee Odess is the CEO of the Access Control Collective, a handful of companies focused on community, content, and consulting for the growth opportunities in the security industry.

    • Lee Odess on LinkedIn: https://www.linkedin.com/in/leeodess/
    • Secured Podcast: @securednetwork
    • The Access Control Collective: https://www.tacc.me/
    - A modern media and consulting engine helping organizations find their
    "extra edge" in the identity era.
    • The Community: https://www.leeodess.com/executivebrief
    - A digital-first residence for the physical security industry to connect and
    innovate.
    @securednetwork @leeodess3939 ​

    Show More Show Less
    18 mins
  • Eps 5 | AI is Not the Trend
    Apr 29 2026

    At ISC West, AI dominates the conversation.
    But the real shift in physical security is happening beneath the surface.

    This episode explores why proactive analytics, agnostic cloud platforms, and system integrations are converging to redefine how security technology is evaluated and why operational architecture is becoming the true competitive advantage.

    #PhysicalSecurity #SecurityTechnology #ISCWest #AISecurity #VideoSecurity #SecurityIntegration #SecurityLeadership #SecurityInnovation #FutureOfSecurity #SecurityStrategy

    Show More Show Less
    8 mins
  • Eps 4 | Why Security Response is Still Too Slow
    Apr 29 2026

    Security response fails when information arrives late.
    This short shows how unifying 911 audio, video, radio traffic, and voice-driven updates changes everything:
    ⚡ Faster dispatch
    🎧 Real-time transcription & translation
    🧠 Smarter handoffs
    🗣️ Hands-free reporting
    Speed is useless without accuracy.
    This is how both scale together.
    #AISolutions #PublicSafety #MotorolaSolutions #AssistSuites

    Show More Show Less
    1 min
  • Eps 2 | Hidden Security Gap is Getting Worse
    Apr 29 2026

    There’s a security gap inside most infrastructures — and it’s widening as systems scale.
    This episode breaks down the latest findings showing why modern video workflows, cloud-heavy deployments, and legacy architectures are creating silent exposures across large organizations.

    You’ll learn:

    • The structural weaknesses revealed by 2025 industry analyses

    • Why more video is creating more noise, not more clarity

    • How bandwidth, cloud storage, and latency are becoming failure points

    • Why edge-AI and hybrid architectures are now the strategic move for
    leaders

    • What separates security teams that scale video from those that scale
    intelligence

    If your system still pushes every pixel to the cloud, you’re not modern, you’re exposed.
    This is where the gap starts.
    This is how you close it.

    #PhysicalSecurity #AI #SecurityLeaders #Infrastructure #VideoSecurity #HybridCloud #securityinnovation

    Show More Show Less
    2 mins
  • Eps 3 | The Future of Surveillance is LESS
    Apr 29 2026

    Security programs don’t fail because they lack technology.
    They fail because they lack permission.

    In this video, I break down the shift happening right now: the fastest way to scale surveillance isn’t adding features—it’s publishing what you refuse to do, and proving it with architecture.

    Using Austin’s park surveillance debate as the signal, we walk through the “opt-out list” model (no facial recognition, no biometrics, no audio capture, no autonomous analytics), why data ownership and vendor restrictions are becoming baseline, and why “trust” is no longer a PR problem—it’s an architecture requirement.

    Then I share the Guardrails-First framework every security leader should use:
    • Put “what we don’t do” on page one
    • Make auditability non-negotiable
    • AI must return time and increase accountability

    I also use @motorolasolutions new Assist Suites as a case study in “AI with rules”: role-based intelligence, multi-source verification, and auditability where it matters.

    Question: Are you building feature-first systems or guardrails-first programs?
    Comment one word: FEATURES or GUARDRAILS.

    Chapters

    0:00 Permission beats technology
    0:30 Constraints = scale
    0:46 Austin: the opt-out list
    2:22 Guardrails-First framework
    3:38 Public safety: time is measurable
    5:04 Case study: Assist Suites
    7:19 What every security leader should steal
    9:00 Features vs Guardrails (the question)

    Links referenced
    Austin coverage:
    - https://www.axios.com/local/austin/2026/02/03/austin-surveillance

    Motorola Assist Suites:
    - https://www.motorolasolutions.com/en_us/ai/assist-suites.html
    - https://www.motorolasolutions.com/en_us/ai/assist-dispatcher-suite.html
    - https://www.motorolasolutions.com/en_us/ai/assist-responder-suite.html
    - https://www.motorolasolutions.com/newsroom/press-releases/assist-offerings-help-public-safety-agencies-reclaim-hours.html

    Show More Show Less
    10 mins
  • Eps 1 | Not Auditable in 5 Minutes, Don't Deploy
    Apr 29 2026

    If it’s not auditable in 5 minutes, it’s not deployable.”
    Why? Black-box analytics don’t win—governance as the product does: visible, testable, repeatable.

    Run the 5•5•5 Audit Challenge
    5-minute explainability: who, what, why, model/version, decision path.
    5 artifacts: event log, model hash, config snapshot, evidence package, retention policy.
    5 defaults: masking on, role-based views, least-privilege keys, exportable evidence, auto-expiry.

    This week’s actions:
    1. Pick one high-impact analytic and build its explainability pack.
    2. Turn on exportable evidence + verify role-based views.
    3. Schedule a 30-minute tabletop with Legal.

    Comment to engage: Drop A/B/C below —
    A = your top blocker • B = your hardest default • C = your first Q1 control

    Show More Show Less
    1 min