We got you covered.

Incorporating the Six Thinking Hats in Executive Protection Decision-Making

Must Read

By Monica Duperon Rodriguez, Founder of Women in Protection LLC

Executive protection (EP) requires quick decision-making, situational awareness, and a structured approach to problem-solving. Protecting high-profile individuals involves assessing risks, planning security strategies, and responding to evolving threats. Given the complexity of this work, applying Edward de Bono’s Six Thinking Hats methodology can significantly enhance decision-making processes within an EP team.

Developed by Edward de Bono in 1985, the Six Thinking Hats method is a parallel thinking framework designed to improve decision-making and problem-solving by encouraging individuals and teams to analyze situations from multiple perspectives. Instead of relying on habitual thinking patterns or individual biases, this structured approach helps teams explore different angles of a problem systematically. Originally introduced as a business and management tool, the Six Thinking Hats have been widely adopted in corporate strategy, innovation, healthcare, education, and conflict resolution to enhance creativity, improve communication, and foster comprehensive decision-making.

For executive protection professionals, this methodology provides a powerful tool for enhancing risk assessment, strategic planning, and crisis management. By systematically applying different modes of thinking, facts, emotions, caution, optimism, creativity, and organization, EP teams can develop well-rounded security strategies that anticipate threats while remaining adaptable to evolving situations.

This article explores how each hat can be applied in executive protection and provides real-world examples to demonstrate how this approach can improve security operations, ensuring more effective and intelligent protective measures.

Applying the Six Thinking Hats in Executive Protection

#1 White Hat – Gathering Facts and Information

The White Hat represents objective analysis, focusing on data, intelligence, and verified facts.

In EP, information is critical. Security teams rely on intelligence reports, surveillance data, and historical incident analysis to make informed decisions. Using the White Hat, teams can ask:

    • What do we know about the protectee’s schedule and movements?

    • What are the known threats based on intelligence reports?

    • What security measures are in place at the event venue?

    • Are there any recent incidents or threats that require immediate attention?

Real-World Example:

A corporate executive is scheduled to attend a high-profile business summit in a foreign country with recent civil unrest. The EP team, using the White Hat, gathers intelligence from local law enforcement, embassy security reports, and previous incidents in the area. They analyze historical data on protests, crime rates, and potential risks, ensuring all security measures are based on objective information rather than assumptions.

#2 Red Hat – Considering Emotions and Intuition

The Red Hat allows EP professionals to consider gut instincts, emotions, and psychological factors.

While security is largely analytical, human intuition plays a role in decision-making. Experienced security personnel often develop a “sixth sense” for danger. The Red Hat can be used to explore:

    • What is my instinct telling me about this situation?

    • Does anything feel ‘off’ even if there is no hard evidence yet?

    • How does the protectee feel about the security measures?

    • What is the overall mood of the crowd at an event?

Real-World Example:

A celebrity is attending a red-carpet event. The security team has analyzed threat intelligence and found no imminent danger. However, one of the lead agents feels an uneasy atmosphere in the crowd. He notices subtle signs of agitation, such as individuals lingering too long, avoiding eye contact, or shifting positions. Trusting his gut instinct, he orders a modification of the protectee’s route. Minutes later, a fan rushed the red carpet, attempting to break security lines, but thanks to his intuition, the team was already positioned to block the breach.

#3 Black Hat – Identifying Risks and Weaknesses

The Black Hat focuses on caution, risk assessment, and potential problems, a crucial aspect of executive protection.

Applying the Black Hat means considering what could go wrong in a given situation:

    • What are the vulnerabilities in the security plan?

    • What are the worst-case scenarios, and how do we prepare for them?

    • Is there an escape route if an emergency occurs?

    • Are any team members undertrained or unprepared for this assignment?

    • What legal or ethical risks are involved?

Real-World Example:

A high-profile CEO is scheduled to speak at a major tech conference. The venue’s security team assures the EP unit that all entrances are controlled. However, using the Black Hat, the team conducts an independent risk assessment and discovers a loading dock entrance with minimal security oversight.

To mitigate this, they station an additional covert security detail near the area. Later, a disgruntled former employee attempts unauthorized entry through the loading dock but is intercepted before reaching the event floor.

#4 Yellow Hat – Focusing on Opportunities and Positive Outcomes

While security teams often focus on risks, the Yellow Hat encourages them to consider opportunities and benefits.

In EP, this mode of thinking is useful when assessing potential advantages of security measures rather than just threats. Questions include:

    • How can we enhance security while maintaining a positive experience for the protectee?

    • What technologies or strategies can improve protection?

    • How can we use security measures to enhance the public image of the protectee?

    • What are the best-case scenarios, and how do we achieve them?

Real-World Example:

A government official is attending a diplomatic event where visibility and approachability are key.

Instead of surrounding the official with a visible security detail, the team uses discreet security measures such as undercover agents and hidden surveillance technology.

This creates an open, welcoming atmosphere while maintaining a high level of security. The event proceeds without incident, and the official receives positive media coverage for being accessible while staying protected.

#5 Green Hat – Encouraging Creativity and Innovation

The Green Hat represents creative thinking and problem-solving, valuable skills in the ever-evolving field of executive protection.

Traditional security strategies may not always work in dynamic or unpredictable environments. The Green Hat encourages teams to think outside the box:

    • What alternative security strategies could be used?

    • How can we blend in better to avoid drawing attention?

    • What innovative technology can enhance our security measures?

    • How can we de-escalate potential threats creatively rather than using force?

Real-World Example:

A famous musician is set to perform at a festival where security concerns are high. Instead of using traditional visible barriers, the EP team employs state-of-the-art facial recognition technology to identify potential threats in real time.

Additionally, they use decoy vehicles and strategic social media misinformation to throw off potential stalkers or paparazzi. The use of creative security solutions allows the artist to perform safely without unnecessary restrictions.

#6 Blue Hat – Managing the Process and Strategy

The Blue Hat ensures that all other hats are used effectively and that discussions remain structured.

In EP, the Blue Hat is often worn by the team leader or security director, who is responsible for coordinating efforts, maintaining communication, and ensuring operational efficiency. Key questions include:

    • What is our objective, and how do we achieve it?

    • How should we structure our security planning meetings?

    • Are we covering all relevant perspectives before making a decision?

    • How do we evaluate and improve our security strategies over time?

Real-World Example:

After a security breach at a corporate retreat, the EP team conducts an after-action review using the Blue Hat approach. They systematically go through:

  1. Facts (White Hat): What exactly happened? What does surveillance footage show?

  1. Emotions (Red Hat): How did the security team and protectee feel during the event?

  1. Risks (Black Hat): What vulnerabilities were exposed?

  1. Opportunities (Yellow Hat): What worked well despite the breach?

  1. Creativity (Green Hat): What new measures can be implemented to prevent a repeat incident?

  1. Structure (Blue Hat): How do we integrate these lessons into future operations?

This structured debriefing ensures continuous improvement and adaptation in security protocols.

Executive protection demands analytical precision and flexible decision-making. By systematically applying the Six Thinking Hats, EP teams can improve risk assessment, strategic planning, and response effectiveness. This structured yet adaptable approach ensures that security decisions are well-rounded, preventing tunnel vision and integrating diverse perspectives. Whether in pre-mission planning, crisis response, or post-operation reviews, this methodology enhances the ability of EP professionals to anticipate threats, adapt to evolving situations, and execute sound protective strategies.

By fostering a culture of critical thinking and collaboration, the Six Thinking Hats framework ultimately empowers EP teams to safeguard their clients with greater efficiency, intelligence, and foresight.

About the Author:

Monica Duperon Rodriguez is the owner of Women in Protection LLC and the lead instructor for Women in Protection Seminars. In addition to her leadership responsibilities, Monica provides mentorship to women seeking to transition into Executive Protection roles. Monica’s background is in corporate executive protection management. She has led executive protection and event security for high-profile tech companies in Silicon Valley and has worked with royal families to include high-net-worth individuals. Monica, a former SWAT Hostage Negotiator and Crisis Management Professional, has been featured in prominent publications such as

the New York Times, The Daily News, and Security Magazine. In 2023, she was nominated for the Women of Influence Award at the Women’s Empowerment Expos. Monica is the author of several children’s books and co-authored Extraordinary Latinas Volume IV: Fearless Narratives of Triumph and Purpose, an Amazon #1 New Release. She is also the author of Vast Potential: A Bodyguard’s Journey to Empowerment, set to be released in the fall of 2025. You can reach Monica via email at [email protected]. 

Sign Up for Our Newsletter

Get the latest news and articles from EP Wired.

Latest News

Threat Assessment Teams and Their Value to Protective Intelligence for Executive Protection  

Protective operations haven’t changed much over the last two decades.  At its most basic level, you are paid to...

More Articles Like This

Download Advance Work: Route Survey

    Download Advance Work: Restaurant

      Download Helicopter Extration: Landing Zone

        EP Career

        Your registry of the best opportunities in executive protection.

        EP Directory
        The right place to explore EP companies.