We're the experts. Let us help.


Criminal activity is an ever-present and unfortunate reality.  Malware, Social Engineering, Ransomware, Corporate Insiders are just a sampling of the prevalent causes of compromise. It can be completely overwhelming to find that your systems and data have been breached. Evidence can exist almost anywhere, even electronically. Where do you begin?

We have over 40 years combined experience with computer crimes; as cyber security executives and incident responders.  We understand intricacies of managing leadership, media/press, and customer disclosure which make response and recovery a challenge.  We know that proper information flow and communication is CRITICAL to the success of the investigation.

  • Data Acquisition and Mapping
  • Computer/Smartphone Forensic Analysis (Android/iOS)
  • Evidence Preservation and Collection
  • Data & File Recovery
  • E-Discovery Services
  • Witness Interviews
  • Technology Assisted Review
  • Expert Forensic Advice
  • Early Case Assessment
  • Keyword Search
  • E-mail Processing
  • Litigation Support
  • Expert Testimony
  • Client/Public Communication
  • Media/Press Release Disclosure

Forensic techniques is reserved for experts only.

Amateurs need not apply.

Our trained and certified team of forensic analysts have the experience in law enforcement and cybersecurity incident response to ensure that your incident is handled in a secure, confidential and expertly managed manner. We will advise our customers and their counsel on the necessary steps to ensure that your company will have the best possible chances in court.  We can even testify in the case as expert witnesses.  While it’s rare that an investigation escalates to the courtroom, you need to be prepared as if it will.

We can help!

Here are some of the services we offer:

Data Acquisition, Recovery, and Mapping

  • When incidents occur, data must be collected in a legally sound manner, using the latest equipment and techniques.  It is critical that properly trained and certified experts collect the data in order to safely recover damaged or deleted data.

Forensic Analysis

  • Anyone can turn a computer on and “look for evidence”.  Only specially trained and experienced forensic experts are able to collect data in a manner that is legally sound, prepared for litigation/court and which enables us to use context and clues in order to see the bigger picture.

Evidence Preservation and Collection

  • A full or partial investigation can be valuable to collect the necessary evidence properly and completely. Our team of forensic experts ensure a proper chain of custody and advise on how to store it; in case you need it later.

E-Discovery Services

  • For new or existing investigations, collecting too much information can be just as harmful as too little. Improperly collected information can lead to changes in the data that causes the evidence to tell the wrong story. We can help properly determine scope, collect, search and retain only as much data as is appropriate to address what is needed.

2017 Cost of a Data Breach

Every year the Ponemon Institute researches and publishes real-world facts regarding cybersecurity trends and data breach outcomes.

It’s a sad thing to see some of these trends re-occur; year over year. We can help put an end to these unwelcome bad habits.

"Based on this year's research, we estimate an average probability of 27.7 percent that organizations in this study will have a material data breach in the next 24 months. Last year, the average probability was 25.6 percent."

Prevention is critical: we can help you to prevent foreseeable breaches to your data, respond to incidents, and all steps necessary to have a better outcome.

"Programs that preserve customer trust and loyalty in advance of the breach will help reduce the number of lost business/customers. In this year's research, more organizations worldwide lost customers as a result of their data breaches."

This is a daunting task that requires an expert team; we can help to enhance your team to be better prepared and respond more appropriately.

"However, as shown, having a senior-level leader such as a chief privacy officer or chief information security officer who will be able to direct initiatives that improve customers' trust in how the organization safeguards their personal information will reduce churn and the cost of the breach."

We can act in this capacity for you and aid you in achieving this level of confidence at a cost that is much better than hiring a full-time CISO or CPO.

"The faster the data breach can be identified and contained, the lower the costs."

Let us help you BEFORE the breach, we can ensure proper response, containment, and recovery.

"Detection and escalation costs include forensic and investigative activities, assessment and audit services, crisis team management and communications to executive management and board of directors."

This is our core competency.  We have a large amount of experience in this area, as Security Executives, not simply consultants.  A trusted partner from start to finish!

"The average global cost of data breach per lost or stolen record was $141. However, health care organizations had an average cost of $380 and in financial services the average cost was $245. Media ($119), research ($101) and public sector ($71) had the lowest average cost per lost or stolen record. "

Invest in prevention and early detection. We provide incident response retainer packages including red/blue team table-top simulations to ensure you are prepared.

Subscribe to our newsletter!

Get the latest cyber news, security threats and general data protection updates. Sign up today!