CISO Support Service
Our CISO Support Service provides your small to medium-sized business with the expertise you need to start or develop an information security program. This need may arise when a company you wish to do business with requires a more mature security program than the one you have in place. Regulations or laws may also require a named Chief Information Security Officer (CISO), but your company cannot afford to hire one full-time. Or you may have had the scare of a data breach, and you have decided not to wait any longer to take information security seriously. In these cases, having us on your side to help assess risks and recommend steps for improving your program can be vital to the vitality of your company.
Services may include:
- Named as CISO Support Service
- Periodic planning meetings
- Self-Assessment Questionnaire (SAQ) assistance
- Security Awareness Training (SAT)
- Incident Response triage readiness
- Due dilligence vetting of third-party service providers
Common Case Scenarios
- Intellectual Property TheftAn employee or executive leaves an employer to start a new company or work for a competitor. The previous employer ends up in a legal dispute because the employee took with him client contacts, confidential trade secrets and intellectual property, or they left a backdoor for remote access to the network at a later time. We can help determine how the employee acted prior to leaving the company or at the onset of litigation.
- Child Pornography Charges (Peer-to-Peer))
Internet Crimes Against Children (ICAC) task forces around the country identify and arrest potential traders of child pornography on a regular basis. We can review the Government's findings and conduct an independent examination of the digital evidence in order to determine the circumstances surrounding the charged files. Cases are often initiated through CyberTips, Peer-to-Peer/BitTorrent activity, or undercover chats on social media platforms like Kik, Telegram, and Snapchat. - Divorce
Forensic Recovery can assist counsel in helping to identify, preserve, and analyze digital evidence in family litigation. Often, our work is related to location data, communications, and hidden asset leads. Working through counsel on these matters is the preferred mechanism.