CISO Support Service

Our CISO Support Service provides your small to medium-sized business with the expertise you need to start or develop an information security program. This need may arise when a company you wish to do business with requires a more mature security program than the one you have in place. Regulations or laws may also require a named Chief Information Security Officer (CISO), but your company cannot afford to hire one full-time. Or you may have had the scare of a data breach, and you have decided not to wait any longer to take information security seriously. In these cases, having us on your side to help assess risks and recommend steps for improving your program can be vital to the vitality of your company.


Services may include:

  • Named as CISO Support Service
  • Periodic planning meetings
  • Self-Assessment Questionnaire (SAQ) assistance
  • Security Awareness Training (SAT)
  • Incident Response triage readiness
  • Due dilligence vetting of third-party service providers

Common Case Scenarios

  • Intellectual Property Theft
    An employee or executive leaves an employer to start a new company or work for a competitor. The previous employer ends up in a legal dispute because the employee took with him client contacts, confidential trade secrets and intellectual property, or left a backdoor for remote access to the network at a later time. We can help determine how the employee acted prior to leaving the company or at the onset of litigation.
  • Child Pornography Charges (Peer-to-Peer))
    The government continues to adapt to the changing environment related to Internet Crimes Against Children (ICAC). Chat room interactions, traveler investigations, and possession and distribution have long been the focus of such investigations. Defendants are often charged with possession or distribution of child pornography and need support to analyze the reports and electronic evidence the prosecution presents through discovery. When necessary, we will arrange for our independent review of electroic evidence, following the Adam Walsh Act and State Laws, providing the attorney with an unbiased interpretation of the Government''s case and what the electronic evidence tells us.
  • Child Exploitation Investigation
    (Knowledge and Control))

    A key element of possession of child pornography involves knowledge and control by the alleged offender. There are numerous areas of electronic evidence that provides explicit evidence as to knowledge and control.
  • Counter Terrorism Investigation
    In 2007, Forensic Recovery, LLC was hired by the Federal Public Defenders Office to conduct a review of evidence in a highly publicized terrorism case. Over a period of almost one year, the government continued to examine evidence and provide such findings as discovery.
  • Date and Time Stamps of Computer Files
    (timestamp)

    In 2009, an individual was arrested for violating his terms of supervised release for possessing child pornography. It should be noted the original charge and subsequent incarceration was also for possession of child pornography.
  • Divorce Inquiries
    In 2009, a West Palm Beach client requested a complete examination of his computer's hard drive. This request came after a filing for divorce and an allegation by the client's wife that child pornography had been seen on the client's hard drive.