Our services…
-
Program Implementation: Insider Risk Management
Identify an Executive Sponsor; form a Steering Committee; crystallize a Charter; author a Concept of Operation; gain approvals; chart a project plan, budgets, and initial team core competencies; select technologies; implement, test, tune; train staff, move to production; form an education & awareness program - plug us in where you need the help most.
-
Program Maturity: Insider Risk Management
Every program is on a journey - wherever you find yours, we can assess your maturity against various benchmarks and help you identify which improvements make sense based on your objectives. From better technologies to starting ops in new global regions for your team, we can advise and mange projects based on your needs.
-
Subject Matter Expertise
Insider Risk Management programs draw from the fields of Counterintelligence, Physical Security, Cyber Security, Information Security, law enforcement, legal and workplace investigations, Third Party Risk Management, Counter-Fraud, Behavioral Analytics, and language analysis. With decorated experts in many of these fields and partners in the rest, we can provide operational support where you need it.
-
Investigations
Investigations carry formal obligations, unlike daily triage activities. We are deeply experienced in national security and workplace investigations, including principles such as thoroughness, impartiality, objectivity, compliance, confidentiality, communication, timeliness, professionalism, documentation, and evidence chain of custody. We can lead, advise, or shadow investigators to ensure you have every change of success. We only operate at the discretion of your legal counsel.
-
Daily Operations
Analysts: (Data Loss Prevention, User and Entity Behavioral Analytics, or Threat Hunting)
Modeling: Identifying and integrate new data sources, modeling data attributes into a cohesive detection and response paradigm
Case Management: oversee geographically-dispersed analyst team operations, including triage and analysis, engagement and escalation workflows, and any pre-approved incident response playbooks.
Language Services: Mandarin Chinese; others upon request
-
Cybersecurity
We offer cybersecurity program implementation, maturity initiatives, assessments, and operational security services such as managed Security Operations Centers, Penetration Testing, counter-Ransomware, Digital Forensic Incident Response (DFIR), and many others,
-
Data Acquisition
When it comes to accessing data in difficult regions of the globe, leverage our boots-on-ground networks and partnership agreements to obtain the information you need to make informed investigative and risk decisions.
-
Critical Asset Protection
We can help you build, execute and manage asset shielding strategies, build Critical Asset Protection Plans, and continuously monitor for risk signals to augment existing features of your security posture.
-
Pricing Structure
Hourly or Project-based pricing is available for each service offering; travel hours based on standard hourly rate and GSA per diem/coach rates
STANDARD HOURLY: requirements gathering, process analysis, data analysis, documentation, travel, project administration.
EXPERT 1 (hourly): data modeling, system integrations, advanced analytics, investigations, industry-specific knowledge, or niche domains
EXPERT 2 (hourly): world-renowned niche service providers and consultants
PROJECT: based on a Statement of Work; available for all services