• Former Federal Agents
  • 100 Years of Combined Experience
  • Investigations, Compliance & Defense
Chris Quick

Former Special
Agent (FBI & IRS)

Roger Bach

Former Special
Agent (DOJ-OIG & DEA)

Timothy Allen

Former Special Agent
(U.S. Secret Service & DOJ-OIG)

Ray Yuen

Former Special
Agent (FBI)

Michael S. Koslow

Former Special
Agent (DOD & OIG)

We Help Make Sure Your Digital and Financial Assets Remain Secure

Tim Allen

Cybersecurity Team Lead – Timothy E. Allen | Former Special Agent (U.S. Secret Service & DOJ-OIG)

Cybersecurity is a growing concern for companies of all sizes. From hackers seeking access to personal information to competitors and foreign interests seeking to misappropriate companies’ intellectual property, cybersecurity risks exist at many levels, and they can present themselves in many different ways.

In addition to addressing the risk of unauthorized intrusion, companies must address their compliance obligations as well. Cybersecurity compliance obligations also exist at multiple levels, and companies need to ensure that they have a clear and comprehensive understanding of what is required. At Corporate Investigation Consulting, we help companies with all aspects of cybersecurity—from implementing adequate protocols to managing compliance—and we provide consulting services for cybersecurity incidents and breach response as well.

Cybersecurity Consulting

Our cybersecurity consulting services encompass all aspects of ensuring that companies’ and their customers’ and employees’ data are secure. We help companies implement compliant, industry-standard protocols, and we assist companies with going above and beyond when necessary.

While meeting the applicable legal requirements and industry standards will be sufficient for some companies, for others this is just the starting point. Our senior cybersecurity consultants can thoroughly assess your company’s needs, and we can provide recommendations that are tailored to your company’s compliance obligations, digital assets, and risks. Our cybersecurity consulting services include:

  • Cybersecurity Needs Assessments: What are your company’s needs with regard to cybersecurity? We will assess your company’s needs and provide detailed and specific cybersecurity recommendations.
  • Cybersecurity Program Audits: Is your company’s existing cybersecurity program adequate? We will audit your company’s existing cybersecurity program to determine whether and to what extent modifications, updates, or additions are necessary.
  • Cybersecurity Program Development and Implementation: Once we understand your company’s specific needs, we can assist with developing and implementing a cybersecurity program that meets all legal requirements and industry standards, and that meets any unique demands of your company’s operations.
  • Penetration Testing: Our penetration testing is designed to identify any and all potential sources of unauthorized intrusion so that they can be addressed before an attack occurs.
  • Ongoing Cybersecurity Program Auditing and Management: Maintaining cybersecurity is an ongoing process. We will audit your company’s cybersecurity efforts on an ongoing basis and provide recommendations as to when additional measures are necessary.
Put our highly experienced team on your side
Roger Bach

Former Special Agent (OIG)

Timothy E. Allen

Former Senior Special Agent U.S. Secret Service

Chris J. Quick

Former Special Agent (FBI & IRS-CI)

Maura Kelley

Former Special Agent (FBI)

Ray Yuen

Former Supervisory Special Agent (FBI)

Michael S. Koslow

Former Supervisory Special Agent (DOD-OIG)

Marquis D. Pickett

Special Agent U.S. Secret Service (ret.)

Cybersecurity Incident Response and Breach Notification

When a cybersecurity incident threatens your company’s digital or financial assets, you do not have time to waste. You must respond immediately, and you must do so in a manner that protects your company and its employees, customers, and shareholders to the greatest extent possible. Time is of the essence, and you need to make informed decisions based on a clear understanding of both the source and scope of the intrusion.

Our cybersecurity consultants and specialists are experts in incident response. We can begin advising you immediately, and we can also begin working immediately to determine how the intruders got in and what data they were able to access. If necessary, we can provide advice and support for breach notification as well, and, once the situation has been contained, we can help your company implement all policies, protocols, and procedures necessary to prevent a recurrence.

FAQs: Cybersecurity Program Implementation, Compliance, and Incident Response

Q: What steps does my company need to take in order to implement adequate cybersecurity?

Each company’s cybersecurity needs are different. This is why off-the-shelf cybersecurity programs are insufficient for most companies. In order to determine your company’s needs, it will first be necessary to understand your company’s risks. Once all pertinent risks have been identified, then the focus can shift to determining how to manage those risks effectively.

Q: Does my company need to be GDPR compliant?

Maybe. Compliance with the General Data Protection Regulation (GDPR) is required for companies that receive, transmit, or store personal data of citizens of the European Union (EU). If your company does business overseas, then it may need to include GDPR compliance as an element of its broader cybersecurity program.

Q: How can I assess the sufficiency of my company’s current cybersecurity protocols?

In order to assess the sufficiency of our clients’ current cybersecurity protocols, we conduct extensive penetration testing, and we also audit our clients’ cybersecurity programs in order to identify issues that might not necessarily fall within the scope of our penetration tests. This dual-pronged approach allows us to comprehensively identify any and all potential concerns so that our clients can update their protocols as necessary.

Q: What do I need to do if my company experiences a cybersecurity breach?

If your company experiences a cybersecurity breach, responding to the breach must immediately become your top priority. Not only do you need to cut off the unauthorized access and determine what data have been compromised, but you must assess your company’s breach notification obligations and litigation risk as well.

At Corporate Investigation Consulting, we have extensive experience dealing with cybersecurity breaches both as private-sector consultants and as former agents with the Federal Bureau of Investigation (FBI) and other federal agencies. We rely on this experience to provide immediate, targeted, and strategic advice to our clients.

Q: How can I ensure that my company’s cybersecurity program remains adequate on an ongoing basis?

Once your company implements a cybersecurity program, ensuring that the program remains adequate requires consistent monitoring and management. This includes not only auditing internal compliance, but also continuing to assess new cybersecurity risks and determine when program updates are necessary. These are services we provide to our clients as well, and our senior cybersecurity consultants can work with you to ensure that your company’s data remain secure on an ongoing basis.

Speak with a Senior Cybersecurity Consultant Today

If you have questions about cybersecurity or would like our consultants to assess your company’s current cybersecurity program, we encourage you to get in touch. To speak with one of our former federal agents in confidence, please call 866-352-9324 or tell us how we can help online today.

Contact Us Today

Contact Team Lead, Timothy Allen,
For a Confidential Consultation

  • This field is for validation purposes and should be left unchanged.

Contact Us 24/7 to Schedule Your Free Consultation

Call 866-352-9324 or request an appointment online. We are available 24/7, and our consultants can take action immediately to protect your company.

WordPress Lightbox