Please leave this field empty.

Contact Us






* Required Fields

Contact Us

INVESTIGATIONS

CYBER

CYBER INVESTIGATIONS & COMPUTER FORENSICS

At Guidepost Solutions, our computer forensics and cyber response solutions help clients strengthen cases, avoid pitfalls, identify opportunities and make key decisions. The team includes investigators with backgrounds as federal and local prosecutors and law enforcement agents; digital forensic experts and reverse malware engineers; forensic accountants; data and intelligence analysts; and former federal agents from the U.S. Department of Homeland Security, the Federal Bureau of Investigation, the Internal Revenue Service, the U.S. Secret Service, and the U.S. Marshal Service who have extensive experience testifying as experts in federal and state courts.

Our unique capabilities, relationships and tools, coupled with professionals who convert “tech-speak” into valuable information for attorneys and in-house counsel, enhance both responsiveness and investigative efficiency to respond to the increasingly complex cyber challenges clients face – nationwide and on a moment’s notice.

Services

Our professionals are expert in the forensic analysis of data from all Windows, Mac and Linux computers and servers; mobile devices; and Cloud-based platforms and applications. Specialists regularly testify as experts in state and federal courts, liaise with law enforcement and regulators, and work with investigative professionals to provide a seamless investigation. Specific expertise includes:

  • Theft of trade secrets
  • Employment disputes
  • Regulatory investigations
  • Threat, vulnerability, management & identification
  • Real-time support and administration
  • Computer / network forensics
  • Data breach analysis
  • Incident response
  • Cyber security assessments
  • Client-specific “Watch Lists”
  • Overt penetration testing
  • Data privacy analysis
  • Third-party security analysis
  • Technical surveillance counter measures

Our team understands that computer forensics may be used for a variety of tasks, such as finding the “smoking gun” e-mail, proving deliberate spoliation by an opposing party, or trying to make sense of suspicious computer activity on the day a key employee departed. We specialize in focused, aggressive computer investigations into intrusions, internal misconduct, phishing scams, malicious software and other digital attacks.

Our cyber investigators routinely synchronize their work with our firm’s more traditional investigative resources, such as surveillance, research and interviews. This provides our clients with a formidable synergy of investigative skills that sets us apart from other agencies that operate only without or within the digital arena.

We regularly advise attorneys and corporate clients on preserving, analyzing and utilizing computer evidence in litigation, regulatory proceedings, presentations to law enforcement and governmental investigations. We perform all forensic investigations under the assumption that court testimony will be required and adhere to law enforcement standards of chain of custody and evidence storage. Our investigators have experience as court-appointed experts and in giving testimony under cross-examination.

At Guidepost Solutions, our computer forensics and cyber response solutions help clients strengthen cases, avoid pitfalls, identify opportunities and make key decisions. The team includes investigators with backgrounds as federal and local prosecutors and law enforcement agents; digital forensic experts and reverse malware engineers; forensic accountants; data and intelligence analysts; and former federal agents from the U.S. Department of Homeland Security, the Federal Bureau of Investigation, the Internal Revenue Service, the U.S. Secret Service, and the U.S. Marshal Service who have extensive experience testifying as experts in federal and state courts.

Our unique capabilities, relationships and tools, coupled with professionals who convert “tech-speak” into valuable information for attorneys and in-house counsel, enhance both responsiveness and investigative efficiency to respond to the increasingly complex cyber challenges clients face – nationwide and on a moment’s notice.

Services

Our professionals are expert in the forensic analysis of data from all Windows, Mac and Linux computers and servers; mobile devices; and Cloud-based platforms and applications. Specialists regularly testify as experts in state and federal courts, liaise with law enforcement and regulators, and work with investigative professionals to provide a seamless investigation. Specific expertise includes:

  • Theft of trade secrets
  • Employment disputes
  • Regulatory investigations
  • Threat, vulnerability, management & identification
  • Real-time support and administration
  • Computer / network forensics
  • Data breach analysis
  • Incident response
  • Cyber security assessments
  • Client-specific “Watch Lists”
  • Overt penetration testing
  • Data privacy analysis
  • Third-party security analysis
  • Technical surveillance counter measures

Our team understands that computer forensics may be used for a variety of tasks, such as finding the “smoking gun” e-mail, proving deliberate spoliation by an opposing party, or trying to make sense of suspicious computer activity on the day a key employee departed. We specialize in focused, aggressive computer investigations into intrusions, internal misconduct, phishing scams, malicious software and other digital attacks.

Our cyber investigators routinely synchronize their work with our firm’s more traditional investigative resources, such as surveillance, research and interviews. This provides our clients with a formidable synergy of investigative skills that sets us apart from other agencies that operate only without or within the digital arena.

We regularly advise attorneys and corporate clients on preserving, analyzing and utilizing computer evidence in litigation, regulatory proceedings, presentations to law enforcement and governmental investigations. We perform all forensic investigations under the assumption that court testimony will be required and adhere to law enforcement standards of chain of custody and evidence storage. Our investigators have experience as court-appointed experts and in giving testimony under cross-examination.

Newsletter

Please enter your email below to subscribe

Please leave this field empty.