Cyber Security Advisory
We are your cyber first responder, on call 24/7 to help navigate murky waters if you come under attack. In calmer seas, we will help build your organisation’s cyber security resilience and give you peace of mind.
Overview

As criminals develop increasingly advanced techniques in hacking and scamming, the need for cyber security has never been greater. Yet we often, unintentionally, leave the door to our virtual lives and businesses unlocked for anyone to walk in.

We help you protect against attack – and investigate when something goes wrong. Our team’s background spans the National Cyber Security Centre, White Hat Hacking, security defence firms and the UK government. From responding to data theft, extortion and cyber attack, to conducting bug sweeping and digital forensics, we ensure your cyber security now and for the future.

The role of cyber in our lives – and its potential to be manipulated in the wrong hands – is greater than ever. Rather than being scared, we need to take control.

Peter Yapp, Partner
Capabilities

Our cyber security advisory capabilities

CISO-as-a-Service

The calm expertise of a Chief Information Security Officer – but only when you need one. Our CISO-as-a-Service provides tailored support on your terms – giving you an experienced professional advisor, helping build cyber resilience for your business or family office, and always being at your side if you’re under attack.

We provide short term or regular advice on specific cyber and information security issues, threats, protection and investment decisions.

Design, test & secure systems

Weakness in your IT infrastructure or communications systems is easily overlooked unless you test it. We both design and test complete systems – including ethical hacking (penetration testing) to put them through their paces.

And – as many cyber vulnerabilities stem from human error – we provide bespoke, ongoing training for everyone in your business to mitigate the risk of a data breach.

Digital forensics

Examination of your digital devices to identify, preserve, recover, protect and analyse evidence of fraud, insider trading, misconduct, copyright theft, loss of proprietary information, or reputational damage, all whilst ensuring preservation of its admissibility as evidence.

Technical Surveillance Counter Measures (TSCMi)

In short; bug-sweeping to protect your data. We conduct comprehensive sweeps of private and commercial properties, vehicles, yachts and offices. From examining mobiles and tablets to Wi-Fi scanning and concealed camera sweeps – we leave you confident your privacy will not be invaded.

If you’ve experienced a breach, we help you put it right, advising on vulnerabilities and keeping you secure for the future.

Case Study

Cyber theft

Problem

True or false; illegal music distributors are so prolific and well-hidden that artists can never fully protect their work.

We say false. With fast, incisive action everything is protectable. So, when a global megastar’s album was hacked before release, we got on the case.

What we did

Knowing we had to work quickly, we worked overnight to bring in the best lawyers from the countries we believed the perpetrators to be active. Simultaneously, our cyber experts pinpointed the details of one of the first people to leak the songs; once we had this first link in the chain, we were able to track down more suspects.

Result

By compiling and presenting evidence to authorities, including the FBI, we saw the ringleader arrested, prosecuted and imprisoned on hacking and piracy charges. We continue to pursue civil remedies in addition to helping our client implement more resilient data protection measures to prevent future attacks.

All services

We are the only business in the world to deploy – under one roof – media experts, data protection lawyers, litigators, experts from military intelligence, investigative journalists, international investigators, cyber security specialists, digital forensic experts and senior people from the military, police and government.

Litigation & Disputes

The go-to legal experts when your privacy, reputation or security are under attack.

Capabilities
  • Anti-harassment & paparazzi deterrence
  • Breach of confidence
  • Breaches of Privacy & Injunctions
  • Contractual disputes
  • Data Protection & GDPR
  • Defamation & libel
  • Employment Litigation
  • Intellectual property & copyright
  • Misuse of data
  • Regulatory Complaints & Arbitration
Intelligence & Investigations

Ethical, boundary-pushing intelligence gathering to find facts and get ahead of problems, fast.

Capabilities
  • Anti-corruption & fraud investigations (FCPA & UK Bribery Act)
  • Asset tracing & recovery
  • Expert witness testimony
  • Influencer screening
  • Internal investigations
  • Litigation & dispute support
  • Reverse due diligence
Digital Communications

Digital wizards fighting falsehoods and putting you back in control of your online narrative.

Capabilities
  • Audience analysis
  • Competitor & market insights
  • Digital portfolio forensics
  • Falsehood identification
  • Research & analytics
  • Resilience building
  • Search result audit & monitoring
  • Social Listening & Analysis
Critical Risk, Security & Advisory

The experts you need on your team – just not every day. Cyber security, physical security and geopolitical advice to keep you safe before, during and after a crisis.

Capabilities
    • Geopolitical advisory
    • Private diplomacy
    • Illegal detention response
    • Kidnap for ransom & extortion
    • Missing persons
    • Resilience training
    • Security risk analysis, planning & management
    • Stalking & fixated behaviour
    • Vetting
    • CISO-as-a-service
    • Design, test & secure systems
    • Digital forensics
    • Technical Surveillance Counter Measures (TSCM)