-
- Infrastructure and Information Security Gap Analysis
- Security Incident Analysis
- Forensic Expertise in Systems, Computers, Mobile Phones, and Email Boxes
- Evidence Collection / Chain of Custody
- Systems Audit and Security Appraisal
- Pentest’s Execution
Web Monitoring “Open, Dark, and Deep”
-
- Cyberbullying, Harassment, Bullying;
- Inappropriate Behavior, Hate Speech, Threats of Violence;
- Discriminatory Practices, Rumors;
- Brand Protection and Data Leakage.
Coverage: Social Networks, Blogs, Chats, Forums, Hashtags, Youtube, TikTok, Kwai, WhatsApp, Telegram, Messenger, Twitter, Twitch, among others.
Our web monitoring solution is rigorously aligned with privacy and data security legislation, meaning data is collected and analyzed ethically and legally.
Credit, Fraud, Legal, and Information Security Risk Consulting and Management
-
- Risk Assessment
- Identification of Gaps
- People, processes, and systems
- Action Plan Creation
- Support
Investigations and Legal Consulting
-
- Security Incident Investigations
- Internal and/or External
- National Level
- Information Production, Evidence Collection
- Legal Measures in Administrative, Civil, Criminal, and Strategic Spheres
Training and Development
Available Modules:
-
- Integrated Fraud Management
- Internal Controls and the 3 Lines of Defense
- Compliance
- Information Security
- Information Security Certification
- Internal Frauds: People, the Weakest Link
- GDPR – General Data Protection Regulation
- AML/CFT – Anti-Money Laundering and Combating the Financing of Terrorism
- Document Examination and Handwriting Analysis
Prevention/Before
- Implementation of risk and process policy
- Knowledge and solutions in reducing the frequency and financial, legal, and image impact arising from credit, fraud, legal, and information security risk
Detection/During
- Analysis of financial and registration events
- Execution of KYC, KYP, and KYE routines
- Investigations and responsibility definitions
- Know-how to increase the risk detection rate in credit, fraud, legal, and information security risk segments. The faster the detection, the lower the financial losses, legal risks, and image
Correction/After
- Recommendation manual with analysis
- Asset recovery
- Support for Legal Force (legal, administrative, civil, and criminal advice)
- Expertise in investigation and adoption of legal measures (when applicable), including understanding of processes; mapping of exploited weaknesses; development of forensic expertise in email boxes; computers; cell phones; asset investigations; analysis of links between people, things, and facts with I2/IBM