The risk of fraud exists in every organization. Even in the most secure environment, attempts at theft, embezzlement, or other fraud may occur.
“Leverage extensive information technology tools and seasoned expertise.”
Forensic investigators utilize state-of-the-art equipment and secured space to extract vital digital evidence from a variety of its clients’ media using the newest technology and the latest techniques.
Because adversity does not follow a script, our approach begins by analyzing the client's unique issues, objectively assessing the relevant information. Capabilities include extracting deleted, encrypted, fragmented, or damaged information and establishing event timelines that may serve as evidence in investigations, employment litigation, or intellectual property disputes.
Deploy proven resources to meet the threat of fraud with confidence. A team of credentialed financial and digital forensic experts provides both proactive and reactive forensic services, including:
- Fraud and financial forensic investigations
- Fraud risk assessments
- Internal control review and assessment
- Employee embezzlement and asset misappropriation investigations
- Anti-corruption services (U.S. FCPA and U.K. Anti-bribery Act)
- Data analytics
- Computer and digital forensic investigations
- Incident response and handling
- Information governance, e-discovery, and litigation readiness
- Expert witness testimony
Marc W. Courey, CPA/CFF, JD, LLM, CFE, CICA, CCEP, CIAMarc has more than 25 years of diverse experience in forensic accounting, law practice, information technology systems, and corporate management. He has conducted financial forensic investigations and fraud risk assessments, and specializes in digital forensics, e-discovery, and litigation readiness preparedness.
John Walther, EnCE, GCFE, GCFA, GSEC, GPEN, CISSP, MCSEJohn's diverse background in digital forensics, network security, compliance, and information technology allows him to provide a wide variety of client services including digital forensics, incident response, malware analysis, vulnerability assessments, network security assessments, penetration testing, social engineering, and a variety of audit-based services (NIST, COBIT, SOC 1, SOC 2, etc.).