Business Advisory

Fraud and Forensic Services

Put experienced investigators and state-of-the-art technology to work against fraud.

The risk of fraud exists in every organization. Even in the most secure environment, attempts at theft, embezzlement, or other fraud may occur. 

Leverage extensive information technology tools and seasoned expertise.

Forensic investigators utilize state-of-the-art equipment and secured space to extract vital digital evidence from a variety of its clients’ media using the newest technology and the latest techniques. 

Because adversity does not follow a script, our approach begins by analyzing the client's unique issues, objectively assessing the relevant information. Capabilities include extracting deleted, encrypted, fragmented, or damaged information and establishing event timelines that may serve as evidence in investigations, employment litigation, or intellectual property disputes.

Deploy proven resources to meet the threat of fraud with confidence. A team of credentialed financial and digital forensic experts provides both proactive and reactive forensic services, including: 

  • Fraud and financial forensic investigations
  • Fraud risk assessments
  • Internal control review and assessment
  • Employee embezzlement and asset misappropriation investigations
  • Anti-corruption services (U.S. FCPA and U.K. Anti-bribery Act)
  • Data analytics
  • Computer and digital forensic investigations
  • Incident response and handling
  • Information governance, e-discovery, and litigation readiness
  • Expert witness testimony

Featured Expertise


Marc has more than 25 years of diverse experience in forensic accounting, law practice, information technology systems, and corporate management. He has conducted financial forensic investigations and fraud risk assessments, and specializes in digital forensics, e-discovery, and litigation readiness preparedness.


John's diverse background in digital forensics, network security, compliance, and information technology allows him to provide a wide variety of client services including digital forensics, incident response, malware analysis, vulnerability assessments, network security assessments, penetration testing, social engineering, and a variety of audit-based services (NIST, COBIT, SOC 1, SOC 2, etc.).

Featured Insight

Here's Why Managed Detection and Response Is So Important in Today's Complicated Networks


As critical servers and services become better protected, insiders and outside attackers are focusing on easier targets. Often that’s the end users themselves. Humans are typically the weakest link in any cybersecurity protection plan, and we can see this in the continual rise — and success — of phishing attacks, which often lead to credentials harvesting, the installation of malware, or the installation of ransomware.