Put experienced investigators and state-of-the-art technology to work against fraud.
The risk of fraud exists in every organization. Even in the most secure environment, attempts at theft, embezzlement or other fraud may occur.
Leverage extensive information technology tools and seasoned specialists
Forensic fraud investigators use state-of-the-art equipment and secured space to extract vital digital evidence from a variety of clients’ media using the newest technology and the latest techniques.
Because adversity does not follow a script, our approach begins by analyzing the client's unique issues, objectively assessing the relevant information. Capabilities include extracting deleted, encrypted, fragmented or damaged information and establishing event timelines that may serve as evidence in investigations, employment litigation or intellectual property disputes.
Deploy proven resources to meet the threat of fraud with confidence. A team of credentialed financial and digital forensic specialists provides both proactive and reactive forensic advisory services, including:
- Fraud and financial forensic investigations
- Fraud risk assessments
- Internal control review and assessment
- Employee embezzlement and asset misappropriation investigations
- Anti-corruption services (U.S. FCPA and U.K. Anti-bribery Act)
- Data analytics
- Computer and digital forensic investigations
- Incident response and handling
- Information governance, e-discovery and litigation readiness
- Expert witness testimony
Featured Thought Leader
Marc W. Courey, CPA/CFF, JD, LLM, CFE, CICA, CCEP, CIA
Marc has more than 25 years of diverse experience in forensic accounting, law practice, information technology systems, and corporate management. He has conducted financial forensic investigations and fraud risk assessments, and specializes in digital forensics, e-discovery, and litigation readiness preparedness.
John Walther, EnCE, GCFE, GCFA, GSEC, OFE, CISSP, MCFE-AXIOM
John's diverse background in digital forensics, network security, compliance, and information technology allows him to provide a wide variety of client services including digital forensics, incident response, malware analysis, vulnerability assessments, network security assessments, penetration testing, social engineering, and a variety of audit-based services (NIST, COBIT, SOC 1, SOC 2, etc.).