CISO Support Service

Our CISO Support Service provides your small to medium-sized business with the expertise you need to start or develop an information security program. This need may arise when a company you wish to do business with requires a more mature security program than the one you have in place. Regulations or laws may also require a named Chief Information Security Officer (CISO), but your company cannot afford to hire one full-time. Or you may have had the scare of a data breach, and you have decided not to wait any longer to take information security seriously. In these cases, having us on your side to help assess risks and recommend steps for improving your program can be vital to the vitality of your company.


Services may include:

  • Named as CISO Support Service
  • Periodic planning meetings
  • Self-Assessment Questionnaire (SAQ) assistance
  • Security Awareness Training (SAT)
  • Incident Response triage readiness
  • Due dilligence vetting of third-party service providers

Common Case Scenarios

  • Intellectual Property Theft
    An employee or executive leaves an employer to start a new company or work for a competitor. The previous employer ends up in a legal dispute because the employee took with him client contacts, confidential trade secrets and intellectual property, or left a backdoor for remote access to the network at a later time. We can help determine how the employee acted prior to leaving the company or at the onset of litigation.
  • Child Pornography Charges (Peer-to-Peer))
    Internet Crimes Against Children (ICAC) task forces around the country identify and arrest potential traders of child pornography on a regular basis. We can review the Government's findings and conduct an independent examination of the digital evidence in order to determine the circumstances surrounding the charged files.
  • Divorce
    Forensic Recovery can assist counsel in helping to identify, preserve and analyze digital evidence in family litigation. Often, our work is related to location data, communications, and hidden asset leads. Working through counsel on these matters is the preferred mechanism.