Mission Critical Experience Makes a Difference

Decades of experience in Federal Law Enforcement, National Security and working with the U.S. Military give our teams a unique perspective and invaluable capabilities in Cyber and Physical Security.

Identify

Using expert tools to aggressively probe and test your environment, our security teams will develop a business context; inventory your assets; and identify potential threats and vulnerabilities to develop risk profiles and evaluate your organization’s security readiness and capabilities.

Manage

With a focus on immediately remediating known vulnerabilities, WGM will formulate security strategies, plans, controls, training, schedules and required actions. Using technology to ensure consistency, our teams will also create and document plans, policies and procedures, while constantly monitoring; testing; and developing actionable intelligence to identify new potential threats and vulnerabilities.

Mitigate

Acting on the intelligence collected, our expert security teams will investigate incidents and respond accordingly — capturing, analyzing and resolving breached data security. Remediating, testing and documenting eradication of identified issues allows us to dynamically shift the security strategy, while developing new intelligence based on experiences.

“26 percent probability of a material data breach involving 10,000 lost or stolen records in the next 24 months.”

PONEMON INSTITUTE

Capabilities In Depth

Information Security


Comprehensive risk and security solutions to balance people, processes and technology.
  • Readiness Assessments
  • Penetration Testing
  • Vulnerability Testing & Management
  • Remote Monitoring
  • Compliance Auditing
  • Advanced Analytics
  • Threat Detection
  • Application Security
  • Mobile Device Security
  • Wireless Security

Investigative Services


Expert investigators find the evidence, make the connections, and identify the truth.
  • Insider Investigations
  • Employee Misuse
  • Competitive Intelligence
  • Litigation Support
  • Electronic Countermeasures
  • Corporate Counter Espionage
  • Expert Testimony
  • Law Enforcement Liaison
  • Active Security Clearances

Digital Forensics


Federal Law Enforcement practices collect, process, analyze & preserve your information.
  • Evidence Collection
  • Forensic Analysis
  • Data Recovery (drives, devices, etc.)
  • Mobile Device Discovery
  • Device Examinations
  • Cyber Incident Response
  • Litigation Support
  • Expert Testimony

Reduce the Cost and Likelihood of a Breach

  • Direct Costs per Capita ($)
    [Forensic, Legal, ID, etc.]
  • Indirect Costs per Capita ($)
    [Reputation, Churn, Brand Impairment, Business Loss, etc.]

Steps to Reduce Both

  1. Consider hiring or contracting security professionals
  2. Conduct periodic Risk Assessments
  3. Don’t rely solely on encryption; employ Defense-in-Depth
  4. Educate your employees, contractors and vendors about “sensitive” data and measures for handling it properly
  5. Constantly monitor your network to quickly identify and eradicate incursions
  6. Keep systems properly patched
  7. Create and communicate an Incident Response Plan identifying responsibilities when a breach occurs
  8. Retain a Qualified Expert company to periodically evaluate and test your readiness.
  9. Contact your legal counsel immediately if you suspect a problem

“On average in the U.S., it took 201 days to identify and 70 days to resolve a cyber attack.”

PONEMON INSTITUTE

The Dangers of Phishing Attacks

13%

% of People Clicking on a Phishing Attachment after Opening an eMail

98%

% of Phishing eMails from Organized Crime Syndicates and State-Affiliated Actors

3%

% of Targeted Individuals Who Alerted Management of a Possible Phishing eMail

Data Source: Verizon 2016 DBIR

 


It Only Takes One Click...

Steps you can take to avoid a phishing attack:
  1. Think before you click to open any attachments, access links in or download files from emails, regardless of who appears to have sent them. Anything can be “spoofed” to look real. Ask yourself “Would they really be sending this to me?” If in doubt – do not click.
  2. Treat your personal information like cash. Do not email personal or financial information. Email is not a secure method of transmitting personal information. Only provide personal or financial information through an organization’s website if you typed in the address yourself and you confirm that the site is secure.
  3. The person who called you on the phone is probably not who they say they are. Never give out personal or financial information unless you initiate the call and confirm the party on the other side.
  4. Review all of your financial accounts frequently to check for unauthorized charges.
  5. Use trusted security software and keep it and your computer updated.

What’s Your Biggest Threat?

  • Hackers
  • Malware/Virus
  • Lost/Stolen Laptop/Device
  • Other
  • Staff Mistakes
  • Paper Records
  • Rogue Employees
  • System Glitch
  • Theft
  • Incidents caused by malicious activities (Hacker, Malware/Virus and Rogue Employees) resulted in higher average costs.
  • Last Year Symantec discovered 430 million new unique pieces of malware, up 36% over the prior year.
  • Smaller Organizations (<$300M) experience most of the security incidents.

 

Source: NetDiligence 2016 Cyber Claims Study

Custom Security Engagements

Professional Security Assessment

– Define Goals
– Interview Key Personnel
– Review Policies & Procedures
– Examine Capabilities
– Study Architecture
– Scan for Vulnerabilities
– Scan for External Threat Vectors
– Scan Wireless Networks
– Analyze Findings
– Document Recommendations
– Present Report

Digital Forensic Imaging and Analysis

– Define Goals
– Survey Background
– Forensically Image Media
– Preserve and Protect Evidence
– Process Images
– Recover Evidence
– Analyze Findings
– Prepare Results
– Document Recommendations
– Present Report
– Expert Testimomy

Advanced Penetration Testing

– Define Test Objectives
– Set Forth Rules of Engagement
– Perform Reconnaissance
– Evaluate and Exploit Vulnerabilities
– Gain Access and Elevate Privileges
– Maintain and Conceal Access
– Covertly Exit and Clean Up
– Assess Internal Team Performance
– Document Recommendations
– Present Report

Network Surveillance and Monitoring

– Managed Network Surveillance
– Provide Active Network Defense
– Prevent Threats
– Enforce Communications Policies
– Record Network Traffic
– Perform Stealth Packet Filtering
– Implement Transparent Redirection
– Deploy Overlay Networks

 All work is subject to the execution of a Master Services Agreement containing terms, conditions, limitations, waivers and disclaimers. Engagements above are for illustrative purposes only.

“Cyber crime costs are projected to cost businesses $2 Trillion by 2019.”

JUNIPER RESEARCH

Mission Critical Advice

  • Many firms offer services to assess risk and offer point solutions to help defend your organization. Most have never had to respond to a crisis or track down a perpetrator.
  • Multiple point security solutions are hard to integrate. You will find that many personnel assigned to work with you are fresh converts from other occupations with little experience other than a recent certification.
  • Our teams include members with decades of experience in Federal Law Enforcement, National Security, the Intelligence Community and the U.S. Military. These skilled individuals bring a completely unique perspective to the equation.
  • By knowing the tools, tactics and procedures of the likely adversary, one can better assess the capabilities and readiness of a client firm. By knowing how to properly respond to a crisis, our teams can better help you plan your firm’s defense. Decades of experience make a difference.
  • Offering a complete solution eliminates gaps and provides a holistic view of enterprise security to focus on minimizing loss exposure. Our expert advisers can guide you through any part of the process of protecting your most valuable assets, including your employees and executive team.

Our Security Experts

Michael McAndrews

Director, Network Security Services

 

Michael McAndrews is an internationally recognized leader in Network Forensics Investigations, Penetration Analysis, and Network Security Engineering with more than 15 years experience. Michael served in the Federal Bureau of Investigation (FBI) as a Special Agent investigating computer intrusions, Internet frauds and intellectual property violations. He also served as a member of the FBI’s Cyber Action Team (CAT), a fly team which deployed worldwide on national security and criminal cases. Most recently Michael served as a Senior Network Security engineer at BitVoyant and Packet Forensics. He has offered instruction for law enforcement across the U.S. and Europe.

Bob Meshinsky

Practice Leader, Forensic Services and Cybersecurity

 

Bob Meshinsky’s career includes more than 20 years in federal law enforcement serving 19 years as a Special Agent with the Federal Bureau of Investigation (FBI) Computer Analysis Response Team (CART) Program. As a Special Agent, Meshinsky worked complex criminal, national security and computer intrusion cases. As a member of CART, he conducted forensic examinations on seized computers, mobile devices, digital cameras, digital video recorders and digital media across a broad spectrum of investigations conducted by the FBI. Bob served as the FBI Phoenix SWAT Tactical Operations Team Leader for 17 years.

Jeff Evans

Senior Consultant, Forensic Services

 

Jeff Evans is a recognized expert in computer and network forensics with 12 years experience as an Information Technology Specialist and Senior Forensic Examiner with the Federal Bureau of Investigation’s (FBI) Computer Analysis Response Team (CART). He also served as the Program Manager and National Subject Matter Expert for the FBI’s Live Capture program which involves advanced techniques for imaging a running computer system, identifying possible encryption, capturing volatile memory, and gathering network and system process information. Jeff also served for 6 years as a member of the Evidence Response Team (ERT).

Chuck Matthews

Chairman and CEO

 

Chuck Matthews, the Chairman and CEO of WGM Holdings LLC, is responsible for establishing the strategic direction of the company. His background includes 30+ years in management, finance, real estate and technology providing a solid foundation for leading the company’s experienced team. After many successful years in banking, Chuck held leadership roles with DMB Associates and IntelliCommunities where he pioneered the use of advanced technologies to develop the infrastructure and related services for master planned communities. Chuck holds a Bachelor of Science Degree in Finance from the University of Arizona.

Technologies and Partners

Contact

Contact us today for a free consultation and description of our services. If you have a urgent matter that you would like to discuss with a member of our team, please call us at (800) 864-4667.





Scottsdale Forum 6263 N. Scottsdale Rd