Our professionals routinely advise on providing sufficient controls and procedures to protect clients’ sensitive information. We evaluate client vulnerabilities and countermeasures and prescribe steps to safeguard key data.
We detect, report upon and mitigate the intelligence gathering activities of our clients’ competitors – all in accordance with the Economic Espionage Act of 1996 and other relevant statutes.
Selected Case Studies/Notable Matters
- Assessed the vulnerability of our client’s new claims processing facility by evaluating their network, data center, and end-user systems as well as their automatic call distribution system. We were challenged to penetrate the physical security of the high-security payment processing group within the claims processing facility. We demonstrated that we could seize remote control of the call distribution system at will and overcome all existing countermeasures. Our professionals gained access to the network and by tunneling through it we penetrated other corporate facilities enabling SL&A to produce copies of executive’s hard drives that were made without their knowledge or the knowledge of their IT department. SL&A professionals were able to tape their business cards to the inside of computers and check printers in the payment processing facility without being detected. We provided the client with a robust set of procedures and controls to disallow the type of incursion we demonstrated in the vulnerability test.