Wescott Cyber Consulting


Services


Wescott Cyber ConsultingWC2 provides informed and experienced guidance to business owners and/or executives as well as their in-house and/or outside counsel in all phases of the design and implementation of a comprehensive cybersecurity program, tailored to your business, from risk identification and assessment to recovery from a breach or other security incident.

Achieving the three core cybersecurity goals often involves identifying and resolving numerous technical, policy, process and legal considerations. Though we cannot and do not provide legal advice, our background, and long knowledge and experience with these matters allows us to act much like a general contractor who can provide you with advice regarding the structure and design of your program, and can serve as a liaison to all of the persons involved in the consideration and execution of these issues. This may involve "translating" concepts and concerns between various constituencies such as legal counsel, forensic investigators, and business departments in order to provide your business with harmonized solutions and courses of action.

Our services include:

  • Identification, assessment and mitigation of your strategic cyber risks
  • Design, drafting and assisted implementation of your cybersecurity program, including all appropriate cybersecurity policies, processes and practices
  • Assistance in the evaluation and selection of appropriate security technologies
  • Design and drafting of an Incident Response Plan
  • Analysis of existing cybersecurity policies for scope, completeness, clarity, usability and currency
  • Design and implementation of third party provider risk identification and mitigation policies and procedures
  • Identification and analysis of potential cybersecurity risks arising from merger and acquisition due diligence investigations
  • Providing cyber insurance coverage gap analysis
  • Conducting cybersecurity user awareness education
  • Identification of potential regulatory compliance requirements, gaps and solutions (FFIEC, SEC, NYDFS, GDPR HIPAA, PCI-DSS and state privacy, security and breach notification requirements)
  • Providing cybersecurity thought leadership for the business’ leadership groups
  • Coordination and management of cyber incident response events
  • Coordination and management of internal cybersecurity and cyber fraud related investigations
  • Liaison and coordination between legal counsel, forensic experts, security vendors and business management
  • Preparation of cybersecurity-related contracts and contract provisions for review and approval by legal counsel
  • Working with legal counsel to understand and resolve challenges related to evidence collection, computer forensics analysis and other digital evidence issues
  • Assisting in-house or outside legal counsel to: (a) understand and proactively use forensic digital evidence in civil and criminal litigation; (b) effectively resolve disputes regarding the collection, use and introduction of digital information in various dispute resolution forums; and (c) selecting and working with forensic experts
  • Cybercrime/cyber fraud prevention and investigation advice and counseling
WC2: SOLUTIONS NOT COMPLEXITY