View Our Photos and Videos
Phone:
Email:
Business Hours:
- Mon - Fri
- -
- Sat - Sun
- Closed
Payment Options:
Let’s talk about crowds, when looking for Protection Agencies consider how large the number of crowds they are experienced handling. Our team members have been protecting venues with crowds larger than 10k Experienced, Trained and Ready. Give us a call to discuss your next project. (757) 912-7995 or go to info@cspsva.com
“How To Use OSINT for Security POI Investigations” addresses common challenges that organizations face as they look to incorporate open intelligence into their own security operations and how CSPS tools and workflows can help you perform more efficient POI investigations compared to traditional investigation methods.
Best practices for gathering, consolidating and organizing open intelligence to easily navigate through your Point of Interest (POI) investigations from start to finish.
Step-by-step processes for performing OSINT investigations on POIs – with a deep dive into People, Organizations, and Domains.
Tips for automating and streamlining your OSINT techniques to accelerate the velocity of your POI investigations and scale your security operations.
In the corporate world, there’s been a lot of talk about silos. There are even books and courses on the dangers of siloing. Corporate security is no exception. Practitioners tend to speak the same language, think the same way, react in a similar manner, and use the same tools and methods. Being outside of that silo allows you to learn different parts of the organization and expose yourself to ideas you may not otherwise have thought of when you were dealing with your peers in the security realm.
It’s clear that today’s enterprise attack surface has expanded to include public online networks. This puts additional pressure on security teams to be aware of and protect the digital footprint of their corporate assets in ways they’ve never considered before. Knowing where the digital identifiers of executives, employees, brands, and vendors exist globally across the public attack surface is key to identifying vulnerabilities and risk reduction opportunities.
Recent research found that 99% of executives have personally identifiable information (PII) on over three-dozen data broker websites. There were more than three personal email addresses for every executive record on average. Cybercriminals are increasingly exploiting the PII of executives and taking advantage of their unique authority and broad access to sensitive information and systems. Executives and organizations cannot take control of risk without fully understanding where and what information is stored and potentially leaked. To do this, security teams must look beyond network walls and consider the entire attack surface which now expands into public online networks.
Protective Services is one of our specialties. protective services specialists perform, plan, coordinate, and execute protective service missions for personnel in high-risk and high-profile positions who are potential targets of terrorism. They are responsible for protective service tactics, anti-ambush operations, counter surveillance operations, evasive driving techniques, and physical security.
Colonial Sleuths & Protective Services is a specialist private detective operation based in the Historic Triangle area of Virginia. We have performed as a private investigator on behalf of Government Departments, Insurers, Law Firms, Multi-National organizations and Private citizens. If you require a private investigator or have need for any of the services listed contact us.
Licence # DCJS 11-19760
Better Business Bureau, PIAVA