Digital and Accounting Forensic Services
Providing a full suite of digital and accounting forensic services.
Guernsey Forensic professionals include certified accountants, auditors, fraud examiners, and security professionals that provide a full suite of digital and accounting forensic services. For over 90 years, Guernsey has earned a reputation for quality and attention to detail that is essential for any investigation.
You need a team of good guys who are trained to think like the bad guys. That’s where our cybersecurity professionals come in.
Timothy Fawcett, CISSP, CISA, CSSA
Director of Cyber Security Consulting
Tim Fawcett is the Director of Cyber Security Consulting with Guernsey. He has extensive experience in performing risk assessments for IT environments and communicating best practices related to a range of systems and technologies. Tim started his career in information assurance and auditing in 2001. In his career, he has performed IT audits, risk assessments, and cyber threat and vulnerability analyses. Specific project topics include the areas of NERC-CIP compliance, PCI Data Security Standard compliance, ERP system security, application, and operating system security configurations, business continuity planning and disaster recovery, physical security, telecommunications, and security architecture and design.
Cyber Security Consultant
Isaac is an experienced pentester with experience from dozens of penetration tests. Working with companies of all fields and all sizes, he can communicate effectively and promptly with all parties involved. Other than pen testing, he has experience in physical security assessments and forensic work.
Forensic Security Analyst
As the lead forensic examiner, Hunter's responsibilities include forensic imaging, investigations, and testifying in court. Hunter is also an expert witness in the state of Oklahoma.
Digital Forensic Investigations
Uncovering and interpreting electronic data.
Digital Forensics is the process of uncovering and interpreting electronic data to allow the data on a digital device to tell a story of past events or how the information originated on the device. The forensic process allows us to preserve data as evidence in its most original state while performing a systematic investigation to reconstruct past events or preserve the findings. A forensically sound process is essential to confirm the results of an analysis will stand if required to be used in court. In the Information security realm, digital forensics plays an important role in data breaches, virus outbreaks, and the overall way in which data is recorded and secured in an organization.
Our professionals investigate Mobile Devices, Computers, Networks, Social Media Profiles, Cloud Storage locations, and removable media such as USB drives. Our experts can recover data, even if it has been hidden or deleted.
Helping our Clients prevent and deter fraud.
Whether it is an analysis of digital information or financial records, our clients and partners benefit from a forensic team that includes Certified Public Accountants and Fraud examiners as well as economists and computer security experts. Examples of analytic include calculating disputed financial losses, Economic Damages Quantification, identifying financial discrepancies, embezzlement investigations, as well as business and asset valuation. We also help organizations design controls and processes to prevent and deter fraud.
We investigate and provide expert testimony.
Our professionals are uniquely qualified to investigate and provide expert testimony to support regulatory hearings, criminal trials, civil litigation, including intellectual property theft, fraud, employee misconduct, and family law cases.
Preemptive Collection and Storage
Maintaining the integrity of evidence.
It is often the case that companies will want to collect computer images of terminated employees where there is a concern of fraud or theft of intellectual property. If there is a chance that computer data will be used in litigation, companies should collect and store data in a forensically sound manner that maintains the integrity of evidence. Guernsey will collect and store images, protecting them so that they are available for investigation and admissible in litigation.
GSA Schedule 70
Engage Guernsey through Schedule 70.
Organizations that are eligible to purchase through GSA schedules can engage Guernsey through Schedule 70 - Contractor Awarded Unique Entity ID (DUNS): 062275144