01
Technical capabilities
Our technical work ranges from port scanning to deep code analysis, extended with
algorithmic and learning-bias review of machine-learning and AI systems. This combination
lets us conduct vulnerability assessments that uncover complex threats most cybersecurity
teams do not see.
02
Governance capabilities
We cover the full five levels of the EA Multilateral Agreement (EA MLA) and regularly
provide assessments to government agencies and other actors. The ISO backbone of our
practice — ISO 27001 (information security), ISO 20000-1 (service management),
ISO 22301 (business continuity), ISO 37001 (anti-corruption), ISO 55001 (asset
management), and ISO 31000 (enterprise risk) — is extended with domain-specific
frameworks appropriate to the asset class under assessment.
Maritime & mobility
- ISPS Code — Ship & Port Facility Security
- MLC 2006 — Maritime Labour Convention
- LY3 / Large Yacht Code
- ISO 28000 — supply-chain security
- ISO 31030 — travel risk management
- ISO/IEC 27032 — cyber for connected systems
Venues & hospitality
- PCI DSS — card-payment security
- FATF Recommendations, 5AMLD / 6AMLD
- CPTED — security-by-design in physical layout
- BS 7858 — security-staff screening
Private wealth & family office
- NIST CSF 2.0 — cybersecurity framework
- CIS Controls v8 — technical hardening
- Wolfsberg Principles — private-banking AML
- OFAC / EU sanctions screening
- FATCA / CRS — cross-border reporting
- ISO 31030 — travel risk
03
Financial reconnaissance
Decades of engagements with Big Four accounting firms and major cryptocurrency and Web 3.0
players give us the vocabulary to read multi-layered financial transactions and identify
hidden conflicts of interest and non-obvious corruption patterns — work that has
supported more than a hundred sensitive mandates.