Services

Financial reconnaissance, governance, and technical capability — in one practice.

Our work integrates open-source intelligence with deep technical and governance review. We operate internationally and hold privileged access to national and international governance bodies.

01

Technical capabilities

Our technical work ranges from port scanning to deep code analysis, extended with algorithmic and learning-bias review of machine-learning and AI systems. This combination lets us conduct vulnerability assessments that uncover complex threats most cybersecurity teams do not see.

02

Governance capabilities

We cover the full five levels of the EA Multilateral Agreement (EA MLA) and regularly provide assessments to government agencies and other actors. The ISO backbone of our practice — ISO 27001 (information security), ISO 20000-1 (service management), ISO 22301 (business continuity), ISO 37001 (anti-corruption), ISO 55001 (asset management), and ISO 31000 (enterprise risk) — is extended with domain-specific frameworks appropriate to the asset class under assessment.

Maritime & mobility

  • ISPS Code — Ship & Port Facility Security
  • MLC 2006 — Maritime Labour Convention
  • LY3 / Large Yacht Code
  • ISO 28000 — supply-chain security
  • ISO 31030 — travel risk management
  • ISO/IEC 27032 — cyber for connected systems

Venues & hospitality

  • PCI DSS — card-payment security
  • FATF Recommendations, 5AMLD / 6AMLD
  • CPTED — security-by-design in physical layout
  • BS 7858 — security-staff screening

Private wealth & family office

  • NIST CSF 2.0 — cybersecurity framework
  • CIS Controls v8 — technical hardening
  • Wolfsberg Principles — private-banking AML
  • OFAC / EU sanctions screening
  • FATCA / CRS — cross-border reporting
  • ISO 31030 — travel risk

Cross-cutting: FATF, OFAC / EU sanctions, GDPR.

03

Financial reconnaissance

Decades of engagements with Big Four accounting firms and major cryptocurrency and Web 3.0 players give us the vocabulary to read multi-layered financial transactions and identify hidden conflicts of interest and non-obvious corruption patterns — work that has supported more than a hundred sensitive mandates.

Engagements begin with a quiet conversation.

If the question is whether we can help, the answer usually comes within a single meeting.

Open a channel