Expert Risk Analysis
By working directly with your stakeholders, law enforcement, cybersecurity professionals and industry experts our risk analysis team can determine the likelihood of any particular threat, prioritize action plans, recommend appropriate security measures, implement solutions, and when necessary, conduct penetration testing to ensure resiliency. Data and facts should be your be your source of truth when implementing or improving new security systems or frameworks, that's why we've made it so easy to get started. Here's how:

01
Schedule a Strategy Call
Our first job is to gather as much information as possible about your organization's unique challenges and concerns.

02
Create a plan
After studying the problem, our team of experts will get to work crafting a bespoke strategy that protects all aspects of your business, and enables continued growth.

03
Let’s execute that plan together
We’ll work directly with you and your stakeholders to implement and manage your new strategy, helping you navigate any pitfalls along the way.
What are you waiting for?
Let's Talk!
Secure Your Business: The Top Business Security Systems for Property Managers
How Security Can Help Property Managers Combat High Tenant Vacancy Rates
Natural Disaster Preparation: 6 Keys for Safeguarding Your Company from Hurricanes, Storms, Fires and Other Emergencies
Brand Protection: How Businesses Can Identify and Stop Intellectual Property Theft
Dell Spry Promoted to Vice President Emeritus
Why your business may need an asset search
How to Secure Intellectual Property and Trade Secrets
How to Respond to a Whistleblower’s Report
The First Steps for Conducting Internal Investigations
Theft of Trade Secrets: How to Prevent the Loss of Key Intellectual Property
How to Prepare for a Cyberattack
How the Events of September 11th Have Impacted National Security
A Nation Under Attack: The Colonial Pipeline Attack
Reasons to Hire an Outside Security Risk Firm
The Ultimate Guide for Small Businesses to Combat Economic Espionage
Preventing Civil Unrest
What Achilles can Teach us About Threat Management
The SolarWinds Supply Chain Attack: What Businesses Need to Know
Lessons Businesses Must Learn from the Nashville Bombing
3 Simple Practices to Optimize School Safety During Covid-19
4 Crucial Things To Know About Business Impact Analysis
2 Painless Ways to Transition Your Retail Business to Touchless Technology
3 Overlooked Tips to Destress During the Holidays
Top 5 Problems Facing the Retail Industry
Holiday Safety Tips
Election Day: Planning for Civil Unrest
The Transformational Power of Threat Assessments
3 Practical Strategies to Protect Your Small Business During Covid-19
The Anatomy of a Crisis Management Plan
risk-takers #9. Joe Sheram – The Turnaround Guru
Podcast | Risk Takers Series #9. Joe Sheram – The Turnaround Guru
Podcast | Risk Takers Series #08. The State of Security – SPECIAL EPISODE
risk-takers #08. The State of Security – SPECIAL EPISODE
What is Business Continuity?
Podcast | Risk Takers Series #07 Jack Barsky – Former KGB Spy
risk-takers #07 Jack Barsky – Former KGB Spy
Podcast | Risk Takers Series #06. Human Trafficking with Bazzel Baz
risk-takers #06. Human Trafficking with Bazzel Baz
Podcast | Risk Takers Series #05 Corporate Counterespionage
risk-takers #05 Corporate Counterespionage
Podcast | Risk Takers Series #04 Brad Orsini – Community-based Security
risk-takers #04 Brad Orsini – Community-based Security
Podcast | Risk Takers Series #3 Surveillance Detection Routes (SDR)
risk-takers #3 Surveillance Detection Routes (SDR)
How to Prepare for Economic Risk
Podcast | Risk Takers Series #2 Terry Fisher — Electronic Countermeasures
risk-takers #2 Terry Fisher — Electronic Countermeasures
The Risk Takers Podcast Series Launches Today!
Podcast | Risk Takers Series #1 The Aldrich Ames Espionage Case
risk-takers #1 The Aldrich Ames Espionage Case
10 Steps for Building a Crisis Management Communication Strategy
7 Tips the Pros Won’t Tell You About Budgeting For Risk
The Future of Work
Managing Risk During a Pandemic
6 New Risks for Businesses post COVID-19
5 Tips for Creating Better Crisis Management Plans
FREE DOWNLOAD Securing a New World: Security, COVID-19, and Boots on the Ground
When it Comes to Corporate Espionage, Harvard’s Dr. Lieber is Just the Tip of the Iceberg
Chesley Brown Launches Initiative to Fight Human Trafficking
Spotlight: Bryan Taylor Promoted to Vice President
Spotlight: Christian Kalinski Promoted to Senior Director of Security
An Open Letter on 9/11
Chesley Brown Announces Counterespionage Unit
Account Protection with Password Manager
Chesley Brown Announces Addition to Senior Team
Federal Commission on School Safety Releases Comprehensive Report
Fighting Terrorism with Strong Private Sector Relationships
Facial Recognition: the First Catch
Are Employees an Unintentional Security Risk for Cyber Attacks?
DHS and Canada Team up for First Responders
Supreme Court Decision Regarding the Privacy of Digital Data
The Evolution of School Security
Threats Our Kids Face Online
10 Steps for Developing An Emergency Response Plan
10 Steps for Developing An Emergency Response Plan
Frequently Asked Questions (FAQ)
Our corporate partners often have lots of questions. We have gathered the most common ones together with responses directly from our team of experts. If you have ever wondered whether your company or organization needs a corporate investigator, this will hopefully help you find the answers you need.
Corporate investigators can uncover facts about any specific problems your company has through interviews, interrogation, and data analysis; identify facts and corroborate complaints within a written report with the facts surrounding the situation, equip you with options to deal with the offending employees, or bad actors and provide guidance on how to improve business operations to avoid recurrence.
Personal problems of employees such as substance abuse or gambling, inner-office relationships, complaints of racism or sexual harassment, intellectual property theft, disruptive divorce proceedings, moonlighting, criminal charges, conflicts of interest, personal use of corporate resources, excessive sick time, workman's comp or fraud are generally the most common issues we see.
Conducting effective witness interviews can be one of the most demanding steps in an internal corporate investigation. At Chesley Brown we rely on the investigative experience of our prosecutors and former federal agents to develop investigative strategies based on the specific facts and circumstances involved in each investigation we handle.
If an internal investigation of the company shows evidence of employee misconduct, generally this means that several actions will be taken immediately. Depending on the specific misconduct in question, this could include any combination of the following:
- Update company policies and procedures
- Taking corrective action internally
- The discipline of the employee (or employees) involved
- Self-disclosing the issue to the appropriate federal authorities.
How a company deals with federal regulators requires a measured, strategic, and forward-thinking approach. If the wrongdoing triggers an obligated self-disclosure, federal authorities are already investigating your company's business or registration practices, or there's a chance that a federal investigation can happen soon, the risk management team of the company will need to make informed decisions and engage an external adviser to chart a course of action that mitigates the risk of civil or criminal penalties or reduces exposure.
Additional Resources:
Risk Takers Podcast Series Episode 1 - Aldrich Ames Spy Case
https://chesleybrown.com/the-risk-takers-podcast-series-launches-today/
Risk Takers Podcast Series Episode 1 - Surveillance Detection Routes (SDRs)
https://chesleybrown.com/the-risk-takers-podcast-series-launches-today/
Safe Passage / Safe Travel
https://chesleybrown.com/corporate-investigation-services/safe-passagetravel/
Chesley Brown Solutions
Clients that rely on Chesley Brown Security Consulting and Management services often request additional services including: