WHO WE ARE
Cyber Diligence, Inc. is comprised of highly trained investigators who are world-recognized experts in INFOSEC Incident Response and I.T security management. Our Investigators are experienced and skilled at deploying sophisticated state of the art tools to combat I.T crimes. We specialize in conducting highly sensitive covert internal investigations.
Our expertise includes insider abuse detection investigations such as industrial espionage, employee fraud or where other forms of misconduct is suspected. Cyber Diligence investigative team is made up of former law enforcement investigators who collectively posses' more than 100 years of investigative experience. We have successfully investigated many high level industrial espionage cases in the U.S and abroad where hundreds of millions of dollars were at stake.
The founder of the company Mr. Yalkin Demirkaya has twenty years of law enforcement experience as a Detective Investigator as well as a Detective Squad Commander. In addition to his responsibilities as the commander of the Computer Crimes Unit, Mr. Demirkaya also served as the Chief Information Security Officer of the Internal Affairs Bureau of NYPD. Mr. Demirkaya has been responsible for creation of the first computer crimes investigation unit dedicated to internal investigations in the government sector.
Mr. Demirkaya has pioneered and perfected investigative techniques for internal computer crime investigations. He possesses twenty-six years of computer experience as a white hat hacker. He is the founder and was the Commanding Officer of Computer Crimes Investigation Unit of Internal Affairs Bureau, New York Police Department.
what we offer
Various organizations hire us to investigate I.T crimes and deliver evidence for the resolution of existing or potential misconduct. Our cases involve insider abuse of I.T resources, industrial espionage, leakage of information and general malicious activity. a Typical computer forensic examination analyzes individual hard drives for suspicious data. This approach is sometimes limited, since illegal behavior can be purged from drives by professional criminals or even by those with basic computer knowledge and skills. in addition to media based forensic software and hardware, We use state of the art Network Forensic tools to examine live information passing through our clients' networks. We can capture suspicious network communications to answer questions, such as:
- Is anyone inside the company accessing confidential documents?
- What documents and data are suspects accessing?
- Is anyone going into areas where they don't belong?
- What servers are being accessed, and by whom?
- Is anyone sending sensitive information outside of company firewalls?
- does your suspect have accomplices inside the company?
- Is there a successful intrusion into your networks and if there is, what is the extent of the intrusion?
- Is there any evidence to suggest that your network may have been compromised by an external intrusion, etc.?
“effective cybersecurity requires all partners - individuals, communities, government entities and the private sector - to work together to protect our networks and strengthen our cyber resiliency."janet napolitano
department of homeland security
“Extreme insider threats: Real stories and real advice. Who better to speak about insider threats than a seasoned professional responsible for the investigation of computer crime in new york city."
robert f. gleason
the financial fortress leadership group™