Experience: Applying vast experience to tomorrow’s assignments

We have an in-depth knowledge of many industries around the world and have discovered and defined value in virtually every scenario imaginable.

Although no two projects are ever the same, there is a strong likelihood that we are able to apply our vast experience to your particular needs. You can gain a better understanding of our past experience and how this may relate to your needs by searching our case snapshot database.

Show advanced filters

6 Case snapshots

finding hidden files
Finding Hidden Files

An employee at a company in Spain was suspected of fraudulent activity with regard to electronic trading activity. A forensic technology review of the employee's laptop computer was performed to identify hidden or deleted files.

  • Corporate / Investigation
  • Technology, Media & Telecoms
  • Cyber Consulting / Forensic Investigation / Forensic Technology
  • Spain
Digital Evidence Recovery During Liquidation
Digital Evidence Recovery During Liquidation

Conducted digital evidence recovery for a large electricity company in the UK undergoing liquidation. The acquisition of data from computer systems was meant to safeguard the administrators and to facilitate an investigation into the movement of funds around the company.

  • Legal / Investigation
  • Energy, Mining & Utilities
  • Cyber Consulting / Forensic Investigation / Forensic Technology
  • United Kingdom
Recovering Digital Evidence of Insider Trading

An investigation into suspected insider trading and stock market manipulation required digital evidence recovery from the work PCs of 19 suspects. We conducted on-site imaging of the PCs; subsequent extraction of requested files; keyword searching, email and web- browsing history extraction; and analysis of hard-disk free space. Back-up tapes were also restored to provide full access to the users’ mailboxes.

  • Corporate / Investigation
  • Banking & Financial Services / Energy, Mining & Utilities
  • Cyber Consulting / Forensic Investigation / Forensic Technology
  • United States
Investigating A Confidentiality Breach

A large multinational oil company suspected an employee of a continuing directorial relationship with his previous company, which was a vendor. This raised concerns of conflict of interest and confidentiality. Our investigation was comprised of on-site disk imaging of the suspect’s laptop and forensic analysis within our secure laboratory, including document extraction, keyword searching and an export of web- and server-based emails.

  • Corporate / Investigation
  • Oil, Gas & Petrochemicals
  • Cyber Consulting / Forensic Investigation / Forensic Technology
  • United Kingdom
iStock 42637374 MEDIUM DDOS Cyber attack
DDoS Attack on Online Retailer

An online personalised product manufacturer suffered a cyber attack making its website inaccessible to external users. A claim for loss of gross profit and restoration costs was presented. We confirmed a distributed denial of service (DDoS) attack had been sustained, and verified that the claimed loss was reasonable and the deductible correctly calculated. We also identified system upgrades included in the restoration costs, which were excluded from the settlement figure.

  • Insurance / Legal / Quantification / Investigation
  • Retail & Consumer
  • Cyber Consulting / Forensic Investigation
binary
Dawn Raids

Participation in dawn raids at various business premises and home addresses with government agencies under Proceeds of Crime Act and Scottish fisheries protection legislation. The work involved on-site acquisition of data plus seizure and examination of computer equipment.

  • Corporate / Investigation
  • Government / Public Services
  • Cyber Consulting / Forensic Investigation / Forensic Technology
  • United Kingdom
Industry Experience

Every case is unique – talk to BTVK Advisory today

Get in touch with our London Office

03:20 pm

Local time