Access a world-class intelligence capability tailored to your specific needs. Control a multi-million dollar program without the time or expense and solve problems both lasting and acute.

Services Overview

Insider Threat Webinar

Getting Inside Insider Threats: Response and Mitigation. Stopping malicious or simply incompetent insiders from doing damage isn't just an exercise in analyzing where the damage came from. Insider Threats aren’t just malicious employees. They can run the gamut from incompetent to accidental to theft.

Know Your Enemy

Knowing the identity of the individual or entity behind an attack matters


Who Did It?

It’s a simple question, but getting an answer can be quite complex when cybersecurity investigations are required.

Despite the complexities, uncovering the identity of an individual, group or organization responsible for conducting malicious activity is critical to understanding their motives so your organization can create appropriate defenses.

Unique Solutions

We provide a team of operators with unparalleled investigative and intelligence experience, access and custom tools.

Unique Tools

Our investigations are technology-enabled. We create custom-built solutions for your organization and the unique threats you face.

Unique People

We live outside the box, applying language skills, legal know-how and nation-state quality tactics to find and mitigate threats.


Comprehensive Methodologies

Identifying sophisticated threats often takes multiple investigative techniques to get results. Using these methods in a programmatic way gets results that are unique to the industry.

Our expertise covers::

  • Nation-state level open source intelligence methods  
  • Stylometric and content analysis
  • Imagery analysis 
  • Technical analysis
  • Forensics 
  • Human-enabled methods 

It is this comprehensive approach that sets us apart.

What makes us different is our aggressive approach to mastering the best open-source methods and best-of-breed tools that are available.
David Schertzer
Managing Director, Nisos


Attribution is inherently human. Someone or some organization is attacking you. 

Our investigators are trained and equipped to infiltrate attacker communities or engage with your adversaries directly to elicit information.


Knowing Context

We determine what kind of malicious actor, an insider for example, is responsible for threatening behavior, intellectual property theft, or disclosure to an outsider for distribution online.

We help identify and make that determination for our clients, and advise on taking appropriate mitigation steps.


Case In Point

Many people view attribution as limited to cyber and nation-state threats but we are increasingly seeing more U.S.-based actors who are disgruntled employees, insider threats or being directed by outside entities with competing financial interests. 

For example, a company required our assistance identifying an investment firm they believed was harassing their company and employees in an effort to profit from shorting the stock.

It’s easier to tank a stock than prop it up and these guerrilla tactics can be effective against small and large companies. 

Nisos was able to identify the malicious actors through publicly available means. All of the data Nisos presents is acquired through legal and publicly available data sources, which means it may be admissible in court. The findings empowered the company to take legal action and stop the harassment.

Do You Have a Mystery to Solve?

Let's talk. We love challenges. Reach out and let's see if we can solve your mystery. Scooby snacks not required.

Talk To An Expert