mindstarsecurity.com
Open in
urlscan Pro
2606:4700:3032::ac43:8937
Public Scan
URL:
https://mindstarsecurity.com/
Submission: On May 05 via api from US — Scanned from DE
Submission: On May 05 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
×Close MINDSTAR SECURITY & PROFILING - SERVICES COMPREHENSIVE SECURITY ASSESSMENT Professionals at Mindstar Security & Profiling work personally with each executive and his/her family by providing customized security assessments from the vantage point of the inventive, determined and tech-savvy human or adversary. Mindstar Security & Profiling will focus on the security trifecta of Internet, Physical and IT security by conducting three security assessments which will be integrated into a comprehensive security assessment. Choose one assessment, or combine all three for a full analysis. Executive Internet Profile (EIP™): Assessment of the online presence and profile of the executive(s) and their family members’ Internet and social media presence. While many executives may not use an abundance of social media themselves, malicious activities from adversaries or non-malicious postings by family members, friends, business associates and unknown third parties may result in unwanted public exposure. Physical Security Assessment: Assessment of home(s) and corporate facilities, perimeters, staffing, doors/windows, alarm/surveillance systems, and review of security policies. This assessment will be conducted from the vantage point of the motivated person who wants to gain access to private property and assets within the properties. IT/Wireless Security Assessment: Assessment of home WiFi, home networks, routers, children/spouse use of smartphones, smart appliances, gaming systems, safe apps and secure online shopping. This assessment is conducted from the perspective of a hacker, scammer or social engineer who wants to gain access to private data, systems and networks. Close ×Close MINDSTAR SECURITY & PROFILING - SERVICES CYBER RISK ASSESSMENT Whether it is for the organization or the family office, this tailored assessment provides critical infrastructure asset owners and operators with a comprehensive technical review and cyber evaluation of the architecture and components that comprise their operations. In today’s cyber environment, cyber risk can originate from vectors other than the actual hardware and software that comprise the network. Risk can stem from malware, personal devices, dated policies or procedures, corrupted apps, phishing attacks, or employee mistakes. In some cases, attacks are launched from authenticated users and systems by malicious or non-malicious insiders. In order to provide a assessment of the risk landscape (office or home), Mindstar’s cyber team will work interactively with your IT and operations/business personnel to evaluate the current architecture, technology, policies and processes, with focus on three key areas: 1) Architecture/Hardware and Software: Systems, Networks and Devices 2) Internal Controls: Policies, Training, Incident Response and Insider Threat 3) External Risk: Phishing, Ransomware, Malware and Internet Threats Close ×Close MINDSTAR SECURITY & PROFILING - SERVICES CYBER INVESTIGATIONS When an organization, an executive, or a family member is threatened, harassed, or stalked, understanding the messaging and intent of the threat is extremely important. In today’s environment, a thorough investigation must include the combined elements of: • A Technical Review & Analysis • A Cyber – Internet/Social Media Review • A Psychological Profiling Assessment In addition to assessing imminent, recidivist or one-time threat, investigations can be applied to areas such as: • Executive candidate searches • Merger & acquisition due diligence • Embezzlement cases • Insider threat • Non-criminal legal issues • Corporate re-organizations (e.g., downsizing or personnel changeover) Close ×Close MINDSTAR SECURITY & PROFILING - SERVICES PROFILING & EXPERT WITNESS The methodology of behavioral or criminal profiling has been used for over three decades to assist investigators and forensic analysts in incident investigation. Profiling is defined as the process by which an incident is evaluated and assessed from a behavioral perspective in order to provide social scientific insight into the individual or individuals who may have committed the offense or determine the dangerousness of the threat actor. Mindstar provides and applies behavioral profiling to a wide variety of cases and situations including: • Death Threats • Extortion • Ransom/Kidnapping • Cyber or Physical Stalking • Cyber-Bullying or Harassment • Due Diligence – Hiring or Termination Families and family members when faced with a suspicious or threatening situation should be provided with the most robust information possible by understanding the motive, intent, and anticipated behavior of the threat actor(s). These behavioral assessments may supplement on ongoing legal case (criminal or civil) as depositions or affidavits. In addition, expert witness testimony and services are available. Close ×Close MINDSTAR SECURITY & PROFILING - SERVICES TRAINING & SEMINARS Mindstar offers customized security training and seminars for executives, their family members or their organizations. Topics include: • Executive/Board Room Security Overview • Family (Adults) Security Overview • Family (Children) Security Overview • Safe Travel • Social Media Safety and Protection for Adults • Social Media Safety and Protection for Children • Physical Security and Self Defense for Children • Physical Security for the Office (Gunman in the Building Scenario) • Insider Threat/Embezzlement Close ×Close MINDSTAR SECURITY & PROFILING - SERVICES CORPORATE CONSULTING Mindstar Security & Profiling works together with the family members, the estate or home managers, the IT department, the security department, the family office professionals or private attorneys. Mindstar Security & Profiling is professional and experienced in all aspects of its operations, whether serving clients at home or at work. Our experts have been in the security, intelligence and safety professions for decades serving commercial clients, family offices, and high net worth families. There are services, however, that we do not cover. For additional specialty security services such as executive protective detail, kidnapping and random insurance, or legal representation for cyber issues, we can provide referrals to trusted and vetted service providers. Every introduction, interaction, and request is handled with undivided attention and confidentiality. By delivering only the very best and always exceeding expectations, our clients come to trust us and rely on our services to help them secure their lives to the fullest. Close ×Close MINDSTAR SECURITY & PROFILING - SERVICES INTERNET & SOCIAL MEDIA MONITORING Criminals or adversaries can easily search the Internet to reveal your identity, financial status, residence, family members, etc. — essentially building a profile. Building a profile helps predict where someone will be at any given time, making them vulnerable to a physical attack. Stay abreast of emerging threats, unwanted disclosed information, or developing issues. We work with you to understand the problem at hand and deliver intelligence, so you can respond quickly to mitigate risks. Monitoring Topics Include: • Family or Individual Internet Footprints • Location/Travel Based • Due Diligence • Threats and Risks • Events • Adversarial Groups • Lawsuits Close ×Close MINDSTAR SECURITY & PROFILING - SERVICES CLOSED SOURCE ACCESS & MONITORING Criminals or adversaries can easily sign up for or pay to access closed data sources to attain information about your identity, financial status, residence, family members, etc. — essentially building a profile. These sources are not “hacked” or attained illegally, but are accessible by paying a small fee. Mindstar offers open source (Internet & Social Media Monitoring) as well as closed source monitoring. Closed source data is defined as information that is attained via the Internet but requires a login, user credentials, or is a paid for service. Numerous “pay to access” information sources are available and contain data such as prior criminal histories, social security numbers, voter registration numbers, genealogy data and additional personal identifiable information. Close ×Close MINDSTAR SECURITY & PROFILING - AFFILIATIONS INTERNATIONAL SPY MUSEUM The Museum focuses on human intelligence and reveals the role spies have played in world events throughout history. Former intelligence officers reveal extraordinary experiences from their distinguished careers in the field and offer informed opinions on current as wells as historical events. Visit: http://www.spymuseum.org/host-an-event/spy-speaker-series/terry-gudaitis/ Close ×Close MINDSTAR SECURITY & PROFILING - AFFILIATIONS TECHNO-SECURITY & FORENSICS INVESTIGATIONS CONFERENCE / MOBILE FORENSICS WORLD This program has been serving the cyber community for over 15 years. The conference has become known as a world-class training and international networking event. Dr. Gudaitis serves as an advisory board member for this conference. Visit: http://www.technosecurity.us/ Close ×Close MINDSTAR SECURITY & PROFILING - AFFILIATIONS MI3SECURITY Mi3Security is the market and technology leader in intelligence-led Mobile Risk Management (MRM). The company offers a cloud-based service that performs a detailed analysis on 3 key vectors: context, intent, and predictive behavior. Dr. Gudaitis serves as an advisory board member for this organization. Visit: http://www.Mi3Security.com Close ×Close MINDSTAR SECURITY & PROFILING - AFFILIATIONS WHITEHAWK WhiteHawk enables businesses to grow with confidence by providing the future of cyber-security services. Visit: http://www.whitehawk.com Close Mindstar Security & Profiling Concierge Security Services Toggle navigation * Home * Services * Reports * Affiliations * About * Contact WE SOLVE PROBLEMS. QUIETLY. Physical and cyber security services for family offices, high net-worth individuals, executives and their families. SERVICES Click or tap on one of the services below to learn more. * All * Risk Assessments * Investigations * Training & Consulting * Risk Monitoring Learn More Comprehensive Assessment Learn More Cyber Risk Assessment Learn More Cyber Investigations Learn More Profiling & Expert Witness Learn More Training & Seminars Learn More Corporate Consulting Learn More Internet & Social Media Learn More Closed Source REPORTS CONCIERGE SECURITY REPORT 1 - JULY 2015 Family Security: Home Invasion and Burglary In Gated Communities and Affluent Neighborhoods Download Report CONCIERGE SECURITY REPORT 2 - AUGUST 2015 Executive & Family Travel: Global Safety Including Health, Cyber and Physical Security Measures Download Report CONCIERGE SECURITY REPORT 3 - SEPTEMBER 2015 Enhancing Physical Security: The Impact of Internet and Social Media Exposure Download Report FOR ADDITIONAL REPORTS Concierge Security Reports are released monthly to our clients and select colleagues. Click on this link to request that you be added to our distribution list. The Concierge Security Reports will arrive your email inbox. We do not send spam, and we will not send a report unles you request it from us directly. AFFILIATIONS INTERNATIONAL SPY MUSEUM > Former intelligence officers reveal extraordinary experiences... > > Learn More TECHNO-SECURITY CONFERENCE > Known as a world class training and international networking event... > > Learn More MI3SECURITY > Cloud-based service that performs detailed analysis on key vectors... > > Learn More WHITEHAWK > Enables businesses to grow with confidence by providing... > > Learn More ABOUT MINDSTAR SECURITY & PROFILING Concierge Security Services for Executives and Family Offices Mindstar Security & Profiling specializes in solutions for the commercial industry focusing on high profile/high net worth executives, their families, and the organizations they lead. Security assessments and consultations include a unique perspective and blend of physical security, cyber security and behavioral profiling. • Threats to Corporate Executives or their Family Members • Executive Risk Assessments • Personal Property and Asset Vulnerability Assessments • Behavioral Profiling • Crisis Planning & Mitigation • Social Media Protection and Safety • Due Diligence Profiles • Customized Security Briefings for Boardrooms & Family Offices Each Mindstar service is especially customized for the needs of the executive or his/her family members. We understand there are unique safety and security requirements for high net worth persons and their families such as: being in a social and financial demographic that is frequently targeted, journalist and media interest, personal brand management, unique staffing needs, non-commercial travel or transportation and the need for high degrees of privacy and confidentiality. CUSTOM SECURITY SOLUTIONS Information Security is becoming more relevant every day, even for those who do not use the Internet regularly. Cyber crime is big business; its growing fast and high net worth individuals are targets. In recent years, organized crime elements and gangs have taken over from the amateur hackers and they are focusing more and more on high net worth individuals. Children, although typically tech-savvy, are naïve to the dangers of posting their personal information on public websites. Social networking puts them at even greater risk of unknowingly associating with a perpetrator who may target them because of the family's prosperity. Our specialists have decades of experience servicing the security needs of corporate executives and their families DR. TERRY GUDAITIS, OWNER Dr. Terry Gudaitis founded Mindstar Security & Profiling in 2013. Prior to forming her own firm, Terry was the Vice President and Cyber Intelligence Director at Cyveillance, responsible for operations and management of the security/intelligence delivery organization. Before joining Cyveillance, Terry also held senior positions at SAIC, Psynapse Technologies LLC and Global Integrity Corporation. Before focusing on the commercial sector, Terry was an operations officer and behavioral profiler at the Central Intelligence Agency (Counter Terrorist Center). In addition to her corporate related work, Terry is on the Board of MetaIntell, has served on the United States Secret Service Advisory Board for Insider Threat; trained investigators at the National Center for Missing and Exploited Children and regularly presents at national and international conferences. Her most current publications include a book on Social Engineering – Low Tech Hacking (2011) and, a book on profiling hackers entitled Cyber Deception (December 2015 – to be released and co-authored with FBI Agent Cameron Malin of the Behavioral Assessment Unit). Terry is also a featured speaker at the International Spy Museum in Washington, DC. Terry holds holds a Bachelor’s Degree from SUNY Binghamton, a Master’s Degree and PhD in Forensic Psychology from University of Florida. CHRIS CLARK, VICE-PRESIDENT For over 12 years, Chris Clark has assisted the Fortune 500 with some of their most sensitive cyber security issues. Chris has been utilizing open source information and proprietary software to exploit Internet and social media data. These incidents include physical threats to executives and/or facilities, boycotts, protests, class action lawsuits, violation of company blogging policies, information security vulnerabilities, different forms of online fraud, and other disruptive activity. He has focused on conducting threat assessments, industry trends, and other “deep dives” into Internet based information. Throughout his tenure, Chris has conducted hundreds of investigations including over 100 executive online assessments. As a risk analyst, Chris was tasked with securing funds from high risk clients, as well as high dollar amounts that present a significant risk. His experience included risk mitigation, communication with clients and banks, requesting and receiving wire transfers, as well as background checks on individuals of interest and businesses. Earlier in his career, Chris obtained a New York State Security Guard license working for an organization where he had to identify and diffuse tense and/or violent situations. He is also a Certified New York State Firefighter where he responded to a variety of calls including various types of fires, alarms, car accidents, and medical emergencies. Chris holds a Bachelor’s Degree from SUNY Buffalo and a Master’s Degree in Intelligence Studies from Mercyhurst University. THE MINDSTAR SECURITY TEAM Our team members all have 12+ years of experience working with executive clients who necessitate confidentiality and discretion. Each team member holds a Master's Degree (or PhD) in their fields of expertise whether it be intelligence studies, computer science, or threat/criminal behavior. Our team works together to bring the best security skills together including a breadth/depth of knowledge about the Internet/Social Media, Physical Security, and IT Security. Some of the certifications held by our team members include: • CISSP • EnCE • Security+ • Red Hat Certified Technician • Certified Scrum Master • VMware Certified Professional • Body Guard/Security Guard License CONTACT US We are located in Leesburg, Virginia at the Leesburg Executive Airport, near the technology corridor just outside Washington DC. * 1001 Sycolin Rd, SE, Suite 5 * 703-404-1100 * 703-404-5549 (fax) * info@MindstarSecurity.com Copyright © 2015 Mindstar Security & Profiling