• Managed Global Intelligence Services

     

    Reduce Your Risk and Protect Your People, Facilities, and Technology

     
     

  •  

    What We Provide for Our Clients

     

     

    The CyberPI offers Managed Intelligence Services and Insider Threat/Workplace violence Investigation Services, to protect and reduce risk to your companies people and critical assets from insider and external threats year-round. We do this by utilizing Counterintelligence-based methodologies coupled with Open Source Intelligence (OSINT) analysis.

     

    We focus our intelligence services on three main areas:

     

    Protective Intelligence - To inform and advise your Executive leadership and Security Teams of the dangers on the ground both domestically and internationally and provide advance notification of possible threats upon arrival and return.

     

    Geopolitical Threat Intelligence for Business - S3 GSG and the CyberPI team take a holistic look at your organization from the lens of threats facing your key and primary business capabilities and assets. We analyze the social, political, and military activities that appear hostile to your people, facilities, and bottom line. We do a deep dive into your supply chain, subcontractors, vendors, and nation-state actors that have even a tentative connection to your company to provide you the best in class intelligence analysis, keeping your leadership steps ahead of possible threats and issues of concern that your organization will likely face in the near future.

     

    Cyber Threat Intelligence - We take a hard look at the Indicators of Compromise (IOC) coming in from the SIEM tool that we either provide or are incumbent to your technologies and tools. Cyber Threat analysis should be based on the software, tools, and devices that are currently in use by your organization. Thus the Cyberpi teams' first job is to audit the software and tools that are in use by your organization and ensure they are updated; secondly, we look at what is the latest threat reporting and vulnerability reporting regarding those tools to ensure you are currently protected. Once this is completed then we begin our IOC collection and analysis in earnest, taking into consideration security gaps, plausible reasons for attacks on your business, malware reporting, hacker group reporting, and comparison attacks to companies with a similar profile as your own to better know what to expect and how to protect your organization.

  • Behavioral & Open Source Research

     

    We use multiple collection data points derived from Behavioral Analytical Tools and Open Source research to track down, screen, and analyze potential cyber threats to your organization on a daily or weekly basis. These tools are expertly configured to provide the right information to the right people. 

     

    CI-based Human Analysis

     

    The CyberPI team uses Counterintelligence (CI) techniques, tactics, and procedures as its foundation for the experienced intelligence analyst and investigators we hire. CI in its original form catches foreign spies and detects insider threats to an organization. We use that same purpose to detect and prevent cyber & criminal threats from damaging your organization.

    Government Liaison for Industry

     

    We keep your company on track with a Counter-intelligence representative (CI-Rep) to ensure your Insider Threat Programs and Operational Security Practices are working and are compliant with government agencies' policies to protect classified programs.

  •  

    How We Do It

    Comprehensive | Measured | Legal | Proactive

     

     

    We use a Proactive Hybrid Approach utilizing Specialized People and Technology

     

    CyberPI.io is a managed threat intelligence and investigation service focused wholly on producing actionable intelligence that centers around detecting, analyzing, and investigating insider and external threats to your organization.

     

    The CyberPI.io Team can utilize incumbent OSINT and cybersecurity tools already invested in by the client OR offer new OSINT collection and behavioral analytics that are the best in class technologies from our PARTNER Companies.

     

    We analyze Counterintelligence-Based Indicators of Compromise and Disruption

     

    CyberPI.io provides verified and corroborated leads generated by our threat intelligence team. We back up those leads with licensed private investigators and CI analysts who provide counterintelligence-based explanations and feedback to our clients so that they may make better-informed decisions.

     

    We Provide Counterintelligence Liaison for Defense & Technology Companies

     

    CyberPI.io works hand-and-hand with your ISSO/ISSM's; Corporate Security Managers, Executive Protection Teams, and FSOs to ensure that all is in order from an Insider Threat perspective to do business with the U.S. government; as well as attend workshops, working groups, and seminars as requested.

     

    "It Takes More Than Just Technology To Be An Effective Tool Against The Threats Business Face Nowadays."

     

    "It takes a Team of Security Professionals with backgrounds in counterintelligence, cyber threat intel, and investigation, combined with  technical research and analytics to make the difference."

     

    Bobby L. Sheppard  - Founder and CEO

     

  • The CyberPI Process

    Proactively Working to Reduce your Companies Cyber Threats and Physical Security Risks

     

    We Get to Know You

    Policies and People

    CyberPI leadership reviews your companies acceptable use, privilege, and email use policies to understand your current operational status and to assist us in our threat vulnerability assessment and setting up collection data points.

     

    Additionally, CyberPI Counterintelligence-Reps will both guide and communicate with government security officials at the behest of the client to ensure compliance and accountability for those classified and or protected programs.

    We Set-up Your Tools

    Optimized for Collection and Analysis

    CyberPI managers work with your IT Security team, ISSO, and or System Admin to best configure your current cybersecurity analytics to collect based on our CI-based indicators. If your company does not have a cybersecurity analytics system will recommend an option to buy a system only the most necessary level for us to do our jobs.

    We Hunt the Threat

    Counterintelligence-based Screening,Research & Analysis

    CyberPI's OSINT and CI analyst will begin working on our proprietary methodology to collect, analyze and disseminate monthly and On-demand reporting. All of our leads on threats to your organization will be corroborated intelligence that will provide context, explanation, and a threat level based on those critical company impact areas that will help guide the client on making important decisions for the organization as a whole.

    Verify Leads and Investigate

    Corroborate Suspicious Activity with Licensed PI's

    Finally, our Licensed Private Investigators hired to investigate cybercrime, fraud, and if necessary conduct forensic investigations will initiate insider and or external investigations for all corroborated and verified leads at the client's command.

×
Privacy Policy
PRIVACY NOTICE
Last updated March 10, 2021

Thank you for choosing to be part of our community at S3 Global Security Group LLC , doing business as CyberPI.io (“cyberpi.io”, “we”, “us”, or “our”). We are committed to protecting your personal information and your right to privacy. If you have any questions or concerns about our notice, or our practices with regards to your personal information, please contact us at support@cyberpi.io.
When you visit our website https://cyberpi.io, and use our services, you trust us with your personal information. We take your privacy very seriously. In this privacy notice, we seek to explain to you in the clearest way possible what information we collect, how we use it and what rights you have in relation to it. We hope you take some time to read through it carefully, as it is important. If there are any terms in this privacy notice that you do not agree with, please discontinue use of our Sites and our services.
This privacy notice applies to all information collected through our website (such as https://cyberpi.io), and/or any related services, sales, marketing or events (we refer to them collectively in this privacy notice as the "Services").
Please read this privacy notice carefully as it will help you make informed decisions about sharing your personal information with us.


TABLE OF CONTENTS
1. WHAT INFORMATION DO WE COLLECT?
2. HOW DO WE USE YOUR INFORMATION?
3. WILL YOUR INFORMATION BE SHARED WITH ANYONE?
4. DO WE USE COOKIES AND OTHER TRACKING TECHNOLOGIES?
5. DO WE USE GOOGLE MAPS?
6. HOW DO WE HANDLE YOUR SOCIAL LOGINS?
7. HOW LONG DO WE KEEP YOUR INFORMATION?
8. HOW DO WE KEEP YOUR INFORMATION SAFE?
9. DO WE COLLECT INFORMATION FROM MINORS?
10. WHAT ARE YOUR PRIVACY RIGHTS?
11. CONTROLS FOR DO-NOT-TRACK FEATURES
12. DO CALIFORNIA RESIDENTS HAVE SPECIFIC PRIVACY RIGHTS?
13. DO WE MAKE UPDATES TO THIS POLICY?
14. HOW CAN YOU CONTACT US ABOUT THIS POLICY?


1. WHAT INFORMATION DO WE COLLECT?

Information automatically collected
In Short:   Some information — such as IP address and/or browser and device characteristics — is collected automatically when you visit our Services.
We automatically collect certain information when you visit, use or navigate the Services. This information does not reveal your specific identity (like your name or contact information) but may include device and usage information, such as your IP address, browser and device characteristics, operating system, language preferences, referring URLs, device name, country, location, information about how and when you use our Services and other technical information. This information is primarily needed to maintain the security and operation of our Services, and for our internal analytics and reporting purposes.
Like many businesses, we also collect information through cookies and similar technologies.

2. HOW DO WE USE YOUR INFORMATION?
In Short:  We process your information for purposes based on legitimate business interests, the fulfillment of our contract with you, compliance with our legal obligations, and/or your consent.
We use personal information collected via our Services for a variety of business purposes described below. We process your personal information for these purposes in reliance on our legitimate business interests, in order to enter into or perform a contract with you, with your consent, and/or for compliance with our legal obligations. We indicate the specific processing grounds we rely on next to each purpose listed below.
We use the information we collect or receive:
	To facilitate account creation and logon process. If you choose to link your account with us to a third party account (such as your Google or Facebook account), we use the information you allowed us to collect from those third parties to facilitate account creation and logon process for the performance of the contract. See the section below headed "HOW DO WE HANDLE YOUR SOCIAL LOGINS" for further information.

	To send administrative information to you. We may use your personal information to send you product, service and new feature information and/or information about changes to our terms, conditions, and policies.

	Fulfill and manage your orders. We may use your information to fulfill and manage your orders, payments, returns, and exchanges made through the Services.

	Request Feedback. We may use your information to request feedback and to contact you about your use of our Services.

	To protect our Services. We may use your information as part of our efforts to keep our Services safe and secure (for example, for fraud monitoring and prevention).

	To enable user-to-user communications. We may use your information in order to enable user-to-user communications with each user's consent.

	To enforce our terms, conditions and policies for Business Purposes, Legal Reasons and Contractual.

	To respond to legal requests and prevent harm. If we receive a subpoena or other legal request, we may need to inspect the data we hold to determine how to respond.

	To manage user accounts. We may use your information for the purposes of managing our account and keeping it in working order.
                         
	To deliver services to the user. We may use your information to provide you with the requested service.

	To respond to user inquiries/offer support to users. We may use your information to respond to your inquiries and solve any potential issues you might have with the use of our Services.

	For other Business Purposes. We may use your information for other Business Purposes, such as data analysis, identifying usage trends, determining the effectiveness of our promotional campaigns and to evaluate and improve our Services, products, marketing and your experience. We may use and store this information in aggregated and anonymized form so that it is not associated with individual end users and does not include personal information. We will not use identifiable personal information without your consent.

3. WILL YOUR INFORMATION BE SHARED WITH ANYONE?
In Short:  We only share information with your consent, to comply with laws, to provide you with services, to protect your rights, or to fulfill business obligations.
We may process or share data based on the following legal basis:
	Consent: We may process your data if you have given us specific consent to use your personal information in a specific purpose.


	Legitimate Interests: We may process your data when it is reasonably necessary to achieve our legitimate business interests.


	Performance of a Contract: Where we have entered into a contract with you, we may process your personal information to fulfill the terms of our contract.


	Legal Obligations: We may disclose your information where we are legally required to do so in order to comply with applicable law, governmental requests, a judicial proceeding, court order, or legal process, such as in response to a court order or a subpoena (including in response to public authorities to meet national security or law enforcement requirements).


	Vital Interests: We may disclose your information where we believe it is necessary to investigate, prevent, or take action regarding potential violations of our policies, suspected fraud, situations involving potential threats to the safety of any person and illegal activities, or as evidence in litigation in which we are involved.
More specifically, we may need to process your data or share your personal information in the following situations:
	Vendors, Consultants and Other Third-Party Service Providers. We may share your data with third party vendors, service providers, contractors or agents who perform services for us or on our behalf and require access to such information to do that work. Examples include: payment processing, data analysis, email delivery, hosting services, customer service and marketing efforts. We may allow selected third parties to use tracking technology on the Services, which will enable them to collect data about how you interact with the Services over time. This information may be used to, among other things, analyze and track data, determine the popularity of certain content and better understand online activity. Unless described in this Policy, we do not share, sell, rent or trade any of your information with third parties for their promotional purposes.

	Business Transfers. We may share or transfer your information in connection with, or during negotiations of, any merger, sale of company assets, financing, or acquisition of all or a portion of our business to another company.

	Third-Party Advertisers. We may use third-party advertising companies to serve ads when you visit the Services. These companies may use information about your visits to our Website(s) and other websites that are contained in web cookies and other tracking technologies in order to provide advertisements about goods and services of interest to you.

	Business Partners. We may share your information with our business partners to offer you certain products, services or promotions.

4. DO WE USE COOKIES AND OTHER TRACKING TECHNOLOGIES?
In Short:  We may use cookies and other tracking technologies to collect and store your information.
We may use cookies and similar tracking technologies (like web beacons and pixels) to access or store information. Specific information about how we use such technologies and how you can refuse certain cookies is set out in our Cookie Policy.

5. DO WE USE GOOGLE MAPS?
In Short:  Yes, we use Google Maps for the purpose of providing better service.
This website, mobile application, or Facebook application uses Google Maps APIs. You may find the Google Maps APIs Terms of Service here. To better understand Google’s Privacy Policy, please refer to this link.
By using our Maps API Implementation, you agree to be bound by Google’s Terms of Service.


6. HOW DO WE HANDLE YOUR SOCIAL LOGINS?
In Short:  If you choose to register or log in to our services using a social media account, we may have access to certain information about you.
Our Services offer you the ability to register and login using your third party social media account details (like your Facebook or Twitter logins). Where you choose to do this, we will receive certain profile information about you from your social media provider. The profile Information we receive may vary depending on the social media provider concerned, but will often include your name, e-mail address, friends list, profile picture as well as other information you choose to make public.
We will use the information we receive only for the purposes that are described in this privacy notice or that are otherwise made clear to you on the Services. Please note that we do not control, and are not responsible for, other uses of your personal information by your third party social media provider. We recommend that you review their privacy policy to understand how they collect, use and share your personal information, and how you can set your privacy preferences on their sites and apps.


7. HOW LONG DO WE KEEP YOUR INFORMATION?
In Short:  We keep your information for as long as necessary to fulfill the purposes outlined in this privacy notice unless otherwise required by law.
We will only keep your personal information for as long as it is necessary for the purposes set out in this privacy notice, unless a longer retention period is required or permitted by law (such as tax, accounting or other legal requirements). No purpose in this policy will require us keeping your personal information for longer than 6 months past the termination of the user's account.
When we have no ongoing legitimate business need to process your personal information, we will either delete or anonymize it, or, if this is not possible (for example, because your personal information has been stored in backup archives), then we will securely store your personal information and isolate it from any further processing until deletion is possible.

8. HOW DO WE KEEP YOUR INFORMATION SAFE?
In Short:  We aim to protect your personal information through a system of organizational and technical security measures.
We have implemented appropriate technical and organizational security measures designed to protect the security of any personal information we process. However, please also remember that we cannot guarantee that the internet itself is 100% secure. Although we will do our best to protect your personal information, transmission of personal information to and from our Services is at your own risk. You should only access the services within a secure environment.


9. DO WE COLLECT INFORMATION FROM MINORS?
In Short:  We do not knowingly collect data from or market to children under 18 years of age.
We do not knowingly solicit data from or market to children under 18 years of age. By using the Services, you represent that you are at least 18 or that you are the parent or guardian of such a minor and consent to such minor dependent’s use of the Services. If we learn that personal information from users less than 18 years of age has been collected, we will deactivate the account and take reasonable measures to promptly delete such data from our records. If you become aware of any data we have collected from children under age 18, please contact us at bobby.sheppard@s3gsg.com.


10. WHAT ARE YOUR PRIVACY RIGHTS?
In Short:  In some regions, such as the European Economic Area, you have rights that allow you greater access to and control over your personal information. You may review, change, or terminate your account at any time.
In some regions (like the European Economic Area), you have certain rights under applicable data protection laws. These may include the right (i) to request access and obtain a copy of your personal information, (ii) to request rectification or erasure; (iii) to restrict the processing of your personal information; and (iv) if applicable, to data portability. In certain circumstances, you may also have the right to object to the processing of your personal information. To make such a request, please use the contact details provided below. We will consider and act upon any request in accordance with applicable data protection laws.
If we are relying on your consent to process your personal information, you have the right to withdraw your consent at any time. Please note however that this will not affect the lawfulness of the processing before its withdrawal.
If you are resident in the European Economic Area and you believe we are unlawfully processing your personal information, you also have the right to complain to your local data protection supervisory authority. You can find their contact details here: http://ec.europa.eu/justice/data-protection/bodies/authorities/index_en.htm.
If you have questions or comments about your privacy rights, you may email us at privacy@cyberpi.io.

Account Information
If you would at any time like to review or change the information in your account or terminate your account, you can:
    ■  Log into your account settings and update your user account.
    ■  Contact us using the contact information provided.
Upon your request to terminate your account, we will deactivate or delete your account and information from our active databases. However, some information may be retained in our files to prevent fraud, troubleshoot problems, assist with any investigations, enforce our Terms of Use and/or comply with legal requirements.
Cookies and similar technologies: Most Web browsers are set to accept cookies by default. If you prefer, you can usually choose to set your browser to remove cookies and to reject cookies. If you choose to remove cookies or reject cookies, this could affect certain features or services of our Services. To opt-out of interest-based advertising by advertisers on our Services visit http://www.aboutads.info/choices/.
Opting out of email marketing: You can unsubscribe from our marketing email list at any time by clicking on the unsubscribe link in the emails that we send or by contacting us using the details provided below. You will then be removed from the marketing email list – however, we will still need to send you service-related emails that are necessary for the administration and use of your account. To otherwise opt-out, you may:
    ■  Contact us using the contact information provided.
    ■  Access your account settings and update preferences.
    ■  Note your preferences when you register an account with the site.

11. CONTROLS FOR DO-NOT-TRACK FEATURES
Most web browsers and some mobile operating systems and mobile applications include a Do-Not-Track (“DNT”) feature or setting you can activate to signal your privacy preference not to have data about your online browsing activities monitored and collected. No uniform technology standard for recognizing and implementing DNT signals has been finalized. As such, we do not currently respond to DNT browser signals or any other mechanism that automatically communicates your choice not to be tracked online. If a standard for online tracking is adopted that we must follow in the future, we will inform you about that practice in a revised version of this privacy notice.

12. DO CALIFORNIA RESIDENTS HAVE SPECIFIC PRIVACY RIGHTS?
In Short:  Yes, if you are a resident of California, you are granted specific rights regarding access to your personal information.
California Civil Code Section 1798.83, also known as the “Shine The Light” law, permits our users who are California residents to request and obtain from us, once a year and free of charge, information about categories of personal information (if any) we disclosed to third parties for direct marketing purposes and the names and addresses of all third parties with which we shared personal information in the immediately preceding calendar year. If you are a California resident and would like to make such a request, please submit your request in writing to us using the contact information provided below.
If you are under 18 years of age, reside in California, and have a registered account with the Services, you have the right to request the removal of unwanted data that you publicly post on the Services. To request removal of such data, please contact us using the contact information provided below, and include the email address associated with your account and a statement that you reside in California. We will make sure the data is not publicly displayed on the Services, but please be aware that the data may not be completely or comprehensively removed from our systems.


13. DO WE MAKE UPDATES TO THIS POLICY?
In Short:  Yes, we will update this policy as necessary to stay compliant with relevant laws.
We may update this privacy notice from time to time. The updated version will be indicated by an updated “Revised” date and the updated version will be effective as soon as it is accessible. If we make material changes to this privacy notice, we may notify you either by prominently posting a notice of such changes or by directly sending you a notification. We encourage you to review this privacy notice frequently to be informed of how we are protecting your information.


14. HOW CAN YOU CONTACT US ABOUT THIS POLICY?
If you have questions or comments about this policy, you may contact our Data Protection Officer (DPO), Bobby L. Sheppard, by email at bobby.sheppard@s3gsg.com, or by post to:
S3 Global Security Group LLC DBA CyberPI 
Bobby L. Sheppard
6328 Walcott Lane
Frederick, Maryland 21703
United States
HOW CAN YOU REVIEW, UPDATE, OR DELETE THE DATA WE COLLECT FROM YOU?
Based on the laws of some countries, you may have the right to request access to the personal information we collect from you, change that information, or delete it in some circumstances. To request to review, update, or delete your personal information, please submit a request form by clicking here. We will respond to your request within 30 days.