Frequently Asked Questions
Quick answers about cybersecurity consulting, digital investigations, expert witness support, confidentiality, and how to work with JDI Consulting. For matter-specific advice, request a consultation.
About JDI Consulting & who we serve
What is JDI Consulting?
JDI Consulting is a cybersecurity and digital investigation consultancy focused on evidence-based technical analysis - including structured, DFIR-style review of logs and artifacts where appropriate - plus OSINT, network and infrastructure indicators when data supports them, and plain-language reporting for people who are not engineers. Engagements are documented for clarity and defensibility.
Who typically hires JDI Consulting?
Clients include attorneys and law firms, law enforcement and investigators (in a support capacity), organizations handling sensitive incidents, and individuals involved in cyber-enabled criminal and civil matters such as harassment, stalking, impersonation, or account compromise. JDI Consulting does not provide legal representation or legal advice.
How do you work with clients in different regions?
Work is typically conducted remotely using secure channels agreed at intake. On-site coordination is arranged only when scope and the matter require it. Logistics depend on jurisdiction, lawful process, and client needs - not on a public office location.
What makes JDI Consulting different from a general IT provider or MSP?
JDI Consulting is not a managed IT provider or break-fix shop. The focus is investigative and advisory: reconstructing events from technical evidence, reducing spoliation risk, correlating artifacts across platforms, and explaining findings for legal and non-technical audiences - not day-to-day desktop support or commodity hosting.
Services, scope & investigations
What are digital investigations in this context?
Digital investigations typically involve reviewing available logs, exports, metadata, mobile or platform artifacts, communications, PCAP or network material when lawfully available, and open-source information to build a structured picture of what occurred, when, and through which accounts or systems - including identity theft, compromise, and abuse scenarios. The goal is defensible analysis tied to the data, not speculation.
What technical skills and experience inform investigations?
The practice draws on full-stack engineering, systems and infrastructure operations (including managed-services-style environments), and applied security: log forensics, timeline reconstruction, OSINT, malware and malicious-domain analysis, network traffic review when captures exist, secure application and API assessment, automation and custom tooling, and technical writing for counsel and investigators. Not every skill applies to every matter; scope defines what is in bounds.
What does cybersecurity consulting cover at JDI Consulting?
Consulting is oriented toward practical risk reduction after incidents or near-misses: account and access hygiene, configuration guidance, threat modeling at an appropriate level, and recommendations to reduce repeat compromise. It does not replace a 24/7 security operations center or continuous managed detection for all assets.
What is OSINT and how is it used responsibly?
Open-source intelligence (OSINT) means collecting and analyzing publicly available information to support an investigation - within ethical and legal boundaries. JDI Consulting avoids intrusive or unauthorized collection and documents sources and limitations so results can be reviewed by counsel or investigators.
Can JDI Consulting access private messages or accounts without authorization?
No. Analysis relies on data clients or platforms lawfully provide, lawful process where applicable, and public sources. The firm does not “hack” accounts or bypass authentication. If data is not legally available, that constraint is explained explicitly in scoping and reporting.
Do you offer penetration testing, red teaming, or 24/7 SOC services?
Those services are outside the typical scope of JDI Consulting. The practice emphasizes investigation, advisory consulting, and reporting. If you need specialized offensive security or full-time monitoring, referrals or co-counsel with appropriate providers can be discussed when relevant.
Legal proceedings, expert witness & confidentiality
Does JDI Consulting provide legal advice?
No. Services are technical consulting and investigation support only. Strategy, pleadings, and legal conclusions are for licensed attorneys. Findings are framed as technical observations and documented analysis to inform legal and investigative decision-making.
What is the role of a certified expert witness?
A qualified expert may provide independent technical opinions, written reports, or testimony when retained for a matter and where procedural rules allow. Whether someone is accepted as an expert in a given proceeding is decided by the court or tribunal, not by self-description alone. Engagements are scoped in writing.
How is confidentiality handled?
Matter details are treated as sensitive. Communications and work product handling follow practices discussed at intake, including limitations on redistribution of materials. Specific obligations may also be governed by counsel, protective orders, or agreements you put in place.
Can investigative findings be used in court?
Technical summaries and documentation are often prepared so attorneys can evaluate admissibility, foundation, and strategy. Whether particular evidence or testimony is admitted depends on jurisdiction, rules of evidence, and how the record is developed. JDI Consulting does not guarantee any specific litigation outcome.
Engagements, deliverables & getting started
How do engagements usually start?
They typically begin with an initial consultation to understand objectives, urgency, available data, and constraints. A written scope outlines deliverables, timelines, and assumptions. Work proceeds in phases - intake, preservation guidance where needed, analysis, and reporting - with checkpoints as appropriate.
What kinds of deliverables should I expect?
Deliverables may include structured written reports, timelines, exhibit-style explanations, tables correlating events, and briefing materials suitable for counsel or investigators. Formats are agreed in scope so expectations stay clear.
How are fees structured?
Fees depend on complexity, urgency, and deliverables. After scoping, you receive clear terms before work begins. There are no surprise “automatic” retainers beyond what is agreed in writing.
How quickly can you respond?
Urgent matters are triaged honestly: if capacity or the nature of the request does not fit, that is stated up front. Response time also depends on data availability and third-party cooperation, which are not always controllable.
How do I request a consultation?
Use the Contact page on this site to describe your situation at a high level (without sending sensitive secrets in the first message). You will receive guidance on secure next steps and whether the matter is a fit for services.
Where can I read more between consultations?
The Insights section publishes educational articles on cybersecurity and digital investigations. The FAQ page is a starting point for common questions; it does not replace a scoped engagement for your specific matter.
Did not find what you need? Request a confidential consultation to discuss your situation and whether services are a fit.
Contact JDI Consulting