We provide prompt professional litigation support to law firms, corporations, and private individuals.
Virtual Security Director Program®
We provide our clients a wide range of protection strategies that include Executive Protection (EP), Personal Security Detail (PSD) or Dignitary Protection.
“I engaged Kathy Leodlers’ services as a private investigator to conduct witness interviews in a complex employment matter. Kathy performed detailed interviews of witnesses in a professional and efficient manner. She also followed up with witnesses who were difficult to track down. Kathy was instrumental in assisting our firm in resolving this situation and provided us with substantial time savings at reasonable rates. I would refer Rampart Group to any attorney who is seeking to save time and add value to case evaluation.” Read More...
“We were looking for a private investigator to assist us with defendant location and assets after he caused serious injuries to our client. This individual was out of state and Kathy’s professional approach provided exactly what we needed. Not only was she “boots on the ground,” her broad investigative review of his environs gave us additional information that even seasoned investigators might miss. Kathy and Paul’s expert work on several past cases is why we continue to work with Rampart Group, and why we have referred this company to colleagues whose feedback, all positive, supports our continued experience.”
“I just wanted to thank you for the great article on parking lot safety in your latest blog. I forwarded it to my niece, sister-in-law, friends, etc., and encouraged them to pass it on as well. Although my mom wasn’t in law enforcement, you would have thought she was as she “hammered” tips like yours into my brain growing up…probably unwittingly leading me to a career in law enforcement.”
Using ESRM to Gain a Seat at the TableFor more than half of a decade, ESRM has increased in popularity among security practitioners; however, figuring how to introduce this methodology into an organization unfamiliar with it is not always the easiest task to accomplish.
Protecting Corporate Data on Employee-Owned Mobile DevicesImagine an employee is working from a local coffee shop. Without a secure device, a malicious actor can gain unauthorized access to private or proprietary information, with potential damage to the employee or even the entire organization.
How to Build a Trauma-Informed Workplace
Given the ubiquity of trauma in the world, some experts are calling on employers to develop “trauma-informed” workplaces.
Strategies for Today’s Insider Threat Environment
Insider threats continue to be top of mind. No one is immune to insider threats; they are some of the most difficult attacks to detect, defend against, and manage.
The past six months have brought massive layoffs across the technology sector worldwide. But when such seismic personnel shifts occur, they inevitably spur ill will.
Extremism Against Places of Worship
Hostage situations. Graffiti and vandalism. Gravestones toppled. Active shooters. Bombings. Extremists are becoming more brazen in their tactics and more expressive in their ideologies, committing acts of violence
Sometimes corporate leaders will spend too much time in the boardroom debating what to do about a crisis, delaying critical responses. Having a plan in place enables strategic decisions to be made in the moment,
Since the onset of the Russian invasion of Ukraine, thousands of individuals and their families in the region have been evacuated to safety. Now, companies are learning from the lessons of Ukraine and, importantly, that threats to their employees can happen anywhere and anytime.
The complexity and high-risk scale of active shooter situations warrant a multidimensional response.
Cyber Response Plan Needs These 6 Components
Cybersecurity incidents are no longer a matter of if, but when. Every organization must have a plan for what they will do in both their (IT) and (OT) in case an incident occurs.