Pete Herzog

CEO

United States26 yrs 5 mos experience
Most Likely To SwitchAI Enabled

Key Highlights

  • Over 30 years in cybersecurity and digital forensics.
  • Co-founder of ISECOM and creator of OSSTMM.
  • Expert in high-stakes asset recovery and executive protection.
Stackforce AI infers this person is a cybersecurity expert specializing in digital forensics and AI security solutions.

Contact

Skills

Core Skills

Digital ForensicsEvidence CollectionAi SecuritySecurity AnalysisSecurity Methodology DevelopmentRisk ManagementSecurity ResearchSecurity ManagementSecurity Writing

Other Skills

CybercrimeFraud InvestigationsCryptocurrencyElectronic EvidenceAssets RecoveryArtificial Intelligence (AI)Applied Machine LearningCybersecurityProduct DevelopmentHackingThreat AnalysisPrivate InvestigationsSecurity OperationsInformation SecuritySecurity Audits

About

Digital Investigator & Evidence Specialist | High-Stakes Asset Recovery | Executive Protection | Co-Founder, ISECOM & OSSTMM I solve the "impossible" technical problems that arise in high-stakes legal, personal, and financial crises. With over 30 years in the trenches of cybersecurity from co-founding ISECOM and creating the OSSTMM to pioneering AI security at Urvin.ai, I have spent my career defining the laws of system persistence and defense. Today, I apply those universal principles to the most sensitive, discrete cases for high-net-worth individuals, executives, and law firms. I am the "tech magician" hired when standard security measures fail. Whether it is uncovering an anonymous attacker, recovering lost crypto assets, or finding the "dirt" hidden deep within evidence, I provide the results that legal teams and private clients require but cannot find elsewhere. Core Capabilities for Law Firms & HNWIs: Digital Forensics & Evidence Collection: Forensic-grade recovery of electronic evidence with a strict chain of custody for court cases at scale. Media Restoration & Analysis: Advanced "clean-up" of audio and photos to reveal critical details or unmask deepfakes. Asset & Crypto Recovery: Tracking and recovering assets lost to fraud, scams, or complex digital theft. Counter-Infiltration & Unmasking: Hunting down anonymous attackers, scammers, and extortionists through advanced OSINT and infiltration techniques. Discrete Executive Protection: Specialized digital "sweeps," reputation management, and containment of cyber-extortion or blackmail. I operate with a philosophy of "Hack everything, harm none," combined with the absolute discretion required for high-profile cases. When the opposition thinks they've covered their tracks, I find what they missed. Let’s discuss your case. Discretion is guaranteed.

Experience

26 yrs 5 mos
Total Experience
4 yrs 11 mos
Average Tenure
25 yrs 3 mos
Current Experience

Hilltop cybersecurity

CISO

Aug 2018Feb 2019 · 6 mos

  • Manage internal security controls. Provide timely security analysis on products and market. Apply bleeding edge security research to product development. Provide long-term business strategy in target markets.
HackingSecurity Management

Cryptomove

Security Analyst

Jun 2018Apr 2019 · 10 mos

  • Providing security analysis for the Cryptomove product implementation and market with a special focus on IoT and SmartCity projects.
HackingSecurity Analysis

Isecom labs

Managing Director & Lead Investigator

Jan 2018Present · 8 yrs 3 mos

  • Leading a specialized unit focused on advanced technical support for corporate and personal security. Specialization: Electronic personal protection, digital clean-up, and evidence collection for law firms. Impact: Developed proprietary AI tools for object/person detection and audio forensics to expedite complex investigations. Service: Facilitated the unmasking of anonymous attackers and successfully managed cyber-extortion containment for prominent figures.
CybercrimeFraud InvestigationsCryptocurrencyElectronic EvidenceAssets RecoveryDigital Forensics+1

Urvin ai

Co-Founder & Head of AI Security R&D

Apr 2017Jan 2024 · 6 yrs 9 mos · Philadelphia, PA, USA · Remote

  • Pioneering the intersection of AI and security. Developed frameworks for AI security and ethics, ensuring that complex automated agents remain within "Intent-phase" boundaries. Applying AI-driven analysis to digital forensics, allowing for the processing of massive datasets to find "the needle in the haystack" for legal discovery.
Artificial Intelligence (AI)Assets RecoveryApplied Machine LearningCybersecurityProduct DevelopmentAI Security+1

Cujo

Security Analyst

Dec 2015May 2016 · 5 mos

  • Security research and analysis for home cyber security solutions.
Threat AnalysisSecurity Writing

Veracode

Security Writer and Commentator

Sep 2015Dec 2017 · 2 yrs 3 mos

  • http://www.veracode.com/blog
Threat AnalysisSecurity Writing

Prospus llc

Security Advisor

Sep 2015Dec 2017 · 2 yrs 3 mos

  • Provide security analysis for the Prospus products and advise in company decisions.
HackingThreat AnalysisSecurity Analysis

Signal sciences

Security Writer

Jan 2015Jan 2016 · 1 yr

  • http://www.signalsciences.com
HackingSecurity Research

Risk based security

Security Researcher

Nov 2014Jan 2018 · 3 yrs 2 mos

  • Research and commercialize security metrics and analysis techniques.
Threat AnalysisSecurity Research

Picus security

Security Advisor

Apr 2014Dec 2023 · 9 yrs 8 mos · Ankara, Turkey

  • Provide security analysis for the Picus product and advise on company decisions.
HackingThreat AnalysisSecurity Analysis

Esade business & law school

Professor

Jan 2006Jan 2008 · 2 yrs · Barcelona Area, Spain

  • Taught Business Information Security for the MBA program

La salle campus barcelona

Professor

Jan 2003Jan 2009 · 6 yrs · Barcelona Area, Spain

  • Professor of Information Security teaching penetration testing and security analysis.
Threat AnalysisSecurity Writing

Isecom - the institute for security and open methodologies

Managing Director, Lead Researcher, Co-Founder

Jan 2001Present · 25 yrs 3 mos · Barcelona

  • As the co-founder and Managing Director of this global security research organization, I lead the development of the methodologies used by governments and elite security teams worldwide to quantify and manage risk. My work centers on solving "unsolvable" security problems by applying the laws of physics and information theory to digital environments.
  • Methodology Architect: Created and maintain the OSSTMM, the world’s most trusted standard for scientific security testing. This framework provides the mathematical rigour I use to ensure evidence collected in private cases is immutable and defensible.
  • Global Influence: Manage a community of 10,000+ security professionals and oversee the gold-standard certifications for professional hacking, trust analysis, and security testing.
  • Elite Problem Solving: Lead ISECOM’s specialized consulting wing for high-profile private research initiatives. I am frequently brought in by corporations and law firms to handle complex "gray-hat" scenarios, deep-dive investigations, and sophisticated threat unmasking.
  • Specialized Training: Serve as a subject matter expert and trainer for internal seminars at Fortune 500 companies, focusing on the physics of persistence and advanced investigative techniques.
  • Content Authority: Oversee the creation of Hacker Highschool and other educational initiatives, ensuring that the next generation of analysts understands the "Narrative" and "Force" of security interactions.
HackingDigital ForensicsPrivate InvestigationsEvidence CollectionSecurity OperationsSecurity Methodology Development+1

Ibm

Ethical Hacker

Nov 1997Jan 1999 · 1 yr 2 mos · Mannheim and Heidelberg, Germany

  • Original member of the first EMEA Ethical Hacking team under the E-security department. Daily work consisted of penetration testing, ethical hacking, and managing clients. Responsibilities consisted of managing the emergency line and travelling throughout EMEA and the USA to handle a client's security crisis.

Education

Utica College of Syracuse University

Bachelor of Arts (B.A.) — Information Sciences - Literature

Jan 1988Jan 1993

Queensbury Senior High School

Regents Diploma

Jan 1984Jan 1988

Stackforce found 100+ more professionals with Digital Forensics & Evidence Collection

Explore similar profiles based on matching skills and experience