Home What We Do How We Work For Advisors Engagements Who We Are Contact

Engagements

What the work looks like
at the level we operate.

A note on these vignettes

Anonymized, composite,
and intentionally non-specific.

Gatehaus does not publish case studies. We do not name clients, we do not characterize specific engagements in identifiable terms, and we do not allow the structure of one client's situation to be inferred from the public record.

The vignettes below are composites — drawn from patterns we encounter across multiple engagements rather than reproductions of any single matter. Identifying details have been altered, combined, or omitted. The purpose is illustrative: to show what kinds of situations we are equipped to handle and what the engagement looks like from the outside. If one resembles your situation, that resemblance is the design, not the disclosure.

i.

Private Client

The art-dealer invoice

A routine invoice from a known art dealer landed in the family office’s inbox. Everything matched the recent acquisition: amount, timing, tone, even the small idiosyncrasies of past correspondence.

The wire instructions, however, had been changed — subtly. The new account routed through a jurisdiction the dealer had never used. The accounts payable lead nearly authorized the wire on familiarity alone, then paused on the routing change and called the dealer directly.

The dealer’s account had been compromised weeks earlier. A near-identical attempt had already succeeded against another of his clients. We coordinated remediation with the dealer, briefed the family’s counsel, and deployed out-of-band verification protocols for any wire above a defined threshold — including a codeword framework for time-sensitive transactions.

No funds were lost. The protocols have prevented two further attempts in the eighteen months since.

Client type Family office serving multi-generational UHNW family Engagement Existing retained client, BEC remediation and ongoing monitoring Services Strategic Crisis Counsel; Security Architecture & Advisory; Family & Staff Risk Education
ii.

Private Client

The pre-IPO disclosure

A founder approaching a public listing realized, in the diligence cycle, that the visibility of the upcoming filing would reset their digital exposure profile in ways their counsel had not yet considered.

A public filing would surface board affiliations, residence locations, family identifiers, and historical compensation — aggregating into a comprehensive adversary targeting profile. The founder’s wealth advisor reached out, recognizing that posture needed to be in place before the filing, not after.

We had nine weeks. Discovery covered the founder, immediate family, household staff, and three residences. We executed remediation across the major data brokers, hardened the personal device fleet, deployed verification protocols for the household, and established baseline threat intelligence on the founder’s identifiers and the company’s sector.

Two weeks after the filing, a credential dump containing matched identifiers surfaced. The intelligence collection caught it within hours; the architecture absorbed it without incident. The founder transitioned to ongoing retained relationship.

Client type Founder of late-stage technology company approaching IPO Introduction Through wealth advisor at private bank Services Digital Identity & Exposure Management; Threat Intelligence & Monitoring; Security Architecture & Advisory
iii.

Enterprise Advisory

The board with a question

The risk committee of a mid-cap financial services company had begun receiving cybersecurity briefings from internal leadership that satisfied none of them.

The reports were technically accurate but strategically opaque. Directors could not tell whether the program was world-class or under-invested. They could not tell whether the CISO was being honest or filtering. What they wanted, and could not articulate, was an independent voice in the room.

The board chair engaged Gatehaus in a Board Advisor capacity: attend the quarterly risk committee, prepare independent pre-meeting briefs on every cybersecurity matter, and represent the questions directors did not yet know to ask. We worked openly with the internal CISO from day one. Over the first year we facilitated three substantive program shifts the board had been unable to drive directly.

The CISO has since described the engagement publicly as the most productive board relationship in their tenure. The committee renewed in year two with expanded scope.

Client type Public mid-cap financial services company Introduction Through audit committee chair Services Board Advisory & Board CISO; Security Program Assessment
iv.

Legal — Confidential

The deposition that wasn’t about technology

In a complex commercial matter, opposing counsel had taken a position grounded in a forensic analysis the engaging firm could not, on first reading, evaluate. The expert deposition was three weeks out.

The matter was not principally technical — a contract dispute — but a single forensic finding, if accepted, would shift the case substantially. The firm had no in-house technologist and was reluctant to retain a testifying expert this early; once retained, the expert would be discoverable, and counsel wanted freedom to evaluate the question first.

We engaged under privilege through the firm. Non-testifying, structured to remain so. We evaluated the opposing expert’s methodology, identified two unstated assumptions the analysis depended on, surfaced a third-party data source that contradicted the timeline reconstruction, and prepared a cross-examination memorandum. The engagement closed at the deposition.

The forensic finding was substantially undermined on cross. The matter resolved at a settlement materially better than the firm’s pre-deposition assessment.

Client type Litigation firm representing principal in commercial dispute Privilege Engagement letter between Gatehaus and law firm; work product to counsel only Services Legal Technical Advisory

Every Gatehaus engagement — including the engagements described in composite above — is conducted under non-disclosure. We do not name our clients, characterize identifiable details of their matters, or grant interviews about our work. The vignettes above exist to give the reader a structural picture; nothing more.

The First Conversation

A confidential conversation, before anything else.

NDA before any substantive discussion. The first conversation is with the senior advisor directly — held to determine fit, scope a possible engagement, and answer your questions in confidence.

Begin a Conversation