Christopher Salgado is a highly accomplished and trusted security and investigations leader with more than 19 years in cyber and physical investigations as well as security. Throughout his career, he has effectively assisted several companies, including Fortune 50 companies, in various capacities, including via the installation of numerous innovative and efficient processes in the topics of investigations, security, brand protection, threat management, business continuity, intelligence, operations, recruiting, customer service, employee morale and leadership. The companies that have benefitted from his services span across the spectrum of industries, including social media, pharmaceutical, luxury brands (clothing, jewelry, etc.), consumables, automotive, electronics, film production, streaming services, entertainment and insurance. He has also assisted investigations firms and law firms across the globe.
From 2016 through 2019, Christopher Salgado worked at Facebook as an investigator. He began his tour with Facebook as a contractor and then succeeded at becoming an employee at Facebook. During his tenure there, he grew from the role of an investigator to a global investigator to a team lead. Situated on a very talented global team, he assisted in managing investigations and operations and was instrumental in building the investigations division. His efforts included drafting a large majority of investigative standard operating procedures (SOPs), installing new security operations, updating prior SOPs and operations with efficient standards and helping to stand up a new global, 24/7/365 investigations and intelligence operation from scratch. He also aided in managing several other security and investigative-themed projects, including prototype security, supply chain security, video analytics, global security camera systems, operational security, process efficiency, data center threats and general threat management, among others.
Salgado also assisted Facebook’s security operations centers across the globe with varied threats. His achievements allowed him to aid the team in expanding Facebook’s security and investigations’ book of business interdepartmentally and geographically. During the time when Christopher Salgado was at Facebook, news about Cambridge Analytica broke as did the allegations of Russians hacking the Facebook platform to intervene in 2016’s US elections. Christopher Salgado was able to support in those sensitive and highly visible incidents as well.
Prior to his career in investigations and security, Christopher Salgado, exceled at delivering successful, professional engagements with customers through varying roles at different companies. He secured more than a dozen of various outstanding customer service awards and a quarterly department award for new process implementation. These experiences allowed him to drive a “customer-first” focus, reinforcing the customer-centric agendas of global corporations.
He has significant experience in director-level management of persons and global operations in corporate risk; brand protection; supply chain; criminal and civil investigations; surveillance; SIU investigations as well as counterfeit and other trademark investigations. He is an expert social engineer who has overcome a multitude of challenging obstacles and amassed critical information that resulted successful conclusions for his clients.
Salgado is described as a transformational leader who promotes loyalty to the client, team, company and cause. He is skilled at managing large teams of investigators, intelligence analysts and support staff cross-culturally and across time zones. He is an expert in investigations, court testimony and counterfeit detection. He is a global consultant and has presented to members of Europol, Interpol and the EU Commission on physical and cyber investigations. As an investigator, Christopher Salgado has collectively conducted, managed and trained on tens of thousands of investigations, including:
• Cyber: Phishing, bad actor tracking, dark web, computer forensics, identity theft, fraud
• Brand Protection: Raids, covert purchases (cyber & physical), market sweeps, website takedowns, gray market
• Corporate: Missing persons, threats, harassment, misconduct, theft, supply chain, shrinkage
• Criminal: Deaths, kidnapping, burglaries, arson, fraud, counterfeit
• Civil: Vehicle accidents, general liability, mold, residency verifications
• Surveillance: Worker’s compensation, high risk terminations, counterfeit, fraud, infidelity
• SIU: Witness locates, asset locates, interviews, contestable death cases, scene investigations
Prior industry roles include Investigations Center Team Leader and Global Investigator @ Facebook, Midwest Regional Director, Director of Training, Lead Investigator, Director of Security, Associate Director of New Business Development, Private Investigations Trainer, Lead Investigator, Private Investigator, Security Content Analyst & Acting Department Manager at various corporations as well as investigative and security consulting firms.
Reinforce what modern experts and industry statistics are calling the weakest link in your layered security apparatus: the human involvement (employees). Social engineering is known to have been successfully deployed in >95% of cyberattacks. Avoid throwing away your security investments with untrained employees who can be victimized by the next well-crafted social engineering plot, including pretexting, vishing, smishing, phishing, water hole attacks, whaling and tailgating. Social engineering is no longer reserved for the banking industries and is one of the easiest channels for bad actors to gain access to your sensitive data. As such, it is reported to have increased by significantly and especially targeting remote workers where security infrastructure may be much less enforced. Inform your employees to question everyone. Escalate awareness into action on behalf of your company’s safety and their own.
Whether you’re looking to install a new process or refine a current investigative operation for your company/organization, these taught resources and methodologies are not ones to be dismissed for any effective program. Learn the latest tips, tricks, resources and methodologies for your comprehensive cyber investigations program. This includes OSINT and non-OSINT parameters, including threat management, report writing, drafting standard operations procedures, promoting intra-departmental buy-in, obtaining/enhancing partnerships with SOCs, global outreach, hiring investigative and support staff, standard documentation, avoiding liability in your investigative operation, online attribution, managing the operation and many more.
Whether you’re looking to install a new process or refine a current investigative operation for your company/organization, these taught resources and methodologies are not ones to be dismissed for any effective program. Learn the latest tips, tricks, resources and methodologies for your comprehensive physical investigations program. This includes threat management, interviews, interrogations, report writing, drafting standard operations procedures, promoting intra-departmental buy-in, obtaining/enhancing partnerships with SOCs, global outreach, hiring investigative and support staff, standard documentation, avoiding liability in your investigative operation, covert engagements, online attribution, managing the operation and many more.
During your AGGOSO™ training, you will experience an aggressively enhanced education on how to conduct an escalated level of cyber investigations, differing from traditional online investigations. The purpose of AGGOSO™ training is to enable you with the capabilities to escalate your level of proficiency in cyber investigations. This training will cover content from both the surface/clear web as well as the deep web. This in-demand training is the culmination of many years of learning and deploying deep cyber investigations for global companies seated on Fortune’s lists, including Fortune 50. Incorporating these tactics and resources can quickly springboard the online investigator into a well-oiled machine of diligence and efficiency. Learn to master OSINT and non-OSINT investigations, including social media, online forums, dump sites, historical information, geolocation with and without metadata, image searching with facial recognition software, hidden websites, hidden website content, decoding HTML code, subject name variation searching, Google Dorking and boolean strings, Google alerts and other automation resources, data scraping tools, browser plugins, effective free tools and paid-for tools and many more. You’ll also learn about ensuring your online attribution and ethical dilemmas with online investigations as well as the importance of maintaining relevance with your investigative program.
Learn how to extract and assess your online footprint to minimize your online safety. Dismantle pathways that lead online stalkers, cyberbullies or hackers, to your front door in the real world by taking down your personal information from numerous websites. Although this program is intended for anyone (personal or professional), many targets of online exploitation, such as doxing and swatting, are C-Suite persons, politicians, industry and organizational leaders, celebrities, known authors and many more. Modern times have confirmed that these pointed tactics are rising exponentially, whether it is a trigger to a subsequent cyber attack against a company or organization or a preface to an inbound personal attack against someone for various reasons. Learn how to identify and retract your personal information from exposure as much as possible and minimize the probability of a potentially costly attack on your finances, brand or safety.
Show More Show Less
Contact us to get Christopher Salgado's fees and availability for your next event
One of our consultants will get back to you soon