top of page

Eventus C P I
Covert Operations, Protection, Intelligence.

​

We solve your problem.
Under the radar, effective, and with global reach.

 

​

​

​

​

​
 

​

Whether we conduct covert campaigns against unfair competitors, find witnesses or people on the run, or locate hidden assets; whether we develop the evidence that an adversary operates criminally, or help companies prevent or neutralize insider threats: We focus on purpose-driven solutions — serving a select clientele as intelligence providers, security consultants, protective service, and problem-solvers.


We deploy effective methods and proven operational concepts, executed by proprietary assets and external partners whose résumés span from former special-operations personnel to practicing attorneys and bankers. When necessary, we augment our operations with other deep-connected experts from our network — from seasoned media and NGO specialists to former ambassadors and former prosecutors — to achieve the desired effects in the target(s).

 

Thereby we are embedded in  a strategic American-European network that also draws on Latin American, Asian, UK, Australian, Canadian and African capabilities. Should it become necessary to safeguard life against dangerous actors outside Austria, we will —through our US partners RSB International — activate a global network of combat-proven military veterans and other former special service members. Their experience, tactics, resources, and worldwide connections help effectively even against high-risk adversaries.

Typical clients include corporations, law firms, financial institutions, business-people, and family offices.


Disclaimer:

1. We operate under commercial licenses and private ownership. Even though some of our personnel previously served in government agencies, neither their actions nor our interventions are attributable to the relevant governmental bodies. In addition, we cooperate with specialized government agencies whenever doing so is in our clients’ interests.
2. Clients are accepted only after thorough due-diligence screening, taking into account their compatibility with our positioning, our operations and our existing client base.
3. All communications are classified at least as trade secrets. Where one of our US attorneys is involved, communications are also — where applicable — protected by US attorney–client privilege.

About Us

Approach & Services:

Three Functions, One Solution

Different threats and needs interlink. Addressing this reality, case by case we combine the three necessary functions of legal/compliance, protection, and intelligence into one compact, decisive solution. ​Particularly to serve the following purposes:

​​

Counter Threat Operations

  • Counter Intelligence (identification of internal human threats,...)

  • proactive management of threats

  • ...

​​

Asset Recovery

  • Asset intelligence and evidence collection

  • Forensic investigation

  • Support of asset collection and enforcement endeavors (such as jointly with our law firm partners: e.g. legal enforcement via cross-border asset freezing, injunctions, and recovery litigation)

  • Implementation of necessary robust measures within the scope of what is legally permissible

  • ...

​

Intelligence, Investigations, and Due Diligence

  • opposition research (e.g. against hostile competition, former business partners or litigants)

  • court and other litigation/proceedings (witness search, evidence collection,...)

  • general risk management or the countering of current threats

  • market operations

  • transactions (M&A,…)

  • recruiting

  • claims management support, asset protection&recovery

  • on-site due diligence

  • supply chain due diligence 

  • trade compliance and due diligence (OFAC, BIS/EAR, EU,…)

​​​​​

Compliance/Risk Management Projects

  • risk assessments

  • trade compliance programs

  • technology control plans

  • corporate security concepts

  • other security concepts

​

Security Operations

  • close protection for critical business occasions at home and abroad

  • courier services for sensitive commercial or technological assets

  • ...

​

Education and Training

  • management seminars (relation management towards authorities; preventing, detecting, reacting to industrial espionage and white-collar crime; export compliance best practices;...)

  • employee education (travel security, compliance processes for export functions;...)

  • training (situational awareness and behavior in dangerous situations;...)

 

All from Austria - into the world. Thanks to our strategic partner RSB International and its global network of assets and capabilities. (RSB International is an American consulting, lobbying, and private intelligence firm.)

​

​

​

​

Request your consultation call to reflect on suitable solutions via:

info@eventus-cpi.com

INDIVIDUAL

SOLUTIONS

EXPERIENCED, RELIABLE
HUMAN ASSETS

HOLISTIC

APPROACHES

GLOBAL

NETWORK

Be aware of what experience teaches us: Adversaries who operate unfairly almost always have “skeletons in the closet” and/or vulnerabilities which can be identified, analyzed, and utilized against them - in legally safe ways. It works.

​

​

The Difference Between Us and Average Service Providers – Some Examples of How the Approaches Vary

 

Whether a client faces internal threats, an aggressive competitor, or consequential litigation:

​

  • Effectively-helpful intelligence requires more than search-engine queries or ad-hoc surveillance. It demands (1) well-directed, all-source collection of raw intelligence, which is then (2) processed and analyzed to (3) produce reports that, in extraordinary situations, (a) guide decisions and actions and/or (b) provide relevant evidence.

 

  • Effectively-helpful physical protection requires more than trained personnel armed with firearms. It demands professionals who - drawing on their special-service backgrounds - (1) prepare diligently, (2) display calm professionalism at all times, (3) monitor and interpret each situation, (4) act decisively when necessary, and (5) follow reliable post-action protocols for briefing, legal protection, and related tasks.

 

  • Effectively-helpful prevention programs (such as corporate counter-intelligence programs that foster loyalty and compliance) require not just consulting, seminars, and handbooks. It demands seasoned security professionals who (1) design threat-informed frameworks that integrate relevant doctrine and clear decision authority; (2) embed continuous insider-threat monitoring, OPSEC drills, and cyber-hygiene checks to detect and deter malign actors before harm occurs; (3) cultivate a security-aware and culture through targeted training, leadership messaging, and values-based incentives that align personal conduct with corporate interests and deter non-loyal behavior; and (4) run red-team and after-action assessments that pressure-test defenses, validate resilience, and iterate the program in stride with an (adapting) threat landscape picture.

 

  • Effectively-helpful countering an aggressive competitor (who employs unethical or criminal tactics) requires not just passive measures. It demands a fully integrated, legally vetted Counter-Competitor Campaign that (1) opens with mission analysis, legal compliance guidelines, and stakeholder-preference mapping; (2) tasks multi-disciplinary cells to conduct opposition research through synchronized OSINT, HUMINT, SIGINT, and cyber sweeps; (3) processes, exploits, and analyzes the collected; (4) applies structured analytic techniques and frameworks to develop courses of action (ranging from litigation-grade evidence packages to directed media operations); (5) executes countermoves inside the rival’s decision making (“OODA loop”) while maintaining; and once action is deployed (6) feeds effect assessments and lessons learned back into the cycle, iterating defenses and offense as needed, secure, and preferred.

 

​

​

Company
& Origins:
A Conglomerate With Foresight

At times, foresight and insight command to act in advance:

What is needed today was forged years ago.

Initiated by a transatlantic Trade League, in the mid-2010s, a group of established and internationally experienced actors came together in Vienna to form a compact conglomerate (“the Conglomerate”). A personal conglomerate of well-coordinated, trusting attorneys, international trade experts, investment bankers, entrepreneurs, and (former government) security professionals. With business and operational experience in Europe, USA, Mexico, Asia, Africa and South America.​

​

Already back then did the personalities behind this conglomerate carry the insight and foresight to

  1. anticipate the coming crisis years, 

  2. derive the resulting consequences for companies and individuals, and 

  3. decided to develop a corresponding special service organization in Austria, but with global reach. 

​

To realize this decision 

​(a) the Conglomerate identified and acquired a suitable, established security and investigation company (“Eventus”), 
(b) supplemented it commercially with corporate consulting, 
(c) integrated it into its US partner network, and 
(d) developed it further in the areas of compliance, protection, and intelligence.

​

In doing so, in 2018, this conglomerate created the “Eventus CPI” with foresight.


What is now unchartered territory for most (even advanced, successful) Austrian companies - from geopolitical risks and changing compliance requirements to direct threats - is routine for the Eventus CPI. We turn your challenges into ours; then transform them into solutions.

RSB_Logo_Color.png
resultgroup_logo2.png
Picture1.png
MarliesMuhr Logo_edited.png
tfl_logo2019.png
avantgarde.png
hbbs-logo-new-01.png
Picture2.png
Picture3.png
innotronic auf hell.png

Eventus-cpi GmbH
Gölsdorfgasse 4/5

A-1010 Vienna

info@eventus-cpi.com

bottom of page