top of page

Meet The Special Investigations Unit (SIU) Director

Founder image

Founder & Director of Special Investigations Unit (SIU)

Our Founding partner has over 20 years of combined IT security and private investigative experience. She is a graduate of North Carolina Agricultural and Technical State University and has a long history in the private investigation world, first obtaining her license over 20 years ago while working with her father who owned a private investigations and security firm. Those initial years in the P.I. field involved many child-care and senior center investigations to help families identify the best placements for their loved ones, both young and old. After a few years, she had a desire to enter Corporate America and it didn’t take long for her to find a passion for IT Security. During a 15+ year career in governance, risk, and compliance, she initially worked for Fortune 500 companies and later at small startups and offered private consulting for startups. In 2013, our co-founder started her own private investigation firm, Savvy Investigations & Solutions, becoming one of only a handful of female owners of a PI firm in the State of North Carolina.

​​

In the IT Security space, she has over 15 years of analytical and regulatory compliance experience and a passion for research and investigations with strong attention to detail and a solid reputation for driving results. Her ability to organize, prioritize and work under extreme work pressure, heavy workload and deadlines has solidified her position in this space. Her focus was on governance, risk, and compliance, helping various IT organizations and software technology firms keep their business and customer data safe by building Information Security Management Systems compliant with SOC 2, ISO 27001 and FedRAMP. Earning her Certified Information Systems Auditor (CISA) designation in 2016 propelled her to Director status allowing her to manage teams of IT Security professionals with the same goals and dedication to security. 

Her extensive training and experience in IT Governance, Risk & Compliance Management along with her many years in the Private Investigations industry made her an easy choice to lead Investigate NC's Special Investigations Unit (SIU). SIU provides comprehensive computer-based investigative support for background investigations, asset searches, skip tracing, online dating investigations, case intake preparation, hidden social media accounts, and strategies to mitigate fraudulent insurance claims. Her claim to fame is her ability to reclaim information often lost in the vast sea of digital information across the web. Basically, if the data is in cyberspace, she will find it! She is fully licensed as a private investigator in the State of North Carolina, a member of the North Carolina Association of Private Investigators where she serves as Vice President of the Programs and Education Committee and a member of the National Council of Investigation and Security Services (NCISS) where she serves on the Professional Development Committee.

Our Founder is a devoted wife, doting mother, avid reader, loves to travel and plan family gatherings.​​

Training/Credential Record:

  • Introduction to Management Information Systems

  • Introduction to Networking

  • Management Information Systems

  • Legal Environment of Business

  • Computer Forensics

  • When Security Meets Privacy

  • Cybersecurity Through Cyber Maturity

  • Quantifying Cyber Risk

  • Transforming the CISO: Gaining Clarity and Control Over Your Enterprise Cybersecurity Program

  • How to Successfully Prepare for Security and Compliance Certifications

  • Security Secrets: Defining Success for Security Teams

  • Enabling Cybersecurity Accountability for the Enterprise

  • 4 Steps to Navigate Insider Risk

  • Microsharding: Defense in Depth for Data

  • Cyber Threats, Trends & Mitigation

  • Data Protection for Cloud-first Organizations

  • Get Ahead of Your Audits

  • Five Lean Principles of Collaboration for Enhanced Product Security

  • The 4 Pillars of Active Directory Security

  • Reporting Cybersecurity Risk to the Board of Directors

  • Risk Management in Action: 4 Key Pillars for Achievable Resilience

  • Exploring Privacy Trends, Challenges & Predictions

  • Beyond the Alerts: What to Focus on When You Detect Alerts

  • Best Practices for Securing E-Commerce Sites

  • Key Components of a World-Class Cybersecurity Management Program

  • Data Protection in the Cloud

  • ​​Security & Privacy Compliance in Work from Home Situations

  • Mastering Cybersecurity Asset Management: Once and For All

  • All Roads Lead to Risk

  • Introduction to the Risk IT Framework

  • Insider Risk: Managing the Delicate Balance of Trust and Privacy​​

  • Using Security Automation to Better Adapt in Challenging Times

  • Fix a Critical Hole in Your Security Posture

  • The Human Factor: Malicious Insiders vs. Negligent End Users

  • Mitigating the Security Risks of a Remote Workforce During a Crisis

  • From Risk to Resiliency: Harnessing Foresight for Transformative Cybersecurity Programs

  • Supply Chain Risk: Reduce Your Exposure

  • Time matters: Proactively prepare for and respond faster to business disruptions

  • Data protection – it’s all about people!

  • The Future of Cloud Threat Detection, Investigation & Response

  • Unify Third-Party Risk and Cybersecurity for Sustainable Resiliency

  • Build Trust through Risk & Controls

  • Combatting Business Email Compromise

  • Bringing Privacy to the Security Table

  • Strategies to Mitigate IT Risk for Your Most Pressing Challenges

  • Compliance as a Catalyst for Reducing Risk

  • Third-Party Risk Deep Dive: Calculating Inherent Risk

  • How to Successfully Prepare for Security and Compliance

  • NC Close Personal Protection Course (Executive/Dignitary Protection), 360 Protection Group 

  • Enabling Cybersecurity Accountability for the Enterprise

  • Risk Management in Action

  • Exploring Privacy Trends, Challenges & Predictions

  • Expert Content + Third-Party Risk = Enhanced Vendor Due Diligence

  • Create a Vendor Risk Management Program

  • The Human Factor: Malicious Insiders vs. Negligent End Users

  • American Heart Association (AHA) Basic Life Support (BLS) CPR, AED & First Aid Certification

NC Association of Private Investigators Annual Conference:

  • Attended: 2024, 2025​​

We Realize The Hardest Part Is Getting Started

Contact Us

Call us now to speak to a professional. We are here 24/7 to accommodate your needs. We are professional, compassonate and ready to assist you!

  • Instagram
  • Facebook

Follow Us On Social Media

Open 24 Hrs A Day, 7 Days A Week

Share Your Concern Privately & We Will Contact You!

Service Needed

Mailing Address:

Investigate NC

476 Shotwell Road

Suite 102-276

Clayton, NC 27520

Investigate NC Business Permit Number (BPN) #112799M

George Porter Private Investigator License #: 315827

Close Personal Protection (CPP) License #: 567629-CPP

Dionne Porter Private Investigator License #: 805996

Close Personal Protection (CPP) License #: 365903-CPP

  • Instagram
  • Facebook
SSl Secure connection logo. make websites secure

©  2026 Investigate NC

Legal Notice & Information:

 

The information provided by this site is for general information purposes only. We are not attorneys and the information provided should never be taken as legal advice. Consult an attorney for legal advise and representation.

 

We do our best to keep the information on this website up to date, but we can make no representations, warranties or guaranteed outcomes of any kind, expressed or implied, about the completeness, accuracy, reliability, suitability, or availability with respect to the website or the information, products, services, or related graphics contained on the website for any purpose.

Plagiarism will result in legal prosecution and civil liability.

bottom of page