Frequently Asked Questions

LegacyGuard from California Trust and Legacy

Frequently Asked Questions


Common questions about how LegacyGuard works, what it includes, what it does not include, and what custody we take of your information. If your question isn’t answered here, the fastest way to get a real answer is a fifteen-minute call.

General


Do I need to be a CTL trust client to use LegacyGuard?

Yes, during the launch phase. General availability is planned, but at launch LegacyGuard is offered exclusively to CTL estate-planning clients. The simplest path in is a 15-minute conversation with Bryan, where we can talk about your situation and whether the timing makes sense.

What does an engagement actually involve?

A 15-minute discovery call to confirm the fit, an assessment session where we map your accounts and devices, two to four weeks of configuration and migration work, a household-wide onboarding so every member of your family knows the protocol, and an annual relationship review thereafter.

How long does setup take?

Two to four weeks for most families. Larger or more complex households can run five to eight weeks. We do not rush this work. Setup speed is rarely the binding constraint; family schedules are.

Where does this work happen?

Mostly remotely with several in-person sessions, depending on where you are. Our home base is Walnut Creek; we travel within the East Bay without a separate fee, and quote travel for engagements beyond.

Who do you work with?

Affluent families based mainly in the East Bay and the broader Bay Area. Households generally have between five and twenty-five million dollars in assets, self-managed financial complexity, an active relationship with a wealth manager and CPA, and a desire to keep that relationship under control as the threat landscape changes.

Scope


What is actually delivered?

Five components, configured for your household: a password manager and two-factor authentication setup; a documented family threat model and heir access protocol; an estate-document vault; physical hardware (security keys, hardware wallets where applicable, fireproof storage, recovery seed plates); and a verification protocol against AI-generated impersonation. The service page describes each in more detail.

What is not delivered?

We do not run an ongoing security operations center. We do not monitor your accounts or devices in real time. We do not respond to incidents twenty-four hours a day. We do not sell credit-monitoring or identity-monitoring subscriptions. We do not provide cybersecurity legal counsel.

Why don’t you do monitoring?

Two reasons. First, monitoring services for households at this tier are commodities — there are good ones already in market and we will not duplicate them. Second, the failure mode for monitoring is silent: a family pays a monthly fee for a service that may or may not actually catch anything, and the service has no way to be accountable for missing what it missed. We prefer to harden the front door so that less needs to be monitored, and to keep our scope honest.

Do you handle incident response?

No. If something is actively going wrong — a fraudulent wire is in motion, an account is locked, an attacker has live access — that is a different specialty with a different cost structure. We will refer you to a vetted incident-response firm. Some engagements include a referral relationship with a retainer firm as part of the setup.

Custody and control


Do you take custody of any of my information?

No. The hardware lives at your home, in your control. The passwords live in your password manager, encrypted with a key only you know. Recovery phrases stay with you. We are configurators and trainers, not a custodian of credentials.

What if I lose access to something you helped me set up?

Recovery procedures are designed into every component during setup, and they are documented in your engagement materials. Where applicable we configure backup hardware keys and backup recovery codes. We will help you walk through a recovery — but we do not have a copy of your master password or your recovery phrases, and that is intentional.

What happens to my LegacyGuard configuration when I die?

That is the heir access protocol, and it is one of the five components. We document where each piece lives, who is authorized to retrieve it, and what proof of identity is required. If you have a CTL trust, we integrate this with your trustee instructions.

Pricing and engagement


How much does this cost?

LegacyGuard is scoped against your family’s specific configuration during the Strategic Planning Session. Price varies with the number of household members involved, the number of accounts and devices, whether cryptocurrency is in scope, and how integrated you want the work to be with your trust. We do not publish a tier menu because the menu is genuinely custom.

Why isn’t there a fixed price?

A fixed price means either we under-scope and produce a thin engagement, or we over-scope and overcharge the smaller households. Neither is honest. We quote after the assessment session, and the quote includes the work itself, the hardware, and the family onboarding.

Do you offer ongoing support?

Yes. The annual relationship review revisits the configuration, refreshes any credentials that need refreshing, walks through any new threats that have emerged in the intervening year, and tabletops the heir access protocol. The cost is modest and matched to the engagement tier.

Trust and credibility


Are you certified in cybersecurity?

No. Bryan Kemler is the firm’s strategic consultant and runs the LegacyGuard work. He is a retired federal trial lawyer with a long working background in technology infrastructure, and he is not certified as a cybersecurity practitioner. We are deliberate about not implying credentials we don’t have. Where a credentialed specialist is required — incident response, forensic investigation, penetration testing — we say so and we refer.

Then why should I trust you with this?

Because the work LegacyGuard does is not penetration testing or threat hunting. It is the careful configuration and training of established, well-vetted security practices for a family-office context — the work most families do not get around to because no one has built it for them. The point is not to be the smartest defender in the room; it is to make sure your household is doing the basic things, well, in the way a family-office security engagement would handle them. We are also operating inside a Bay Area trust and estate practice with four-generation California family roots, which gives us a real reason to do this work carefully and a real cost to doing it badly.

Are you regulated as a cybersecurity firm?

No. LegacyGuard is a service of California Trust and Legacy. Cybersecurity service providers in California are not generally subject to a state licensing regime. Where the work touches legal services, that work is performed by licensed counsel under the firm’s existing professional regulation.

Didn’t see your question?

A fifteen-minute call is the fastest way to get a real answer to a real question.

Schedule a 15-Minute Call with Bryan

Available July 2026 · For select clients

Back to LegacyGuard

LegacyGuard is a service of California Trust and Legacy. We curate, configure, and train; we do not take custody of credentials and we do not guarantee outcomes. Bryan Kemler is not a certified cybersecurity practitioner. Legal services are provided by Kelly Balamuth, Esq. — California State Bar No. 172522. Walnut Creek, CA. Attorney advertising under California rules. No attorney-client relationship is created by visiting this site or submitting an inquiry.