Incident Response

From Credit Card and PII data breaches to Ransomware extortion attacks, we have 20 years of experience managing and responding to security incidents. Immediately following an incident, we work with our clients to gather as much forensic data as possible to understand how intruders entered the network and the scope of their exploitation.

We then work with management to prioritize strategic options which may include efforts to contain the breach, restore critical systems or pursue the attackers. Our technical staff is well versed in making changes that are designed to cut off attackers and restore IT services both on-premise and in the cloud.

Our Process

Our philosophy is that incident response is largely a race against time – the longer systems have been impacted the more damage is done. Therefore our approach emphasizes speed and decisiveness.

Within the first 24 hours following an incident, we will work with your team to build a plan. We will then follow through with managerial guidance and technical expertise to bring the indigent to closure quickly. In the process, we work closely with key stakeholders, including:

Corporate Boards

Business Managers

Industry Regulators

Insurance Companies

Government Entities

Law Enforcement

Forensic Investigators