In today's state of cybersecurity, breaches are often not a matter of if, but when. Approximately one in four companies will experience a data breach within 24 months. This could be the result of a number of different threats, such as malware campaigns, foreign state-sponsored threat actors, cybercriminals looking to turn a quick profit-even insider threat. IBM's Cost of Data Breach Study indicates that having access to an outsourced incident response team typically accelerates the timeframe that events can be contained, which can be a significant factor in reducing the overall cost of a breach. Don't wait until it's too late. Schneider Downs digital forensics and incident response experts can be engaged ahead of a breach through a retainer contract or during emergency situations as needed.
Our team of Digital Forensics and Incident Response experts have experience helping clients respond to a multitude of threat vectors and attack types. Schneider Downs will work with you to determine the exact factors that led to the breach, assist you in recovery, and develop lessons learned to better mitigate these types of events down the road. This process allows for restoration of faith that your systems will be hardened against future attacks and preserve business relationships and public trust.
INCIDENT RESPONSE PROCESS
We have a defined process for assisting clients through response to a computer security incident:
Collect Initial Facts - Our team will gather initial facts and circumstances surrounding the computer incident(s) reported. We will collect information about the incident, such as date and time; systems affected; what these systems support; and how it was reported, what suspicious behaviors were detected. If malware is detected, we will capture information regarding the type of malware, a listing of systems where it was identified, and other related information about how the malware operates.
Scoping the Incident - Based on the initial facts, we will attempt to identify the scope of the incident. We will examine data, and gather and review preliminary evidence to help guide further course of action.
Data Collection - Our analysis will incorporate the use of data from various information sources, collected to preserve volatile evidence from key systems that can be analyzed later in the process. Our method will collect data from two general categories: 1) data that describes the current running state of the affected systems, such as network connections and running processes, and 2) a snapshot of important data that can help us identify what may have happened in the past (e.g. file listings, system logs, operating system data, etc.). This may include capturing read-only, full-disk images of affected systems and log files.
Data Analysis - Based on information captured in the previous phase, we will execute a plan to review available data for indicators of compromise and any other related activity that will allow us to render an opinion on the activities that have occurred on those systems. We will rely on the completeness and accuracy of the data provided by the client to perform this step.
Report - Based on the analysis performed, we will build a report for the client that identifies the following:
Data Analysis Results
Listing of Limitations (if any)
Summary of Findings
RECOVERY AND REMEDIATION
Recovery and remediation is also a major component of the Schneider Downs Incident Response process. Our team has the experience to help you recover from major disruptions to your IT systems. We will help your organization:
From a forensics standpoint, our trained experts will use the most advanced technology and analysis methods in performing the following:
Our malicious file analysis often leads to the identification of indicators of compromise (IOCs), such as IP addresses or domains communicating with the malware, Microsoft registry key modifications, identification of child or sub-processes that have been launched, code injections, and file names or other attributes of not just the malicious payloads, but the related affected files as well. With this information, we can help you track down other instances of the attack on other systems, or put preventative measures in place to block them from happening going forward.
SECURE Act: Modification of Required Minimum Distribution Rules for Designated Beneficiaries (Section 401)read more >
Application to Receive Funding for On-Road and Class 8 Fleet Vehicle Projects in Pennsylvania Now Available!read more >
Financial Fitness: Setting SMART Goalsread more >
Good News Regarding Excess Business Losses For Your Pass-Through Construction Businessread more >
Financial Fitness - Are my personal finances on the right track?read more >
One PPG Place, Suite 1700
Pittsburgh, PA 15222
65 East State Street, Suite 2000
Columbus, OH 43215
1660 International Drive, Suite 600
McLean, VA 22102