Incident Response

incident-response-and-forensics

Incident Response

We want to ensure our clients are prepared for any possible security incident that may arise. Our team of specialists will create an Incident Response Program for you to address compromised computer security capabilities as well as help educate you on how to go about handling incidents efficiently and effectively. Computer security incident handling can be divided into six phases: preparation, identification, containment, eradication, recovery, and follow-up. Understanding these stages, and what can go wrong in each, facilitates responding more methodically and avoids duplication of effort. We’ve created a program outlined below to address these needs. We will help create and offer guidance on forming and operating a Computer Security Incident Response Team (CSIRT) for you.

INCIDENT RESPONSE PROGRAM AND DELIVERABLES INCLUDE:

  • Incident Response Policy
  • Security Incident Response Guidelines
    • Security Incident Response Log
    • Security Incident Response Confidentiality Acceptance Form
  • Incident Data Loss and Reporting Procedures

We take it upon us to interview company individuals and conduct research to assist in the Incident Response Program. By creating testing environments with the CSIRT team, we’ll ensure the program meets the exact needs of each client.

RESOURCES
BECOME A CLIENT

SECURE INSIGHTS | THE S3 BLOG

Mon , 31 Jul 2017

U.S. Government Steps in as Cyber Attacks Target Nuclear Plant

Hackers are no stranger to the energy division. Throughout history, cyber attacks have purposefully targeted the energy sector with intentions ... READ MORE >

Mon , 10 Jul 2017

Recent Malware Attacks on Restaurants Use Stealthier Techniques

With all the improvements that have been made to security file scanners, creators of malware are deviating from the usual ... READ MORE >