Incident Response

incident-response-and-forensics

Incident Response

We want to ensure our clients are prepared for any possible security incident that may arise. Our team of specialists will create an Incident Response Program for you to address compromised computer security capabilities as well as help educate you on how to go about handling incidents efficiently and effectively. Computer security incident handling can be divided into six phases: preparation, identification, containment, eradication, recovery, and follow-up. Understanding these stages, and what can go wrong in each, facilitates responding more methodically and avoids duplication of effort. We’ve created a program outlined below to address these needs. We will help create and offer guidance on forming and operating a Computer Security Incident Response Team (CSIRT) for you.

INCIDENT RESPONSE PROGRAM AND DELIVERABLES INCLUDE:

  • Incident Response Policy
  • Security Incident Response Guidelines
    • Security Incident Response Log
    • Security Incident Response Confidentiality Acceptance Form
  • Incident Data Loss and Reporting Procedures

We take it upon us to interview company individuals and conduct research to assist in the Incident Response Program. By creating testing environments with the CSIRT team, we’ll ensure the program meets the exact needs of each client.

RESOURCES
BECOME A CLIENT

SECURE INSIGHTS | THE S3 BLOG

Thu , 15 Jun 2017

Why Fast Incident Response Is So Important

Cyber attackers are increasingly becoming more sophisticated and attacks more frequent. Organizations of all sizes and sectors are at risk, ... READ MORE >

Wed , 31 May 2017

Canada Is Developing New Cyber Weapons in Response to Global Security Threats

Cyber threats aren’t just coming from super-smart hackers in basements anymore. They can be state-sponsored and far reaching with political ... READ MORE >