PRE-INCIDENT
POST-INCIDENT
MALWARE REVERSE ENGINEERING
We help our clients to reverse engineer the malware used in the attack to provide further evidence on the identity of the attacker and addiitonal countermeasures against the malware.
This helps our client to identify Indicators of Compromise (IoC) to allow threat hunting across the entire organisation.
THREAT HUNTING
We help our clients to scan their entire organisation for presence of a particular malware.
This helps to provide assurance to our clients that there is no hidden corner or blindspot that a specific malware is hiding in.
TECHNICAL ADVISORY SUPPORT FOR RESPONSES TO REGULATORS
We help our clients in reviewing the technical details in their response to regulators to ensure completeness and accuracy.
This helps our clients to provide useful technical information on a timely manner to the regulators.
LESSON LEARNT WORKSHOPS
We help our clients to conduct post-incident review workshops to identify lessons learnt / areas of improvement and action plans to implement improvements.
This helps our clients to have a clear direction and schedule on when and how the risks will be addressed.
POST-INCIDENCE CONTROLS VERIFICATION
We help our clients to verify that the implemented post-incident measures are effective.
This helps our clients to have confidence that their investments in the measures are bearing fruits.
DARK WEB MONITORING FOR POST-MORTEM TRANSMISSION
We help our clients to monitor popular forums in the dark web for presence of their sensitive data for a specific period of time after an incident.
This helps to our clients to know on a timely manner when their sensitive data is being peddled on the dark web after an incident.