Our consultants analyze the adequacy of clients’ current IT protection mechanism and identify potential vulnerabilities and mechanism of attacks. Additional incident handling and emergency response support services and post incident handling services could also be provided. Even though security measures are implemented, there are still chances that the IT systems would be attacked. Our consultants provide advices and supports for our clients during security incidents. We also perform digital forensics investigation services to determine the cause of the intrusion.
Besides, many organisations plan to implement their Security Incident Event Management (SIEM) solution and even Security Operation Centre. Readiness of the infrastructure have to be determined. For instance, availability of detection tools, logs have to be determined. Monitoring, correlation rules have to be defined and deployed properly to the SIEM system. Our consultants can provide advisory services, readiness review or even support your deployment of the SOC infrastructure.
Service include:
- Security Incident handling services
- Develop Security Incident Handling and Response Procedures for client
- Assist client to perform Security Incident Handling and Response after security attack
- Provide Post-Security attack security incident response containment and incident management
- Digital Forensics Investigation services
- Perform Post-incident Digital Forensics Investigation Services to determine and identify the cause of incident, time and propose the rectification recommendations
- Contain and Acquire Digital Evidence for forensics investigation or court litigation purpose based on the FORZA framework
- Provide Forensics and Investigation Support Services for Court Litigation cases
- Security Monitoring Advisory Services
- Lead the SIEM readiness gap anaysis
- Advise client on SIEM and detection, monitoring and threat intelligence infrastructure establishment
- Perform SIEM infrastructure testing through eWalker Tai-Chi methodology
- Review and enhance your SIEM rules based on latest Cyber Threat Intelligence