The identification, collection, preservation, analysis, production, and presentation of digital evidence for both internal investigations and legal cases
Human Resources Investigation
Have or suspect a malicious insider? GreyCastle Security can investigate, analyze, and present digital artifacts to assist in the ongoing employee investigation
Think a system or network has been compromised? GreyCastle Security can provide forensic and analysis services to determine the likelihood of compromise
Identification, labeling, recording, and quiring data from possible sources of relevant data
Processing and parsing acquired evidence of potential interest, while preserving the integrity of the data
Analyze results from the examination phase to obtain relevant information to the investigation
Documenting and presenting findings discovered during the forensic investigation
Being prepared isn't just for large corporations. Your business is critical to you, so why would you treat it any differently?
It's important to ensure that your business is resilient and is capable of recovering from not only a failure but also an attack. To this point, disaster recovery and incident response are tightly linked.
This cheat sheet gives insight into the fundamentals of what goes into creating effective incident response and disaster recovery plans.DOWNLOAD
Over the past couple of decades, the number of investigations involving technology has increased, causing a need to reliable identify, collect, examine, analyze, and report on digital artifacts in a forensically sound manner. If you answer yes to the following questions, you likely need digital forensics performed.
Incident Response and Digital Forensics, for the most part, have differing phases, objectives, and goals.
However, they need to complement each other to not only provide answers but to also give insight in preventing reoccurrence of the security incident.
Senior Security Specialist, Adam Dean, walks attendees through how they work together during a security incident.