Regardless of the security measures implemented, there is always a possibility of an attacker getting access to the environment. In case such event happens it is key to make quick and resolute decisions on how to proceed.
Depending on the situation the following activities can be performed:
At our first moment of contact we will decide which activities are relevant to your situation.
In my career I have been working on a variety of incidents ranging from infected workstations at a bank to a malfunctioning PLC in an industrial network. At these incidents I was both involved from a management perspective as well as in the deep technical investigations.
If your organization is currently experiencing an incident, don’t hesitate to call me right now to discuss the situation and take the appropriate next steps!