This page is fully or partially automatically translated.
Investigating possible cases of computer crime in one's own company poses problems for most organizations, because the technical as well as the organizational and legal conditions are anything but trivial. It does not matter whether the attacks are external or internal: Often the responsible persons realize after a short time that they have done a lot of things wrong in handling the incident, that important traces were destroyed during the investigation or that due to mistakes in the process a legal exploitation of found traces is no longer possible. We offer you our support in the entire field of handling security incidents. We help you to define and implement processes and guidelines or to determine sensible logging settings for your systems. This way, processes and responsibilities are clearly defined and you are well prepared for an emergency. We can also advise you on the selection of suitable tools and supply them to you. In the technical area we support you starting with the analysis of the course of events up to the court-proof execution and preparation of forensic analyses. With our Forensics Extreme training we provide extensive further training in the areas of incident response and IT forensics. The ISO 27035 Lead Incident Manager training enables certification in this area. Translated with www.DeepL.com/Translator (free version)Show More