Breached?

Report an incident

Question?

Contact us now

Respond

Our Cyber Emergency Response Team, ddCERT, provides customers with access to our pool of experienced incident responders. This gives you the quick start and structured support to respond to any attack against your network and its data resources.

Incident Response Program

All data networks come under attack by motivated hackers or disgruntled insiders; it is inevitable that -- sooner or later -- a security incident will occur. It is even possible that a breach, releasing confidential data to unauthorized persons, will result.

DOWNLOAD THE DATA SHEET

Problem Statement

Are your employees prepared to recognize and alert you to a cyber attack? What do you do when your network is being attacked right now—can you respond to the incident, close it, and return to normal business operations?

Solution Statement

DigitalDefence can provide immediate remote assistance, and can physically be at your site in as little as 4 hours. We are prepared to fully manage your incident response from start to finish. A rapid response, coupled with appropriate procedures, is critical to the success of controlling a security incident and preventing future occurrences.

Program Overview

DigitalDefence has developed the Agile Incident Management, or AIMTM, program to increase the effectiveness of the incident response processes. AIM is the totality of proactive and reactive measures undertaken to help prevent and manage data security incidents across an organization.

Benefits

Educate

Ensures that an organization has the governance structure, formal documentation, and training in place to effectively respond to a cyber security incident

Implement

Supports the pro-active stages of an incident response, ensuring that a real response is rapidly and effectively implemented to minimize

Empower

Provides all employees with a deep understanding of the real-world risks faced by your organization; as a result, they are more likely to mount a stronger defence in maintaining your network’s security and privacy

Compliance

Customized campaigns meet the specific needs of your organization, and your regulatory and legal environments

VIEW MORE RESOURCES

Retained Incident Response

When an incident or cyber breach occurs, a rapid and effective incident response is critical to safeguarding your organization’s systems and data. Any delay increases the losses from a security breach; unfortunately, these delays typically arise from a lack of resources. Incident response personnel must not only be available when needed, but they must possess the skills and tools to immediately respond to a variety of different possible attacks.

DOWNLOAD THE DATA SHEET

Problem Statement

Are your employees prepared to recognize and alert you to a cyber attack? What do you do when your network is being attacked right now—can you respond to the incident, close it, and return to normal business operations?

Solution Statement

DigitalDefence’s Retained Incident Response Service allows you to engage these skilled resources on a “as needed” basis. Members of the DigitalDefence Cyber Emergency Response Team, ddCERT, can deploy in a rapid manner to supplement or manage the end-to-end incident response process. Because the service is pre-planned, the financial costs can be planned in advance, and customers know that a rapid and effective response will be delivered under the contracted Service Level Agreement.

Program Overview

DigitalDefence has developed the Agile Incident Management, or AIMTM, program to increase the effectiveness of the incident response processes. AIM is the totality of proactive and reactive measures undertaken to help prevent and manage data security incidents across an organization.

Benefits

Prepared

Pre-planned incident response process minimizes the duration and impact of an incident; this significantly reduces impact to the business and the time required to respond and recover to normal operations

Reduced Costs

Rapid and effective response immediately reduces operational costs; over the course of the incident, it reduces liability, regulatory fines, and business costs of downtime

Experienced

Access to remote and on-site teams of individual with skills in ethical hacking, technical and management approaches to incident response, and data forensics (required to support possible litigation)

Compliance

Satisfies regulatory compliance and contractual requirements

VIEW MORE RESOURCES

Cyber Incident Response

All data networks come under attack by motivated hackers or disgruntled insiders; it is inevitable that –sooner or later- a security incident will occur. It is even possible that a breach, releasing confidential data to unauthorized persons, will result.

DOWNLOAD THE DATA SHEET

Problem Statement

Are your employees prepared to recognize and alert you to a cyber attack? What do you do when your network is being attacked right now—can you respond to the incident, close it, and return to normal business operations?

Solution Statement

The goal of Incident Response is to stop security breaches before they happen, or to effectively respond while they are happening. A rapid response protects your Information assets and resources, and allows you to comply with regulatory requirements, avoid legal liability, prevent relay attacks against other organizations, and to minimize the potential for negative exposure to vendors, partners, and customers.

Program Overview

DigitalDefence has developed the Agile Incident Management, or AIM ™, program to increase the effectiveness of the incident response processes. AIM is the totality of proactive and reactive measures undertaken to help prevent and manage data security incidents across an organization.

Benefits

Experienced

DigitalDefence has a deep knowledge of threat environment, including attacker objectives, methodologies, and tools. This intelligence is customized and applied specifically to the client during the investigation

Reduced Costs

Our proprietary incident management methodology, Agile Incident Management (AIM) is designed to give the most rapid, comprehensive, and cost-effective response possible

Customized

Commercial, open-source, and proprietary tools are used where necessary to complement manual testing in an investigation methodology that is customized for your organization. This provides the most effective means to identify a possible compromise

Assurance

An objective third party response by experienced professionals assures key clients, auditors, and management as to your organization’s commitment to security

VIEW MORE RESOURCES

Post-Compromise Assessment

DigitalDefence’s Compromise Assessment service allows organizations to evaluate their networks for signs of an ongoing attack, or one that has occurred in the past. This is particularly relevant at a time when advanced persistent threat are designed to stay hidden on the network, and the average lag time between compromise and discovery is more than 200 days.

DOWNLOAD THE DATA SHEET

Problem Statement

The high incidence of undiscovered compromises can be attributed to a variety of factors, including: lack the personnel and available time to search for compromises, lack the specific knowledge of the threats that they face, lack specific detection tools and skills, and lack analysis skills, particularly incident response, malware analysis, and data forensics.

Solution Statement

DigitalDefence’s Compromise Assessment Service addresses these limitations to ensure you can detect and respond to a compromise of your data. The DigitalDefence Compromise Assessment combines our advanced knowledge of attacker methodologies and tools with our experience in responding to data security incidents.

Program Overview

As part of our compromise assessment, DigitalDefence completes an environmental review, conduct endpoint analysis, evidence analysis, re-assessment, and then presents executive summary and full documentation of the compromise assessment that has been completed, including major findings, and recommendations to address any remaining risks. If litigation is being pursued, additional documentation may be prepared.

Benefits

Experienced

Our consultants have completed hundreds of ethical penetration tests, malware analyses, and incident response investigations; this unique knowledge allows them to rapidly and effectively assess a potential compromise

Customized

Commercial, open-source, and proprietary tools are used where necessary to complement manual testing in an investigation methodology that is customized for your organization. This provides the most effective means to identify a possible compromise

Assurance

An objective third party response by experienced professionals assures key clients, auditors, and management as to your organization’s commitment to security

VIEW MORE RESOURCES

Data Forensics

Over 90% of today’s information is created or stored electronically. Have you acquired the evidence to support your case?

Digital forensics is the rapid systematic and thorough approach used to find evidence and gather material for the support of criminal and civil actions. DigitalDefence is prepared to guide your organization through all stages of a case involving electronic data, from responding to the initial incident to your eventual success in arbitration or court.

DOWNLOAD THE DATA SHEET

Problem Statement

Can you identify the forensic evidence of employee misuse of data or fraud, theft of intellectual property, or a security breach? • Do you possess the technical knowledge to collect electronic evidence while maintaining acceptable chain of custody management to ensure its acceptance in court? • Do you need support to enforce the recovery of electronic evidence, or present it in court?

Solution Statement

DigitalDefence will initially conduct a forensic readiness assessment to identify your ability to meet the stringent requirements for collecting and analyzing electronic data. This assessment will provide a comprehensive analysis of your current practices as they related to data forensics and incident response. Any gaps between current practices and known most effective practices will be identified and a mediation plan will be submitted.

Program Overview

DigitalDefence’s certified technicians are expertly trained in all forms of forensic data collection according to industry standards; this allows us to provide the strongest defensible position when preparing data for your case. When acting as expert witnesses in court, our forensic experts have the ability and experience to make complex technical issues (e.g.: encryption, hacking methodologies), clear and easily understood by lay persons in the courtroom, in camera, and at deposition.

Benefits

Experienced

Experience of our investigators – Each forensic specialist has 15 years or more of real-life experience gained in enterprise, military or law enforcement. Legal experience – Our investigators have presented in court and at arbitration hearings; they understand the legal process, and how their findings play a part in the outcome

Strong Practices

Digital Defence employs a stringent methodology that was developed in consultation with law enforcement and the legal community. We approach every case as if it will be going to court, and will be subject to intense scrutiny. Our practices support this perspective, ensuring that we are fully prepared to represent and defend our findings

Industry Recognition

Our forensic specialists are active members of organizations such as the High Technology Crime Investigation Association (HTCIA). They also possess industry-recognized certifications such as the Certified Information Systems Security Professional (CISSP), the Certified Computer Examiner (CCE), and vendor-specific designations

Thought Leadership

Digital Defence forensic specialists are frequently lecturers, present at major security conferences, and teach practical workshops

VIEW MORE RESOURCES

Managed IR Services

Our Managed Services is intended to support incident response / retained incident response with focus on Cloud-based solution​, Rapid deployment​, Immediately scalable​, Data stored in Canada​, Pay-per-use​ and is based on storage requirements, not IP.​

Cloud Based

Analysis and storage sensors are hosted in the cloud​ and sensors specifically support cloud-based applications. In addition, supports Amazon Web Services, AWS​ supports MS Azure cloud environment​, supports cloud-based applications (Office365)​, and takes advantage of cloud-specific marketing vehicles​

Coverage

Managed Services covers: Asset discovery​ including Network assets​, Software​ and Services. Vulnerability assessment​ consisting of Network​, Vulnerabilities in cloud applications​, and Cloud infrastructure vulnerabilities​ along with Social engineering - phishing​

Additional Features

Integrates with 3rd party tools: Palo Alto Networks, Cisco Umbrella and much more. Supports compliance​: PCI DSS​, HIPAA, ​and SOC 2​