We understand what it is like to have everything you’re working for be held in jeopardy by bad actors actively exploiting your environment. Zen Cyber Security Incident Response (IR) Engineers have led IR actions with customers that have over 100,000 employees. We have performed IR actions in multiple verticals to include banking, manufacturing, services sales, grocery stores, schools, and many more. There is not an environment that you put us in that we can not assess very quickly to immediately start our IR process. We follow the National Institute of Standards and Technology (NIST) incident response process outlined in SP 800-61. Here are the high level highlights:
- Preparation – this occurs prior to an incident occurring and focuses on preparing for incidents. Practically this means our engineers train on our process and study new/emerging threats
- Detection and Analysis – we will have an initial meeting to understand the incident from the customer, review any logs the customer may be able to provide, install our security tools for analysis, review our logs, prioritize remediation of devices based on risk and business critical function.
- Containment, Eradication and Recovery – isolate systems to reduce spread/impact, remove the threats, recover the system
- Post-Incident Activity – attempt to provide a root cause analysis, update our policies and procedures, and share the results with the customer
We are here to make your recovery go as smoothly as possible.


Reviews
There are no reviews yet.