+1 800.468.6255info@alangray.com

Cyber Security Practice

Cyber Security Practice

Alan Gray LLC brings a team of highly qualified and experienced forensic experts certified in Incident Response for immediate deployment following a data breach or security incident. Our team consists of some of the foremost experts in the industry, with experience on hundreds of breaches. The team is also supplemented with risk management professionals and a reporting and analytics team to provide clear definitive investigative and corrective action reports.

 

What if your systems are vulnerable?

 

Our Cyber Security Practice is pleased to be offering Breach Incident Response Services to our clients. We provide solutions and cost-effective methods tailored to meet the time-sensitive issues of clients impacted by a data breach or critical security incident.

For more information about our Breach Incident Response Services, please click here.

 

CYBER SECURITY IS RISKY BUSINESS…THIS IS OUR APPROACH

 

 

DEPLOY

Alan Gray maintains a 24/7 Incident Response Team, ready to deploy on a moment’s notice. Once contacted, we mobilize a project-specific incident response team and work directly with our clients to identify the extent of the threat, execute an immediate containment strategy, and begin the investigation into the affected systems.

Our deployment strategy includes:
•    Initial Incident Response Call to establish lines of communication and to determine the Scope of the Incident
•    Use of remote technology to identify malicious breach activity and impacted systems and data
•    Implementation of immediate measures to mitigate active attacks
•    Mobilization of an on-site team to begin the investigative process

INVESTIGATE

Our team conducts a comprehensive investigation into the breach to identify the extent of the breach, the systems and data stolen or at risk, and to collect evidence to be used for reporting and litigation as necessary.

Our investigations include:
•     Method of Attack and Access to the system (external or internal threats)
•     Network Traffic Analysis
•     System Log Analysis
•     Malware Analysis
•     Impacted systems, user accounts, and applications
•     Exposure of sensitive data

RESPOND

At Alan Gray, we understand the implications of exposure of sensitive information (PII or PHI) and implement robust tools and analytics to accurately quantify and document the extent of the breach or to prove that a breach did not occur or was limited in exposure.

Depending on the nature of the breach, Alan Gray assists with notice requirements, notice messaging,  and communications with employees, corporate executives, and board members.

REMEDIATE

Based on the nature of the breach, corporate policies, and system configurations, Alan Gray prepares and assists our clients with the implementation of a remediation plan tailored to the particular client, system vulnerabilities and breach incident(s).

REPORT

At the conclusion of our investigation, Alan Gray prepares an investigative report and remediation report. The investigative report provides evidence needed to respond to regulators, corporate entities, customers, and potentially injured parties in litigation.

Our reports include:
•     Attack Timeline and systems affected
•     Nature of attack (Malware, SQL Injection, unauthorized access, etc.)
•     Affected computers, user accounts, and applications
•     Extent of exposure of sensitive information or proof of limited or no exposure