Home FS IRT

FS IRT

INCIDENT RESPONSE TEAM (IRT) — information security incident investigation and analysis service

 

MINIMUM ANNUAL IRT SERVICE PACKAGE INCLUDES
  • Consulting with experts

• Professional advice on information security management, security assessment

• Practical recommendations for the implementation of organizational measures to protect information and systems in accordance with the methodology of ISO 27001. IRT service is provided once when activating the subscription

• Providing information with descriptions and recommendations on the most relevant and critical threats in the cyber network

• Written recommendations on critical threats that need to be addressed and information security measures taken immediately

For example, attack Petya / Not-Petya, Efail, VPNFilter. Such letters are sent immediately on the day of receipt of information about threats

  • Investigation of the IS incident

• Collection of certificates and their analysis

• Identifying suspects and establishing the extent of their responsibility

• Identify the causes of the incidentь

• Incident prevention recommendations

• Storage and protection of materialsв

  • Forensic

• FS Group conducts a comprehensive forensic investigation of digital evidence, the results of which you will receive:

◦ A package of documents has been issued, which can later be used as evidence to bring violators to justice

◦ Correctly collected material, including digital, evidence

◦ Data for internal investigation of the incident using information security technologies

  • Intelligence (OSINT/underground): reports on individuals / legal entities from open and closed sources

• For investigations, we use our unique platform, which provides the ability to search for information on underground sites and contains the widest collection of data on leaks, website registration and compromised user accounts

• Our team will work with your staff analysts to investigate and analyze incidents

• We provide the information, reports and background data needed for further investigation

  • Security Bulletin — a monthly newsletter outlining information security rules related to vulnerabilities actively exploited by hackers, as well as recommendations for improving security 

 

  • Penetration Testing 

•  To determine the ability to circumvent security mechanisms, we simulate the actions of a third-party scammer who tries to compromise information

• We determine the appropriate method for your company (manual, automated, combined) and the type of attack

Before performing the tasks, we agree on the rules of the pentest and determine the order of notifications about the progress of work

• We use best practices and standards

◦  OWASP Testing guide

◦  OWASP ASVS

◦  NIST SP 800-115

◦  OSSTMM

◦  ISACA Penetration testing procedure (P8)

  • Scan web applications and resources

• Resources:

◦ online stores, online retailers

◦ media resources, news resources

◦ banking resources, payment systems

◦ banking resources, payment systems

◦ technological resources, SAAS

• We use instrumental scanning of web applications with elements of manual verification, the purpose of which is an objective assessment of the level of security

• Classify risks according to the methodology of OWASP (Open Web Application Security Project) – the world’s largest non-profit community for web application security. The fraudster’s motivation, skill level, publicly available data on exploitation of vulnerabilities and other parameters are taken into account 

Have you been a victim of cybercrime or need advice?

If your company has an incident, you need help with ISO 27001 certification or you just want to check the information security of your company - click the button below and leave a request for a consultation!

Get a consultation
Benefits
THE IRT RESPONSE TEAM IS WORKING FOR YOU

It includes specialists with experience from 5 to 20 years in information security. The key competencies of employees are divided into areas:

  • Threat Intelligence
  • OSINT
  • Vulnerability assessment/Penetration testing
  • Security operations
  • Incident Response
  • Forensic and Cybercrime Investigation

 

FROM 2 TO 5 CERTIFICATES
Have participants in the following specialties:
  • LPIC-1,2
  • CCNA
  • CHFI 
  • CISA
  • CISSP
  • OSCP
  • CEH
  • ISO/IEC 27001 Auditor

 

CYBER CRIME INVESTIGATION

Both for business and for government organizations. In particular, experience in investigating incidents, collecting intelligence, identifying and deanonymizing cybercriminals

 

INTERNATIONAL WORK EXPERIENCE

From the study of the activities and activities of participants in hacking forums and services DarkWeb / DarkNet, as well as the activities of transnational APT-groups and deanonymization of their member

 

Further test your team and your internal cybersecurity practices with IRT. Make sure there is no “blindness” of your own cyber security service!

Advantages of IRT
SAVING MONEY
SAVING MONEY

You do not need to hire a full staff of specialists in various fields, you have a cross-functional cyberarmy to subscribe to IRT

SAVING TIME
SAVING TIME

With IRT, you don't waste time reconciling legal documents in the midst of a cyber attack, when attackers inflict significant financial and reputational damage on your company

FLEXIBLE SUBSCRIPTION TERMS
FLEXIBLE SUBSCRIPTION TERMS

As part of your IRT subscription, you can allocate time to the services you need right now

Related products and services
FS PHISHING

Simulator of sending phishing emails in order to understand the probability of a successful phishing attack on the company and plan activities to increase the level of education of employees to counter phishing attacks

• Integration within the corporate network
• Development of phishing pages for your requirements
• User texts in emails
• Setting up the system for a mail server

More
FS OSINT LAB

WEB-solution that helps to verify employees and contractors on data from open and closed sources, as well as with Big Data FS Group

You get access to unique data, make it easier for employees of different departments, for example:

• purchasers
• HR
• compliance officers
• lawyers
• financiers

and among other things - you get a centralization and a single point of entry of data, which can work with different departments of the organization

More
FS MNG

Software product for detecting compromised accounts of the organization in open and closed sources

Thanks to FS MNG you can:

• identify compromised accounts, including when compromising third party resources
• prevent data leakage
• protect against the use of compromised passwords
• be informed about the leaks before it is widely covered in the media

More
FS TI

A software product that contains a list of anonymized IP addresses in the TOR, PROXY & VPN categories sold in public and in DarkNet. Allows you to identify anomalies in network traffic, application traffic and can be used in various ways

• Proactive approach to TI collection
• More information for decision making
• Earlier provision of data and thus prevention of attack
• Compatibility with most vendors' solutions
• Complementarity with other feeds

More

Like many other companies, FSG uses cookie technology on its websites to improve your user experience, as well as for the correct operation of the website.

If you agree to the use of all cookies on this site, click the Ok button. To learn more about cookie technology, its benefits and how FSG uses it, check out our Privacy Policy.