by Brent Kirkpatrick
(Date Published: 5/14/2018.)
Your network cannot be shipped in its entirety to a forensics lab. So most of your response to cyberattack is on-site incident response---the somewhat cursory and limited investigation required to clean the hackers off your network. Sometimes the intrusion response team sends a computer or router away for detailed forensics analysis. Digital forensics of a small number of computers is the only part that can be successfully outsourced.
Incident response must be done in cooperation with local IT people. Successful defense against cyberattack requires detailed knowledge your network infrastructure and computer system configuration. Local IT teams need to cultivate cybersecurity skills and be prepared to respond to intrusions.
Intrepid Net Computing's defendIT (TM) package provides IT people with the tools they need to implement incident response with support from our cybersecurity researchers.
defendIT (TM). AI-driven security measures derived from security incident data.