Incident Response (IR)

Our Hunt & Hackett CERT (H2-CERT) helps organizations to deal with and recover from security incidents, breaches, and cyber threats.

Based on years of experience we gain an understanding of what’s going on, stabilize the situation, resolve immediate issues, support stakeholder communications and introduce long term solutions to ensure intrusions such as ransomware attack or economic espionage won’t happen again.

Why Incident Response matters

A prompt response reduces the impact of the incident

Reduce impact

Expedite Response

Strengthen cyber defenses

Advisory

Key Challenges

  • 1What's happening? Why?
  • 2What do we tell our stakeholders? And the media?
  • 3How do we get back to business as soon as possible?
  • 4How do we ensure this never happens again?

Cybercrime might be new to you, it isn’t for us: our experts have collectively experienced 100+ cyber attacks in the past 10 years, from the smallest data breach to huge intellectual property thefts. Together we’ll solve any incident. We’ll find the root cause, help you to restart your operations as soon as possible and by improving your digital immune system, to avoid cybercrime from happening again.

Have you been breached?

A prompt response is crucial to develop the best response strategy and to avoid further damage, so please - contact us as early as possible:

Our 24/7 Incident Response Hotline:

+ 31 70 222 0000

How we work

Steps to regain control

Below you find an overview of which steps you can expect during the Incident Response process. Do note that the preparation, identification, recovery and post-incident activity phases are iterative phases and not sequential chronical phases perse.

Initiate the process


You call our 24/7 Incident Response Hotline:
+31 70 222 0000

Triage


A Hunt & Hackett Incident Response (IR) expert picks up the phone, does a short first triage and generally plans a meeting together with you and additional IR colleagues.

  • First triage meeting via a conference call.
  • Draft budget
  • Share Mutual Non Disclosure Agreement and Letter of Engagement
  • Formal sign off

Starting up


Hunt & Hackett:
A kick-off meeting is planned in which the IR and crisis management process is explained to initial stakeholder. An overview is provided with initial data that needs to be collected. Tools are handed over to you to be deployed in the network for investigation and actor monitoring. A secure deployable IR environment is spun up.

You:
Upon request from Hunt & Hackett, you provides name of internal stakeholders. Initial collected data is delivered via Hunt & Hackett secure dropzone. Investigation tools are deployed by you.

Identification


Hunt & Hackett:

  • Hunts are being executed in the network
  • Collected data sources are being investigated
  • If required additional data sources are being requested
  • The attack path of the actor is being mapped out
  • Periodic status reports are shared with the customer
  • Periodic meetings are planned with customer

You:
Upon request additional data sources are being collecting

Recovery


Hunt & Hackett:

We finish the investigation and share overview of the compromised systems and host with you. Then we draft & plan a recovery plan with you, including containment and eradication. We help you by supporting the execution of the recovery plan. During the execution of the recovery plan, the network and systems are being monitoring for impact and effects, to see if the actor is eradicated.


You:

Provides input to recovery plan and make the resources for containment execution available. You execute the recovery plan and will be supported by Hunt & Hackett.

Post-incident activity & follow-up


Hunt & Hackett keeps on monitoring for suspicious traffic and work with you to develop a more elaborate long-term cyber security plan.

You continue to harden your systems and deploy a new ‘clean’ network in the short term.

Why Hunt & Hackett?

Your trusted ally in cybersecurity

Skills & Expertise

The Hunt & Hackett team has unrivalled expertise and skills, having recruited the top experts from within the world of cybersecurity, incident response, forensics and operations to operate a SOC.

Methodology

Hunt & Hackett combines both expert analysis of historical forensic evidence and real-time threat detection and hunting, allowing the team to detect attacker activity.

Technology & Tools

The platform allows immediate, real-time visibility into your IT environment, identifying potential compromises and allowing quick action to make sure incidents don’t escalate.

Let's outsmart your digital adversaries

Get in touch