Capabilities Compliance Services

Capabilities Compliance Services

Intrusion Response

TDI will help your organization prepare for computer security threats by providing guidance on establishing a cyber security intrusion and incident response program based on industry "best practices."

The threat of "cyber attacks" is a stark reality of doing business in today's electronic marketplace. It is more a question of when your IT environment was or will be compromised versus if, regardless of the technological safeguards you may have implemented. Organizations must not only respond quickly, but also effectively, to cyber security incidents. Your organizationís IT systems are subject to a wide range of security intrusions and incidents - from unintentional misuse, to corrupted data files, to malware (viruses, worms, Trojan horses, etc.), to natural disasters. Some of these mishaps TDI can help fix through day-to-day operating procedures. Regardless, responding to security intrusion and incidents is generally not a simple matter. Effective intrusion response requires a high level of technical knowledge, communication, responsibility, and coordination among your organizationís technical staff tasked with responding to these incidents. TDI has the experience and know-how to help you build and implement your organizational intrusion and incident response capability/strategy; we can tie this process to existing bodies like the US Computer Emergency Readiness Team (CERT). By developing a commonly used infrastructure of policies, practices, and technologies to facilitate rapid identification and resolution of threats, TDI can enhance the ability of Government and private industry to protect their IT environments from attack and limit the damage and scope of attacks. We can also assist in analyzing compromised systems in order to extract both informative lessons for future incidents and also to obtain potential evidence for use in courts to prosecute the offenders. TDI is prepared to protect against and respond to any and all cyber security intrusions.