Services

Incident Response

All organizations face cyber threats that could compromise data, interrupt operations, and damage reputation. Once you detect a cybersecurity incident, it is essential to take the right action, promptly. Our experts understand that cyber incident response teams must seamlessly integrate across existing mission-critical functions, and they have the expertise to respond to all types of threats.

Whether it’s ransomware, business email compromise, a trusted insider, or a foreign actor, we provide complete cyber incident response solutions, including preparedness and response planning, incident response, analysis, identification, containment, eradication, system refinements, and ancillary mission support functions, such as crisis management, strategic communications, and reputation management.

Cyber attacks and other critical security incidents can impede your ability to keep your business moving. We employ a custom application of the fundamental incident preparedness and response process, customized to meet your needs. This personalized approach maximizes the efficiency and effectiveness of the incident response. By focusing on each individual phase of the incident response lifecycle to deliver custom-tailored plans, we ensure that your needs are met.

We are a leading provider of independent cybersecurity, privacy, information governance, and risk management advisory services, coupled with a team of seasoned crisis communications professionals who specialize specifically in these issues. We work with your organization to develop and implement processes and tools to effectively and holistically respond to a cyber incident or investigation. Learn more.

Types of incidents we respond to:

Incident Response Lifecycle

1. Preparation

Being ready for cyber threats is fundamental to the success of your incident response program. This phase involves establishing and training an incident response team and developing appropriate tools and resources you will need for each aspect of incident response. We work with your business to select and implement controls based on the results of our risk assessments to limit the number of potential incidents your organization may face.

2. Detection & Analysis

Residual risk inevitably persists after controls are implemented. Early steps to identify, detect, and analyze threats facing your networks are key to developing effective containment and eradication strategies. Once an incident is identified, we combine the resources and tools necessary to determine the scope, impact, and appropriate response. These efforts determine the source of the incident and preserve necessary forensic artifacts.

3. Containment, Eradication & Recovery

This phase of incident response seeks to prohibit data from leaving networks and prevent further damage. Eradication is the removal of malicious code, threat actor accounts, or unnecessary access, as well as remediating vulnerabilities that may be the root cause of the incident. Once the incident has been contained and eradicated, recovery can begin. Through a post-incident assessment, we detail the cost, cause, and response for the incident, along with steps that should be taken to prevent future incidents.

Data Identification & Review

Data breaches can have long-lasting effects if they are not properly remediated. We regularly conduct reviews in multiple formats and languages, and our expertise ensures important information is not overlooked, allowing for remediation, regulation compliance, and accurate document preparation. Learn more.

In-bound Call Center & Notification

We can set up an in-bound call center with unique phone numbers in over 30 languages. Our team handles the call center setup, training of staff, and escalation of issues, allowing your organization to focus directly on handling the breach itself. We also provide notification services depending on the need of the organization. Learn more.

Crisis Management & Strategic Communications

Effective management coupled with internal and external communication is imperative during any cybersecurity event – from a business email compromise to a ransomware attack. Our Strategic Communications experts provide strategic counsel to clients in sensitive situations with legal, financial, regulatory, and reputational implications. They can develop your communications strategy, map stakeholders and audiences, and develop messaging and materials.

Cybersecurity Transformation

FTI Cybersecurity partners with organizations to restore and remediate the ecosystem following an incident to enhance governance, network resiliency, optimize detection and identification, and elevate cybersecurity programs to industry-leading standards. Our experts serve as security architects to design, prioritize, implement, and manage a solution set that addresses your organization’s unique risk profile. Our guidance on remediation recommendations aims to ensure cybersecurity best practices are employed efficiently and effectively to mitigate the risk from future cyber incidents.

Incident Response Retainers

FTI Cybersecurity’s Incident Response (IR) Retainer provides instant access to expert guidance and delivers ongoing proactive cybersecurity services. Our pre-defined agreement provides peace of mind, removing the need to negotiate terms and sign potentially complex contracts in the middle of an incident, coupled with dedicated incident response services that can be rapidly deployed to any global location. The retainer unlocks the full suite of FTI Cybersecurity services, including immediate incident response, at a pre-set and pre-paid discount. Included proactive exercises ensure that your team stays sharp. 

E-discovery

Through FTI Technology’s Information Governance, Privacy & Security team, we provide end-to-end e-discovery services globally, using leading e-discovery technology, expert teams, and innovative workflows to help clients quickly and cost-effectively understand the matter and develop case strategy.

David Youssef
Managing Director
New York

david.youssef@fticonsulting.com
Adam Harrison
Managing Director
London

adam.harrison@fticonsulting.com
Ollie Gower
Senior Managing Director
Madrid

ollie.gower@fticonsulting.com
Harald Hertel
Managing Director
Frankfurt

harald.hertel@fticonsulting.com
Eva Kwok
Senior Managing Director
Hong Kong

eva.kwok@fticonsulting.com
Wouter Veugelen
Senior Managing Director
Sydney

wouter.veugelen@fticonsulting.com

Email #FTICYBERSECURITY-RESPONSE@fticonsulting.com or call one of our response lines:

All response hotlines will provide assistance in English.