1. INFORMATION GATHERING:
• A meeting will be held to define CA scope, critical assets, authorized point of contact and to prepare an initial engagement plan.
2. DEPLOYMENT OF COGNNA SENSORS:
• COGNNA sensor will be provided to be deployed across all systems in scope so it can investigate systems from a security point of view including servers and workstations
3. ASSESSMENT OF ENVIRONMENT
• Leveraging COGNNA threat intelligence data to hunt for any signs or potential evidence of compromises in your entire infrastructure. Comprehensive threat intelligence and user behavior analytics will be applied to evaluate system artifacts to uncover any signs of compromise in your environment.
• Collecting and analyzing additional forensic artifacts will be analyzed to confirm the findings of the assessment in above mentioned activities.
• A detailed and complete technical report on all findings and recommendations from our expert team. Get actionable intelligence, next steps for remediation and action to contain the malicious actors -If any-and initiate preventive action.