The digitization of almost every aspect of business, combined with the increased connectivity of people, devices, and organizations, has created a complex security landscape, leaving enterprises vulnerable to cyber risk.
Whether you’re researching a new market or optimizing your systems to comply with complex regulation, collecting and analyzing data is mission critical. In our digital and increasingly borderless world, companies also need sophisticated strategies and tools to find information, detect violations, uncover evidence, and comply with regulations.
Safeguarding computer related intellectual property (IP)—patents, trade secrets and copyrights—is a strategic priority for businesses that depend on the development and monetization of information. But in a digital and connected world, IP misappropriation is rampant.
In our digital and increasingly borderless world, companies need sophisticated strategies and tools to cost-effectively uncover evidence and comply with litigation-related discovery and disclosure requirements. In this environment, the risks of a breakdown are ever-present and come with major implications.
Before a cyber attack on a company’s assets becomes a full blown crisis, an organization can proactively detect, contain and remediate malicious activity by searching for evidence of a breach and expelling bad actors from its environment. To do so, organizations need to have the right people with the specialized skills, who know how to hunt for indicators of compromise.
With years of experience in the trenches, our responders know where to look for vulnerabilities and understand how those vulnerabilities can be exploited by attackers. Our experts are skilled at hunting, and can find subtle anomalies and early indicators of a compromise in an organization’s environment. Our teams also troll the Darknet to stay on top of emerging threat trends, maximizing their ability to spot the newest indicators that are most applicable to any organization across a variety of industries.
We bolster the knowledge of our team with proprietary tools that rapidly analyze large volumes of information to help spot indicators of compromise and malware, uncovering incidents in the making and mitigating the risk of further damage:
LIMA, our proprietary malware scanning tool, can pinpoint indicators of compromise and identify intruders across tens of thousands of machines. LIMA is lightweight, fast, and easily deployable, so it can be used onsite at a moment’s notice.
Hawk, our mobile forensic incident response platform, deploys sensors at strategic locations within a company’s infrastructure to trace irregular network traffic. It can conduct high-speed, onsite malware analysis and forensic hosting.
Raven™, our proprietary tool for automated forensic analysis, allows us to efficiently analyze large volumes of files— from thousands of computers in multiple countries— to help detect indicators of malware or a cybersecurity breach across and entire enterprise.
Our capabilities include:
Host-based Interrogation for Indicators of Compromise
Rocco Grillo is an Executive Managing Director that serves on Stroz Friedberg’s executive management team. He is also in charge of the firm’s Cyber Resilience business which includes the company’s incident responders and security scientists who deliver the firm’s proactive and reactive cybersecurity capabilities, Mr. Grillo regularly advises clients, including boards and executive management on a range of cybersecurity issues across all industries
In this role, Mr. Grillo is responsible ...
Morgan Bjerke is a Stroz Friedberg Vice President based in the firm’s Dallas office. Ms. Bjerke is part of the firm’s global Incident Response practice, overseeing a high-skilled team of first responders, threat intelligence analysts and malware specialists. Her years of risk consulting and technical expertise are heavily relied upon by law firms and corporations seeking both proactive and reactive solutions related to complex data breaches and advanced cybercrimes.
Prior to joining ...