Forensics Audit

This service is also known as post-mortem audit.

DSecBypass intervenes on your Information System following an intrusion in order to :

    • Determine the entry point
    • List and timestamp attacker actions
    • Make sure the threat does not persist

      The audit is carried out in several phases

      Interviews with IT staff

      m

      Analysis of logsand evidence collected

      Identification of entry point and attack timeline

      Deliverables writing