Abstract digital background with a network of interconnected glowing blue nodes and lines forming a mesh pattern on a dark blue gradient backdrop.

Cyberattack Recovery Management – Focus Threat Management

Objectives
Challenges

  • Customer was affected by a ransomware attack (full encryption)

  • Support in rebuilding the IT infrastructure after a ransomware attack

  • Management of the "Threat Management" stream to temporarily secure the restored infrastructure

  • Develop a strategy and roadmap to secure infrastructure beyond the recovery phase

  • Roadmap management and support in the implementation of security measures

Results
achieved

  • Priority management to rebuild IT infrastructure

  • Hazard and risk analysis after the cyberattack

  • Successful project management for the implementation of security measures of the restored infrastructure

  • Infrastructure monitoring and incident response

  • Securing the infrastructure by means of policies and security measures such as Microsoft Defender configuration

  • Implementation and connection of an external SOC team

  • Analysis and verification of vulnerabilities

Categories

Cybersecurity

Date

6 months, 2023

Client

Industrial company (international, approx. 1,600 employees)

Cyberattack Recovery Management – Focus Threat Management

Objectives
Challenges

  • Customer was affected by a ransomware attack (full encryption)

  • Support in rebuilding the IT infrastructure after a ransomware attack

  • Management of the "Threat Management" stream to temporarily secure the restored infrastructure

  • Develop a strategy and roadmap to secure infrastructure beyond the recovery phase

  • Roadmap management and support in the implementation of security measures

Results
achieved

  • Priority management to rebuild IT infrastructure

  • Hazard and risk analysis after the cyberattack

  • Successful project management for the implementation of security measures of the restored infrastructure

  • Infrastructure monitoring and incident response

  • Securing the infrastructure by means of policies and security measures such as Microsoft Defender configuration

  • Implementation and connection of an external SOC team

  • Analysis and verification of vulnerabilities

Categories

Cybersecurity

Date

6 months, 2023

Client

Industrial company (international, approx. 1,600 employees)

Cyberattack Recovery Management – Focus Threat Management

Objectives
Challenges

  • Customer was affected by a ransomware attack (full encryption)

  • Support in rebuilding the IT infrastructure after a ransomware attack

  • Management of the "Threat Management" stream to temporarily secure the restored infrastructure

  • Develop a strategy and roadmap to secure infrastructure beyond the recovery phase

  • Roadmap management and support in the implementation of security measures

Results
achieved

  • Priority management to rebuild IT infrastructure

  • Hazard and risk analysis after the cyberattack

  • Successful project management for the implementation of security measures of the restored infrastructure

  • Infrastructure monitoring and incident response

  • Securing the infrastructure by means of policies and security measures such as Microsoft Defender configuration

  • Implementation and connection of an external SOC team

  • Analysis and verification of vulnerabilities

Categories

Cybersecurity

Date

6 months, 2023

Client

Industrial company (international, approx. 1,600 employees)