What EY can do for you
In the aftermath of cyber attacks — such as malware, ransomware or compromised email accounts — the EY cyber incident response team helps you collect physical and digital evidence as well as recover operations promptly. This is followed by an examination of the evidence to uncover important information, such as where, when and how an incident occurred and if systems are still at risk.
The response and analysis speed is critical in containing an incident and limiting the damage that it could cause to your organization. Regardless of your organization’s size, the EY cyber incident response team seeks to start work within hours to analyze your entire network for signs of anomalies. From cyber espionage to crippling infrastructure attacks, the team will work with you to determine what data was compromised and if digital evidence was tampered with. This will help you recover data where possible and recreate event timelines so that an effective recovery plan can be developed.
The EY cyber incident response team addresses various types of incidents:
- Malware, backdoors and keyloggers
- Destructive attacks and ransomware
- Insider threats and unintentional data loss
- Compromised business emails
- Web application attacks and compromise
As part of the EY technology consulting practice in Singapore proficient in providing end-to-end cybersecurity, the team also helps you make more informed decisions at every stage of cybersecurity processes, such as strategy development and preventive and response measures.
To assist you in implementing an effective incident response solution that meets your specific needs, several cyber incident response building blocks can be available under a retainer agreement:
- Annual subscription: This is an annual subscription model that covers fast-reaction emergency response, triage support, initial incident assessment and evaluations of events.
- Assessment: The first step in developing effective incident response capabilities is to understand your current state, your business requirements and what is required to establish an effective incident response solution.
- Incident response investigations: These include a standardized investigation methodology covering root cause analysis, containment, remediation and implementation of lessons learned.
- Additional cybersecurity services: Further controls and services can be implemented to enhance your organization’s ability to detect and respond to incidents, such as continuous monitoring, cyber compromise assessment and red teaming.