Insider Threat Investigations
– Fraud Waste and Abuse or other resource misuse matters
– Unauthorized access and sabotage
– Data exfiltration and Intellectual Property theft
Often it can be unintentional; however, there are times where the activities of a disgruntled employee or contractor are strategic and intentional. During those times, it is important to know what they accessed, did they remove any data from your environment and how it was removed. And in other instances it is much more simpler than that–you just want to verify work hours claimed by a contractor that doesn’t seem to be producing.
We will work with your IT personnel and/or department to;
- Collect and review network logs,
- Collect and review security logs,
- Collect and review physical security logs,
- Collect and review email logs,
- Collect and review print logs,
- Collect and review system event logs,
- Collection and review web browser history logs (both network and host-based), and
- Collection and review of any Data Loss Protection/Prevention logs.
At the conclusion of our analysis, we present our findings in a written report in a factual yet comprehensible way. And we provide the artifacts to back up our findings.