Cyber attacks can have a catastrophic impact on SMBs
60%
of SMBs go out of business within six months of a data breach or a cyber attack
87%
of cyber attacks are aimed at SMBs
86%
of SMBs are unable to defend themselves against a cyber attack
How does IR-1 work?
Investigation procedures in compliance to industry best practices (SANS, NIST, ISO).
Suspected Cyber Incident
Contact Blackpanda 24/7 notification center
Submit to Blackpanda the incident data-ingestion form
Continue to monitor incident for developments
Identify
Determine the validity and severity of the event
Deploy endpoint data collection tools
Begin data collection
Analyze
Conduct Preliminary Analysis
Define scope and assign roles
Communicate plan of action
Begin containment and remediation
Contain, Eradicate and Recover
Contain/Quarantine the incident
Conduct root cause analysis
Confirm/Deny data exfiltration
Recover lost data (if possible)
Assist in restoring business operations to normal
Final Report
Cause of incident and response methodology
Recommendations for remediating actions
Recommendations for further improvement of security posture


Discounted Services
Gain access to discounted rates on Blackpanda services through your purchase of an IR-1 subscription.

Cyber Incident Response

Compromise Assessments

Digital
Forensics
.png)
Incident Response Preparation

Loss Adjusting & Investigations
Local Responders
Blackpanda deploys highly trained teams of cyber security incident response specialists throughout APAC, with the local linguistic and cultural understanding necessary to manage a crisis. We are able to activate both remote and on-site responders for fast and efficient boots on the ground.
Hyper-Specialization
Our focus is an inch wide and ten miles deep, exclusively in the niche of cyber security digital forensics and incident response. Our responders bring specialized experience and regularly train on a range of incidents including ransomware and negotiation, maritime response, and operational technology.
Military Precision
Our team consists of an elite cadre of cyber risk and security experts from military special forces, intelligence, forensics, and law enforcement backgrounds. Our military origins drive our culture of efficient operational processes, precise delivery of high-quality service, and consistent responsiveness — we bring our lessons from the battlefield directly to the board room.