Service Catalogue
Comprehensive Cyber Solutions
Tailored cybersecurity services designed to protect your business at every stage of the incident lifecycle.
IR-1 Subscription
Assured Incident Response
IR-1 is a comprehensive cyber incident response solution that provides organizations with an integrated approach to managing cyber threats. By combining real-time Attack Surface Management (ASM) with on-demand Incident Response (IR) services, IR-1 enables businesses to proactively monitor their digital footprint while ensuring rapid containment and resolution of security incidents.
- 24/7 Incident Activation: Immediate access to response teams
- Attack Surface Management (ASM): Continuous digital footprint scans
- Dark Web Monitoring: For compromised credentials and sensitive data
- Triage Call: Initiated within 4 hours of notification
- Incident Response Containment Plan: Delivered within 48 business hours
- Executive Summary Report: Memo-style leadership briefing
IR-X Bundle
Readiness Consulting + Response
IR-X is Blackpanda’s most robust cyber incident response offering, combining the protection of the IR-1 subscription with the priority response readiness of the Incident Response Retainer (IRR), and the flexibility to convert retainer hours from Blackpanda’s list of security consultancy services.
- All benefits of IR-1 Subscription included
- Pre-committed incident response hours with guaranteed SLA-based priority
- Convertible hours for proactive services (Plan, Test, Detect)
- Financial and operational predictability
- Dynamic and scalable coverage across the incident lifecycle\
Comprehensive Cyber Insurance
Up to $10M USD Coverage
Blackpanda’s Comprehensive Cyber Insurance offers financial protection and business continuity support in the wake of a cyber incident. Designed to complement IR-1 and IR-X, this solution ensures that organizations not only receive expert incident response but also the financial means to recover effectively.
- First-party loss coverage: Business interruption, system restoration, ransomware payments
- Third-party liability coverage: Legal defense, regulatory fines, customer notification
- Reputation protection: Crisis PR and communications costs
- Integrated with Blackpanda IR Services for seamless activation
- Up to 20% premium discount for IR-1 customers
Incident Response Retainer
On-Demand Expert Access
Blackpanda’s Incident Response Retainer (IRR) is a prepaid service agreement that gives organizations on-demand access to our elite digital forensics and incident response (DFIR) experts when a cyber incident occurs.
- Pre-purchased Service Hours for emergency response
- Guaranteed SLA & Priority Access
- Battle-tested, military-grade analysts
- Flexible Use Cases: Hours can be converted to proactive services
IR Plan Development
Strategic Response Framework
IR Plan Development is the process of creating or refining a comprehensive, organization-wide strategy for detecting, responding to, and recovering from cybersecurity incidents. This plan serves as the foundation for your entire incident response process, outlining roles, responsibilities, and high-level procedures.
- Review: Comprehensive assessment of existing plans against best practices
- Creation: Development of a new, tailored IR plan aligned with NIST/ISO
- Stakeholder Alignment: Ensuring all key personnel understand their roles
- Regulatory Compliance: Alignment with local and industry regulations
IR Playbook Development
Tactical Response Guides
While an IR Plan provides high-level strategy, IR Playbooks offer specific, step-by-step instructions for handling distinct types of cyber incidents (e.g., Ransomware, Phishing, DDoS). We develop tailored playbooks to guide your technical teams through the containment and remediation process.
- Scenario-Specific Guides: Ransomware, BEC, Data Breach, etc.
- Technical Workflows: Detailed command-line and tool-specific steps
- Decision Trees: Clear logic for escalation and containment
- Communication Templates: Pre-drafted notifications for stakeholders
Tabletop Exercises (TTX)
Scenario-Based Simulations
A Tabletop Exercise (TTX) is a discussion-based simulation where your team navigates a hypothetical cyber incident. It tests your IR Plan and Playbooks in a low-stress environment, identifying gaps in communication, decision-making, and technical capabilities before a real crisis occurs.
- Custom Scenarios: Tailored to your industry and threat landscape
- Facilitated Discussion: Led by Blackpanda experts to challenge assumptions
- Executive & Technical Tracks: Separate or combined sessions for different audiences
- After-Action Report (AAR): Detailed analysis of strengths and areas for improvement\
Purple Teaming
Collaborative Attack & Defense
Purple Teaming is a collaborative exercise where Blackpanda's offensive (Red) and defensive (Blue) teams work together with your internal staff. We simulate real-world attacks to test your detection and response capabilities in real-time, providing immediate feedback and tuning opportunities.
- Real-World Attack Simulation: Emulating TTPs of relevant threat actors
- Live Detection Tuning: Optimizing SIEM/EDR rules during the exercise
- Knowledge Transfer: Upskilling your internal team on latest attack methods
- Comprehensive Reporting: Detailed findings and remediation roadmap
After-Action Review (AAR)
Post-Incident Evaluation
An After-Action Review (AAR) is a structured, post-incident evaluation that measures how effectively a cyber event was managed across all teams and external partners. It delivers an objective account of what worked, what fell short, and which corrective actions will strengthen the organisation’s next response.
- Incident Analysis: In-depth review of processes, people, and technology
- Gap Analysis: Pinpoints gaps in processes, communication, tooling, and coordination
- Actionable Insights: Recommendations to improve incident response capabilities
- Stakeholder Interviews: Two one-hour interviews with key stakeholders
Compromise Assessment
Deep-Dive Breach Detection
A Compromise Assessment is a comprehensive scan of your environment to determine if you have been breached in the past or are currently compromised. We use advanced forensic tools and threat intelligence to identify hidden indicators of compromise (IOCs) that standard security controls may have missed.
- Historical Analysis: Looking for evidence of past intrusions
- Active Threat Detection: Identifying current resident threats
- Forensic Analysis: Deep inspection of suspicious artifacts
- Clean Bill of Health: Verification of environment integrity
Threat Hunting (Standard)
Proactive Threat Search
Threat Hunting is the proactive, hypothesis-driven search for threats that evade existing security solutions. Our elite analysts leverage intelligence on the latest threat actor behaviors to comb through your data, identifying subtle anomalies that indicate malicious activity.
- Hypothesis-Driven: Based on latest threat intelligence
- Human-Led Analysis: Expert review beyond automated alerts
- Advanced Tooling: Leveraging EDR and log analysis platforms
- Actionable Findings: Confirmed threats and remediation guidance
Threat Hunting (Managed)
Ongoing Proactive Detection
Managed Threat Hunting provides continuous surveillance and analysis to detect potential security threats, even in the absence of overt signs of a breach. It includes regular updates detailing findings, analysis, and recommendations.
- Ongoing Monitoring: Continuous surveillance and analysis
- Light Threat Hunting Report: Regular updates detailing findings
- Weekly Updates: Email updates throughout the monitoring period
- Quarterly Threat Intelligence Report: Strategic insights
Dark Web Monitoring
Underground Threat Intelligence
Blackpanda's Dark Web Monitoring service provides an advanced layer of security, keeping a vigilant eye on the shadowy corners of the internet where cybercriminals operate. It actively monitors popular open and closed forums for mentions of your company, its IP, or data.
- Continuous Vigilance: Ongoing monitoring of dark web sources
- Comprehensive Coverage: Scanning forums, marketplaces, and social media
- Advanced Data Collection: Automated and manual collection
- Rapid Notification: Alerts for critical findings within 48 hours
Employee Offboarding Service
Insider Risk Mitigation
Blackpanda's Employee Offboarding Service ensures your sensitive information remains protected during critical transitions. We provide a thorough examination of all actions taken by departing employees on their computers, detecting any suspicious activity.
- Comprehensive Forensic Review: In-depth analysis of activity
- Continuous Monitoring: Ongoing review process
- Detailed Examination: Review of accessed files and emails
- Actionable Insights: Detailed report with remediation steps
Cyber Incident Response Investigations
Elite Digital Forensics
When attacked, you get 24x7 emergency dispatch from our elite local responders. We handle the full lifecycle from triage to containment and remediation
- 24/7 Emergency Dispatch Centre
- Elite Local Responders stationed across key Asian cities
- Forensic analysis and root cause identification
- Malware reverse engineering
- Detailed technical and executive reporting
Ransomware Negotiations
Professional Crisis Management
Expert negotiation services to manage communication with threat actors, aiming to reduce ransom demands and facilitate data recovery while adhering to legal and ethical standards.
- Threat actor profiling and communication
- Ransom demand validation and negotiation
- Sanctions checking and compliance verification
- Coordination with legal counsel and insurance
Insurance Claims Advisory
Seamless Claims Support
Our Insurance Claims Advisory is built directly into your coverage, ensuring that forensic findings from our DFIR team flow seamlessly into the claims process—accelerating approvals, reducing disputes, and getting you back to business faster.
- Integrated Response & Claims: Coordinated team from day one
- Real-Time Evidence Alignment: Technical findings mapped to policy
- Faster Settlement Timelines: Streamlined internal processes
- Coverage-Optimized Guidance: Advice on remediation steps
IR-1 Insured
Assurance + Insurance for SMBs
IR-1 Insured combines our IR-1 assurance subscription with embedded, discounted cyber insurance, offering a simple, accessible way for SMBs to protect themselves across the entire post-incident lifecycle.
- Lower premiums (up to 20% discount)
- No deductible on incident response services
- Faster, frictionless claims processing
- 24/7 access to expert incident response
IR-X Insured
Comprehensive Enterprise Resilience
IR-X Insured brings together every element required to manage the full lifecycle of a cyber incident: continuous assurance, rapid expert response, and cyber insurance — all seamlessly backed by our strategic consulting expertise.
- Unifies Readiness, Response, and Recovery
- Single, accountable partner across the journey
- Coordinated, efficient, and defensible stages
- Holistic cyber resilience strategy