blank
  • About
    • Our Story
  • Services
    • DFIR
    • GRC-A
    • Offensive Security
    • Restoration
    • Security Engineering
    • Security Operations Center
  • Industries
    • Healthcare
    • Higher Education
    • Retail
    • Financial Services
    • Manufacturing
    • Government & Non-Profit
  • News & Events
  • Best Practices
  • Newsletter
  • Careers
  • Blog
  • Contact
Shape
Shape

Digital forensics & incident REsponse

More about our DFIR Response Team and how we respond to threats and incidents.

who we are - xx

The Lodestone Digital Forensics and Incident Response (DFIR) team is built to respond to potential and confirmed security events and incidents with the speed and precision necessary to support analysis, containment, and recovery. Our methodology is driven by extensive, real-time threat intelligence gained from our experience responding to thousands of incidents, as well as up-to-the-minute intelligence garnered from other prime sources. When an incident occurs, Lodestone experts provide a thorough analysis of the cause and extent of a breach through the use of advanced tools and techniques in memory, network, and file system forensics. We then work with you to go beyond restarting business operations and expediting recovery by strengthening your security posture and proactively assessing for further threats.

iStock 1179944172

FORENSIC CHECKUP

+

Whether your company is preparing for a merger or simply looking to maintain a strong security posture, health checks can help keep you, your partners, and your customers safe. As part of a health check, Lodestone experts use investigative tools to perform a highly technical forensic analysis of your environment. This includes triage and searching for telltale indicators of compromise to determine whether your environment can be considered clean of malicious activity. 

We reflect our findings in a health report that gives you a clear look into your current security hygiene and allows you to take control of your cyber health.

downloadForensic Checkup

LAW ENFORCEMENT SUPPORT

+

Digital forensics and incident response (DFIR) often work in tandem, but sometimes the need for an investigation goes beyond responding to a breach. Lodestone experts are available to assist with the collection and data analysis of a wide range of evidence sources, including physical drives, virtual machines, log sources, and more.

Whether hardware or software, if it’s digital, we can “forensicate” it. We help your company gather the data it needs for an investigation without the need to build out your own digital forensics lab.

downloadLaw Enforcement Support

LITIGATION SUPPORT SERVICES

+

Digital forensics experts at Lodestone are available to provide expert witness testimony on digital evidence in legal proceedings. With years of collective experience in collecting and analyzing digital evidence, Lodestone professionals meet the required criteria in most states to serve as expert witnesses.

Testimony can be provided for not only cases Lodestone has assisted with, but also through expert assessments of reports or evidence supplied by third parties.

downloadLitigation Support Services

ASSUMED BREACH ANALYSIS

+

Are you worried that the call is coming from inside the house? If your company is concerned that they have already been breached, Lodestone professionals will help you get to the truth of the matter with a forensic investigation of your environment.

Our experts will hunt for evidence of compromise across any and all desired systems and report back with insights into your current state of security. Whether we can prove that a security incident has occurred, there is no evidence of a compromise, or anything in between; Lodestone is prepared to equip you with the knowledge you need to make your next move.

downloadAssumed Breach Analysis

BUSINESS EMAIL COMPROMISE INVESTIGATION

+

Lodestone’s experts have extensive experience in business email compromise cases (BECs) for myriad types of mail environments, including on-premises Exchange and cloud-hosted email configurations. We will collect evidence, perform a thorough analysis, and provide regular updates and findings throughout the investigative process.

In addition, the bespoke tools and experience at our disposal enable us to provide some analyses for specific email environments at fixed-fee rates.

downloadBusiness Email Compromise Investigation

INSIDER THREAT RESPONSE

+

When a suspected breach comes from within your company, Lodestone experts can serve as your trusted advisor to determine the scope of the investigation.

Whether we deliver evidence or report on a lack of evidence to support insider threat activities, Lodestone professionals can help arm you with the knowledge you need to make key decisions. Lodestone is experienced with numerous cases, and various insider threat techniques, including thumb drives, web portal exfiltration, and beyond, and has the experience to detect any evidence of potentially nefarious behavior and deliver our findings in a clear and easy-to-reference format.

downloadInsider Threat Response

PAYMENT FRAUD INVESTIGATION

+

Often coupled with other types of investigations Lodestone handles, including business email compromises (BECs) and insider threats, attempted and successful payment fraud is growing increasingly common.

Our experts are experienced in identifying key evidence and performing detailed analysis on the timelines around suspected payment fraud to help determine what happened and how. Receive findings and updates every step of the way, along with a final report that summarizes the work performed and the conclusions made.

downloadPayment Fraud Investigation

PROTECTED DATA BREACH RESPONSE

+

Accessing and exfiltrating protected data, including data covered under standards such as the Health Information Portability and Privacy Act (HIPAA) and Payment Card Industry Data Security Standard (PCI-DSS), is often the goal for many threat actors.

Whether the data breach began with a business email compromise (BEC), a ransomware event, insider threat, or another intrusion vector, Lodestone professionals turn the full force of their expertise towards investigating the source of these breaches and the extent of the effect they had on your environment.

downloadProtected Data Breach Response

RANSOMWARE RESPONSE

+

Lodestone stands ready to perform incident response for ransomware and suspected ransomware events. Our highly skilled experts will work with you to collect evidence and perform an in-depth investigation with minimal disruption to your business flow. 

Lodestone professionals will interface with any additional groups to support your best outcome against ransomware and ransomware groups.

downloadRansomware Response

Connect With Us

320 East Main Street
Lewisville, TX 75057

203.307.4984

blank

An elite cyber security force

If you have a breach contact us at info@lodestone.com

Linkedin-in Twitter
  • About
  • Services
  • Industries
  • News & Events
  • Best Practices
  • Newsletter
  • Blog
  • Careers
  • Contact
  • Privacy Policy

©2023 Lodestone
Lodestone Security is a wholly owned subsidiary of Beazley plc. Lodestone provides computer security and cyber security consulting services. Lodestone does not provide insurance services and client information obtained by Lodestone is not shared with Beazley claims or underwriting. Likewise, client information obtained by Beazley claims or underwriting is not shared with Lodestone.