You are here
Cyber-Security Incident Response Team (CSIRT)
Cyber-Security Incident Response Team (CSIRT)
We provide our CSIRT services on a continuous 365x24x7 basis to react quickly to incidents and guarantee the availability of our resources during critical periods.
In the event of an incident, you can reach your CSIRT contact on a dedicated and secure communication channel and will we immediately assign the technical experts required to resolve the incident quickly.
With a pool of specialists in various aspects of security and technology, working with the National CERT (Cert.be), we provide a full range of services and support solutions to help you handle incidents and manage crises:
Before an incident
- Defining a Cyber‑Security Incident Response Plan
- Designing the Cyber‑Security Incident Response Organisation
- Watching security and cyber‑threats trends
- Simulate, practise and validate incident‑handling in our CyberLab
During the crisis
- Detecting and identifying Cyber‑Security Incidents
- Handling a Cyber‑Security Incident (contain, eradicate and recover)
- Communicating during a Cyber‑Security Incident
After an incident
- GDPR breach notification
- Learning from past incidents
- Digital forensics
Our practices are based on the principles and the guidelines from ISO/IEC 27001, the NIST and the SANS Institute, Cert.be, the Cyber‑Security Incident Management Guide from the Belgian Cyber‑Security Coalition (c).
Our CyberLab services are provided in partnership with THALES BELGIUM.
THE CYBER‑THREAT IS NEVER‑ENDING AND EVERYWHERE
The digitization and globalisation process has opened the door to numerous vulnerabilities to cybercriminals. These weaknesses make information security a critical issue for all organisations.
Cyber‑security is a hot topic in all industries, as well as in the public sector. Except for larger organisations, most do not have sufficient internal security expertise, nor can they afford to have their own dedicated CSIRT. Cybercriminals tend either to look for easier targets or to target giants for their own glory.
Also, very few organisations manage their security in a comprehensive and dynamic way, leaving potential vulnerabilities open. This means that the risk of a cyber‑attack succeeding is very high.
The frequency of incidents is increasing rapidly. Ransomware and other virus attacks, identity thefts, website defacements, data privacy breaches, internal fraud and Denial of Service (DoS) attacks are just a few examples of unfortunate incidents that endanger your business or service.
YOUR NEED FOR A CSIRT
Our CSIRT services are worth their weight in gold whenever you need to handle cyber‑security incidents and crises efficiently. Typically:
- Before any incident occurs, you want to be prepared for handling incidents and crises in a structured and efficient way,
- When an incident occurs, you want to quickly and effectively detect and handle them so that you can reduce the impact and any negative consequences,
- After an incident, you want to learn from past incidents and improve your processes.
During this cycle, communication with both internal and external stakeholders is of critical importance: partners, customers, media, authorities, law enforcement agencies, National CERTs, etc.
Are you under attack? Not prepared to react?
Then contact us without delay!
“Edenred takes privacy of its customers and employees very seriously. In Approach we found an ideal partner to help us assess our maturity level against the General Data Protection Regulation, establish and drive a roadmap with the objective to meet our compliance obligations.” Koen Reyniers, COO BENELUX EDENRED
Publications & events
Published on 14 December 2017
Approach service offering and mission - brochure
We enable our customers to succeed by delivering state‑of‑the‑art solutions to cyber‑security challenges.
Published on 26 February 2018
Can we really trust an antivirus when it comes to unknown threats?
Approach CSIRT Team reproduced a similar attack in its lab ...
Published on 27 February 2018
Securing your company against SPECTRE/MELTDOWN
Many articles, security bulletins, news and papers have been published so far on how these vulnerabilities can be addressed. This article...
Published on 04 April 2018
Rise of DDoS Amplification Attacks
Since the end of February 2018, we’ve seen a rise of DDoS Amplification attacks, with in some case more than 1Tbps of traffic generated. ...
Published on 09 May 2018
The mechanism of a targeted phishing attack
Several cases of targeted phishing by email have been reported by some of our clients. Download our white paper to learn more about...
Published on 05 June 2018
Approach is recruiting IT Security experts
The Waldorado team from RTL TVI visited us to know more about our activites and the profiles we are recruiting. Watch the movie !
Mechelen - Lamot Congres(1 day )
Approach at the Belgian Cyber Security Convention
Our cyber-security experts will organise an interactive game "How I hacked a folder". Be one of the actor of this...
Published on 12 October 2018
How do you deal with low risk level vulnerabilities ?
Nothing should be left behind when speaking in terms of security... A story by David Bloom, Cyber-Security Consultant at Approach.
Published on 12 December 2018
Approach is now ISO 27001 certified!
Approach has been awarded certification for ISO/IEC 27001:2013, the widely recognised and respected worldwide standard for Information...
Published on 21 January 2019
Why should your organisation go for ISO27001 certification?
Digitised services are exposed to a broad spectrum of cyber-threats attacks. Obtaining the ISO27001 certificate can be a...
Brussels Expo (2 days )
Approach at Infosecurity Belgium 2019
Join us at Infosecurity on March 20th and 21st !
Published on 10 January 2019
Approach is nominated Trends Gazelles 2019
This nomination is a nice recognition of our sustainable...
Web Contest (19 days)
Master CyberSecurity Tournament: Approach CTF is ready!
The students in Master CyberSecurity will have 19 days to find more than 20 flags.