Forensics

Forensics

ICS offers forensic services to discover, analyze and document information in both proactive and reactive forensic circumstances. Many of our clients have found this service to be vital during personnel action, court order, civil action, and incident response situations.

Evidentiary Integrity

ICS has the knowledge and experience needed to achieve successful electronic evidence and data collection, protect evidentiary integrity, and provide factually accurate supporting documentation. As a technology security firm, we are well-qualified in this field and often provide supporting forensics documentation for clients to present to agencies such as the Department of Homeland Security, the Federal Bureau of Investigation, and state investigation agencies.

Litigation Support and Expert Testimony

ICS also provides litigation support with expert testimony in the event of court proceedings or prosecution.

Forensic Process

  1. Define Requirements: During the first phase of the forensics process, ICS will assess the situation and define the requirements of the project. This process often begins with a phone call in the middle of the night; the ICS team is available 24/7/365.
  2. Data Collection: ICS will begin data acquisition, obtaining log files, imaging hard drives,  and other data collection processes as soon as possible. In many cases we are on-site almost immediately; in other cases a court order must be obtained before data collection can begin.
  3. Data Analysis: During the data analysis phase, ICS will sift through the data and process it in forensically sound manner. Thorough reports with supporting documentation are prepared.
  4. Data Sharing: The data sharing phase is the time when all of the findings are presented to the client in a detailed and clear presentation that can be used to prepare for legal proceedings, if necessary.

It is our hope that your organization will never require ICS forensics services; however, should the need arise, we are prepared to act as your primary response team. Click here to contact us.

Veteran Owned Small BusinessCMMI Maturity Level 3CISSP® - Certified Information Systems Security ProfessionalCertified Penetration TesterITIL IT Service ManagementCertified Ethical HackerProject Management Institute CertifiedUS Department of Homeland SecurityDisaster Recovery Institute CertifiedCertified Information Systems Auditor