Forensic Analysis

keyboard key with blue fingerprint

PRIMARY CONTACT: Carl N. Kriebel CISSP

From a forensics standpoint, our trained experts will use the most advanced technology and analysis methods.

Our malicious file analysis often leads to the identification of indicators of compromise (IOCs), such as IP addresses or domains communicating with the malware, Microsoft registry key modifications, identification of child or sub-processes that have been launched, code injections, and file names or other attributes of not just the malicious payloads, but the related affected files as well. With this information, we can help you track down other instances of the attack on other systems or put preventative measures in place to block them from happening going forward.

Learn more about our Incident Response Process

View our additional IT Risk Advisory services and capabilities

Cybersecurity Resources

Resource Library

Explore our cybersecurity resource library, including case studies, whitepapers, best practices and expert thought leadership.

Learn More >

Our Thoughts On

Schneider Downs’ experts deliver analysis about the cybersecurity trends that impact our clients and organizations of all types and sizes.

Learn More >

contact us

Pittsburgh
Columbus
Metropolitan Washington