Indicator of Compromise Assessment

Our indicator of compromise assessment utilizes our extensive experience within cybersecurity to identify potential malicious compromise signatures that may already exist within your network and systems. This allows us to give you key insights into your environment to assess whether your organization may have already been the victim of a cyberattack.

The Schneider Downs cybersecurity team employs a comprehensive approach to cybersecurity and proactive incident response services that are part of our overall strategy to secure our clients’ networks and key systems. Below are some of the checks that are provided with an indicator of compromise (IOC) assessment:

  • Antivirus log analysis
  • Network device log analysis
  • Web filter log analysis
  • Windows event log analysis from key servers or endpoints
  • Forensic artifacts review of critical Windows systems
  • Cloud log analysis (e.g., Azure, AWS, or O365)
  • Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) log analysis
  • Security Information and Event Management (SIEM) log analysis
  • Email security appliance or software log analysis
  • Network device firmware integrity checks
  • Access point (AP) log analysis
  • Sensitive application/web security log analysis

While the primary goal of the assessment is to determine if there is already a compromise of critical systems, Schneider Downs will also provide a security architecture review and recommend improvements to improve the multiple layers of security protecting your organization. This includes reviewing the following items, leveraging our extensive client experiences:

  • Web filters
  • Antivirus products
  • SIEM products
  • IDS / IPS (integrated firewalls or standalone devices)
  • Data Loss Prevention (DLP) Software
  • Email Security Products
  • Cybersecurity User Education
  • Network Architecture
  • DMZ Architecture
  • Patch Management
  • Windows Event Logging Analysis

case studies

 
big problem:
A not-for-profit client out of 401(k) compliance.
big thinking:
Allowing more contributions by highly paid employees.
 
big problem:
Hackers attempting a six-figure wire transfer.
big thinking:
Rapid action spearheaded active containment and response.

our thoughts on

The Dichotomy of Cybersecurity in Higher Education

Cybersecurity in the higher education (Higher Ed) realm faces many challenges. Unlike corporate entities, there may be many groups outside of central IT

read more >

New features for enhanced password protection in Azure Active Directory

In a previous Our Thoughts on Article, we described a threat to organizations known as password spraying, in which an attacker attempts to login to all

read more >

Using Your Mail Server Against You

Occasionally on penetration testing/ethical hacking engagements we encounter misconfigured mail servers which creates an opportunity to either gather information

read more >

California First to Require IoT Security

The majority of cyber-attacks are not targeted, rather they are opportunistic, using automated phishing and vulnerability scans. Attackers usually identify

read more >

Better Understanding PCI Penetration Testing Requirements

If your company takes credit cards, you may be wondering if you are required to have a penetration test. In the past, it had been voluntary, but with PCI

read more >

Have a question? Ask us!

We’d love to hear from you. Drop us a note, and we’ll respond to you as quickly as possible.

Ask us

contact us

Map of Pittsburgh Office
Pittsburgh

One PPG Place, Suite 1700
Pittsburgh, PA 15222

contactsd@schneiderdowns.com
p:412.261.3644     f:412.261.4876

Map of Columbus Office
Columbus

65 East State Street, Suite 2000
Columbus, OH 43215

contactsd@schneiderdowns.com
p:614.621.4060     f:614.621.4062