Cyber Forensic – Scientific investigation
Despite all the protections put in place, it sometimes happens that an IT security incident occurs in the Organization. This can arise from internal wrongdoing (for example, a dishonest employee) or external (during a targeted attack, industrial espionage or other).
We then call upon forensic Sciences investigation techniques and its web counterpart, cyber-forensic. More concretely, it involves collecting all evidence or proof in order to determine potential flaws and responsibilities.
This evidence must be susceptible to being accepted by Justice courts.

The right questions:
- Who attacked the system? in order to prevent other potential attacks by the same person or malicious entity,
- How was the attack conducted? which helps prevent similar weaknesses in other systems;
- Did the attacker hide anything in the system that could cause additional damage later?
To meet these needs, our specialists offer a range of specialized Forensic Sciences services by applying professional methods using sophisticated investigation tools that are continuously updated.
When the need justifies it, we can also help set up a small turnkey forensic laboratory by providing:
- Relevant analysis methods and processes / documentation,
- Specific cyber forensic Training,
- Necessary specific equipment (hardware & software),
- Recommendations
Furthermore, our teams are authorized to perform preventive exercises sometimes including penetration tests only upon express request from the user.