Incident Response
When a breach hits, every minute expands the blast radius. Our certified DFIR team engages within one hour, contains the threat, performs full forensic analysis, and restores operations — with regulator-ready documentation at every step.
Under 1-hour response
Retainer clients receive SLA-backed activation within 60 minutes of the initial call — 24 hours a day, every day of the year.
Contain first, investigate second
We immediately stop the bleeding — isolating hosts, blocking C2, revoking credentials — then methodically reconstruct the full attack narrative.
Regulator & insurer ready
Every engagement produces forensic-quality documentation accepted by cyber insurance carriers, regulators, and law enforcement.
A full-lifecycle Digital Forensics & Incident Response capability
Every engagement is led by GCFA-, GCIH-, and GREM-certified responders following NIST SP 800-61r2 and SANS PICERL methodology — the standards regulators, auditors, and cyber insurance carriers expect.
Rapid containment
EDR-driven host isolation, firewall C2 blocking, credential revocation, and domain-wide Kerberos ticket invalidation — executed within the first hour to limit blast radius.
Deep forensic analysis
Memory acquisition and volatility analysis, disk forensics, log correlation across SIEM and EDR telemetry, and malware reverse engineering to recover the complete attacker timeline.
Validated recovery
Clean rebuild procedures, controlled re-admission of isolated hosts, credential rotation, and monitoring tuning to ensure the adversary has no path back in.
Defensible documentation
Chain-of-custody artifact handling, executive after-action report, technical forensic timeline, and compliance-ready attestations for regulators, insurers, and legal counsel.
How does it work?
Retainer clients call our 24/7 hotline and reach a senior responder within 60 minutes. We triage the severity, mobilize the DFIR team, and begin containment while your internal IT continues business-critical operations. Throughout the engagement, we provide daily situation reports to leadership, legal, and insurance contacts — with the final after-action dossier delivered within 10 business days of closure.
For organizations without a retainer, emergency engagements are billed at standard hourly rates with best-effort response times. We strongly recommend securing a retainer before an incident occurs — both to guarantee SLA-backed response and to satisfy cyber insurance policy requirements.
A six-phase lifecycle aligned to NIST SP 800-61r2
Every incident — whether a ransomware event, business email compromise, or insider-threat investigation — follows the same disciplined methodology trusted by federal agencies, Fortune 500 security teams, and Big Four auditors.
Detection
Triage the initial alert, confirm malicious activity, and classify incident severity (P1–P4).
Analysis
Scope the compromise, identify affected assets, and determine attacker objectives.
Containment
Isolate affected hosts, block C2, revoke credentials, and prevent lateral movement.
Eradication
Remove persistence mechanisms, kill attacker sessions, and close exploited vulnerabilities.
Recovery
Validate clean state, restore services, re-admit users, and confirm monitoring integrity.
Lessons Learned
Produce after-action report, run tabletop exercise, and harden controls against recurrence.
What happens inside an iSECTECH IR engagement
Every phase backed by specialized tooling, documented procedures, and senior engineers with thousands of hours of real-world breach experience.
Triage & Rapid Containment
Within the first hour we classify incident severity, mobilize the appropriate response team, and execute containment: EDR-driven host isolation, firewall-level C2 blocking, domain credential rotation, Kerberos TGT invalidation, and immediate removal of compromised accounts from privileged groups. Every action is logged with timestamps, operator identity, and technical justification — preserving evidentiary value for later proceedings.
Forensic Analysis & Root Cause
Memory acquisition via volatility frameworks, disk forensics across affected endpoints, SIEM and EDR log correlation, and malware reverse engineering reconstruct the complete attacker timeline: initial access vector, persistence mechanisms, credential theft, lateral movement path, data staging, and exfiltration attempts. Every indicator is documented with MITRE ATT&CK® technique IDs and shared in STIX format for downstream blocking.
Dwell Time & Business Impact Reduction
IBM's 2024 Cost of a Data Breach Report found that organizations containing breaches within 30 days saved an average of $1.2 million over those that didn't. Our median time-to-contain across retainer clients is under 60 minutes — an order of magnitude ahead of the 204-day industry average for undetected breaches. Faster containment directly translates to lower business interruption, smaller data loss, reduced regulatory penalty exposure, and lower cyber insurance claim amounts.
After-Action Report & Lessons Learned
Within 10 business days of incident closure, you receive a comprehensive dossier: executive narrative for the board, technical forensic timeline for engineering, indicators-of-compromise export for threat intel sharing, MITRE ATT&CK® technique mapping, remediation roadmap with priority scoring, and compliance appendix for regulatory disclosures. An optional tabletop exercise based on the real incident is included for retainer clients — turning a breach into a training asset.
Lock in guaranteed response before you need it
Without a retainer, emergency IR engagements run $450–$750 per hour with no SLA and no guarantee of availability during a widespread event. A retainer gives you a pre-signed MSA, locked-in rates, and priority response when every minute costs money.
IR Readiness
For small businesses and SMBs needing a signed IR partner to satisfy cyber insurance requirements and basic regulatory readiness.
- 24/7 hotline access
- 4-hour initial response SLA
- Pre-signed MSA & SOW templates
- Annual IR plan review
- Overage rate: $325/hr (vs $600 emergency)
- Unused hours convert to tabletop exercise
IR Standard
The standard retainer for mid-market organizations with compliance obligations (SOC 2, HIPAA, PCI DSS) and cyber insurance requirements.
- 24/7 hotline · 1-hour SLA
- Dedicated senior responder lead
- Annual tabletop exercise included
- Quarterly threat-briefing sessions
- EDR / SIEM integration pre-onboarding
- Overage rate: $275/hr (vs $600 emergency)
- Regulator & insurer documentation included
IR Elite
For regulated enterprises, financial services, healthcare systems, and organizations under DFS-500, CMMC, or FedRAMP with zero-tolerance for dwell time.
- 24/7 hotline · 30-minute SLA
- Named dedicated IR director
- Semi-annual tabletop exercises
- On-site response option (CONUS)
- Threat-hunting sprints included
- Overage rate: $225/hr
- Board-level briefings on request
SLA commitments you can hold us to
Every retainer tier carries specific, contractually-binding response commitments. No "best effort" language, no escape clauses.
Frequently asked questions
Common questions about incident response engagements and retainers. Talk to our IR director for anything else.
We think we might be breached right now — what should we do?
Do we really need a retainer if we have cyber insurance?
What's the difference between emergency IR and a retainer?
What happens if we don't use all our retainer hours?
What certifications do your DFIR responders hold?
Can you support us through ransom negotiation?
How do you handle chain of custody for legal proceedings?
Do you report to law enforcement or regulators on our behalf?
Learn more about incident response
Playbooks, case studies, and regulatory guidance from the iSECTECH DFIR team.
The first 60 minutes of a ransomware incident: a CISO's runbook
The exact sequence of decisions to make, calls to place, and containment actions to execute in the critical first hour — before investigators even arrive.
Read more52 minutes to contain: a manufacturing ransomware event
How an iSECTECH retainer client stopped a LockBit affiliate mid-encryption, recovered production within 18 hours, and avoided a $2.4M ransom demand.
Read moreChoosing an IR retainer: what your insurance carrier actually wants
The specific retainer provisions that satisfy modern cyber insurance underwriters — and the language in many retainer contracts that will fail their review.
Read moreDon't wait for a breach to find a responder
Three ways to engage — whether you have an active incident right now or want to lock in protection before the worst happens.
Active breach? Call 1-800-325-1874
Our 24/7 hotline connects you directly to a senior responder within minutes. No gatekeepers, no triage tickets — just expert help.
Secure a retainer
Book a 30-minute conversation with our IR director. We'll size the right tier for your environment and have your contract ready for signature within 5 business days.
Download the IR runbook
Free 22-page incident response runbook template, ready to customize for your organization — includes escalation trees, comms templates, and first-hour checklists.
Stay Secure with the Latest Cyber Security News and Trends
Threat Landscape
IoT Security
Social Engineering
Zero Trust
Incident Response
Cloud Safety
