Digital Forensics

Investigating and processing IT security incidents and implementing sustainable improvements.

Securing evidence, clarifying incidents, dealing with risks.

Digital Forensics

Securing evidence, clarifying incidents, dealing with risks.

The aim of digital forensics is to collect information, analyze correlations and present results. In this way, evidence of criminal access to your IT systems can be provided and incidents investigated as completely as possible. Our digital forensics experts use modern methods, technology and software to extract data from computers, mobile phones, networks and other digital devices, make it readable and investigate it.

From (email) fraud, data theft and encryption through ransomware to white-collar crime, we can provide you with expert support in investigating digital incidents. Trust our experienced team to shed light on the depths of the digital world.

Our offer for you

BDO Cyber Security GmbH offers you tailored solutions and services as a partner for digital forensics and IT security to investigate security incidents and protect you against future attacks!

Investigation of Security Incidents

Have you experienced a security incident, or do you have suspicions and need a thorough and swift investigation? Contact our experts!

We possess a wide range of competencies and experiences in digital forensics and specialized areas such as: malware analysis, network analysis, log analysis of large data volumes, investigation of various operating systems (Linux, Windows, macOS, BSD, AIX, and others), analysis of mobile devices, or complex production or corporate networks.

We always treat your concerns confidentially and base our analysis on facts rather than assumptions.

Our approach is aligned with established standards, such as the IT Forensics Guidelines from the Federal Office for Information Security (BSI). We create forensic data backups and utilize well-established software and techniques during the analysis and investigation.

Your Benefits

  • Adherence to the chain of custody
  • Identification of the root cause of an incident and, in the case of malware infections, determination of the so-called "Patient Zero"
  • Professional advice on the assessment and management of the incident
  • Development of an action plan to mitigate risks and safeguard against future incidents

Preparation of Detailed Reports

Do you need a comprehensive report regarding an IT security incident? Whether for you, your insurance company, or in the context of civil or criminal proceedings – our experts have extensive experience in creating audience-oriented and meaningful documents. 

We always ensure that the documented results are based on reliable facts and that our approach is described in a comprehensible manner. Conclusions drawn by us will be clearly highlighted as such in the document. We present technical relationships in an understandable way without withholding information from you.

Through our high standards and internal quality assurance, we consistently deliver high-quality results.

Your Benefits

  • Clarification of complex technical issues in an audience-oriented language and format
  • Traceable documentation of the initial situation, the methodological approach, and the results to meet high standards, such as those required in criminal proceedings
  • Customized in terms of form and scope to meet your needs

Forensic Readiness Workshop

Many companies only consider their approach to handling security incidents after an event has occurred. This way, they lose valuable time in restoring systems and securing exploited vulnerabilities. Are you prepared for a security incident?

Our offering in the area of forensic readiness prepares you for the worst-case scenario through a workshop!

Together with you, we identify areas for improvement in your IT infrastructure to better investigate security incidents. Additionally, we train your employees in handling digital evidence to prevent the unintentional destruction of traces. 

Your Benefits

  • Enhancement of the security level of your IT infrastructure
  • Increased efficiency in addressing security incidents, thereby reducing consequential costs
  • Preparation for potential criminal or civil investigations following an incident
  • Consideration of organizational and legal frameworks in the handling of security incidents

Second Opinion / Audit Support for Digital Incidents

Do you have concerns about the handling of a past security incident? Would you like an independent review to ensure that no important details were overlooked and that opportunities to improve were thoroughly identified?

Obtain a second opinion from our experts in digital forensics!

Our experienced team conducts a thorough review of previous investigations, reanalyzes data, and examines forensic reports to identify potential gaps.

We always operate objectively and impartially.

The results of our review are presented in a format and scope tailored to your needs.

Should we identify gaps in the handling of an incident, we will also create an action plan to improve your security strategy. Trust our expertise to ensure that your security measures are robust and effective.

Your Benefits

  • Objective, fact-based assessment of your incident
  • Expert evaluation of your previous security strategy and incident handling
  • Expert assessment within the framework of (IT) audits regarding past incidents and their handling
  • Improvement of your security level and risk reduction through the identification of gaps and the establishment of measures

Our Expertise

At BDO Cyber Security GmbH, we take pride in our expertise and commitment to continuous education in the field of digital forensics. Our experts regularly attend conferences and training sessions to stay up to date with the latest technologies. Additionally, we actively invest in specialized certifications and qualifications to ensure that we can always provide you with the best possible advice and support.

Our digital forensics team holds various professional certifications, including:

  • BSI Incident Expert
  • GIAC Advanced Smartphone Forensics (GASF)
  • GIAC Certified Detection Analyst (GCDA)
  • GIAC Certified Forensic Analyst (GCFA)
  • GIAC Certified Incident Handler (GCIH)
  • GIAC Certified Intrusion Analyst (GCIA)
  • GIAC Cyber Threat Intelligence (GCTI)
  • GIAC Network Forensic Analyst (GNFA)
  • GIAC Reverse Engineering Malware (GREM)
  • CISSP Certified Information Systems Security Professional

Contact us!

Nils Stünkel

Nils Stünkel

Manager | Cyber Incident Response & Crisis Center (CIRCC)
personView bio
Tobias Kasch

Tobias Kasch

Senior Manager | Cyber Incident Response and Crisis Center (CIRCC)
personView bio