Why Choose ThreatDefence As Your Incident Response Partner: At ThreatDefence, we’ve encountered numerous significant cybersecurity incidents both in Australia and across the globe. On more than one occasion, we found ourselves in situations where multiple teams were involved in the response effort, yet progress remained elusive. The growing disconnect between the technical teams and the business added to the frustration, as critical answers remained elusive amidst a sea of uncertainties. Our IR approach is grounded in technology, experience and common sense. We firmly believe that Incident Response should never happen in isolation. Instead, we supplement it with our SecOps platform, providing deep visibility and scalable evidence records from the onset of our Incident Response engagement. We believe in practical leadership and common sense. We stand by the principle of deep visibility, enabling us to substantiate our findings with clear and compelling evidence. We advocate for ongoing monitoring, allowing us to support our efforts with ongoing assurance.
1 Digital Forensics Memory forensics and volatile data capture from live systems Disk forensics and file system analysis across Windows, Linux, and macOS Log forensics across endpoints, servers, cloud platforms, and identity providers Malware analysis — static and dynamic — including reverse engineering where required Network forensics and full packet capture analysis Email forensics — header analysis, attachment investigation, account access history Mobile device forensics where relevant Court-admissible evidence collection procedures with chain of custody maintained throughout Expert witness reporting capability for legal proceedings
2 Incident Containment & Eradication Endpoint isolation at scale — automated through the ThreatDefence platform, not manual system-by-system action Compromised account suspension, password reset, and MFA token revocation Malicious IP, domain, and file hash blocking at firewall, DNS, and endpoint layers simultaneously Identification and removal of all attacker persistence mechanisms — backdoors, scheduled tasks, registry modifications, WMI subscriptions, startup items, webshells Active Directory attack path identification and remediation — including Kerberoastable accounts, DCSync rights, and excessive delegation Complete environment validation: ThreatDefence does not declare an environment clean until every corner of it has been searched
3 Business Restoration Critical system triage — business impact assessment to prioritise recovery order Workstation and server reimaging to known-good state Active Directory and identity infrastructure rebuild and hardening Backup integrity verification prior to restoration — including ransomware pre-staging check Network hardening applied before systems return to production Side-by-side support for your internal IT team throughout recovery Application and service validation after restoration
4 Threat Actor Negotiation Direct negotiation with threat actors on the organisation’s behalf Verification of decryption capability before any payment is considered Intelligence-driven negotiation strategy using findings from the forensic investigation Knowledge of major threat groups’ behaviour patterns, payment preferences, and track records Coordination with legal counsel and cyber insurer throughout the negotiation Full documentation of all negotiation activity for insurance claims and regulatory purposes
5 Cloud & Identity Incident Respons Microsoft 365 Unified Audit Log forensics — mail access, file access, admin actions Entra ID / Azure Active Directory compromise investigation and remediation OAuth application abuse detection — identifying and revoking malicious app grants AWS CloudTrail and IAM forensics — determining what was accessed and by whom Azure and GCP infrastructure investigation and hardening SaaS platform data exposure scoping — what could the attacker access via compromised accounts? Cloud identity rebuild and conditional access hardening post-incident
6 Regulatory & Legal Support Notifiable Data Breaches (NDB) scheme notification support — determining whether the threshold is met and preparing the notification Evidence packages prepared for legal proceedings — civil litigation, criminal referral, employment action Cyber insurance claim documentation — incident timeline, root cause, financial impact quantification Expert reports for regulatory investigations and inquiries.