Digital Forensics
Our digital forensics experts are cross-trained and multidisciplinary and use state-of-the-art methods and software to solve complex forensics problems. We use best evidence practices for a process that is repeatable and defensible.
Digital Forensics
We are able to make complex concepts and analysis accessible to the average user. Our highly-skilled and experienced team performs a range of services including:
- Forensic Collections: Cloud, Servers, Mainframes, NAS, SAN, Mobile, Desktop, Laptop, IOT Devices, Legacy, Archive, Backup Tapes, and other sources of ESI.
- Live acquisitions including the collection of volatile data
- Secure storage and review
- Forensic evidence handling
- Forensic analysis and reporting
- Deletion wiping and deleted file recovery
- Metadata review
- User and email file analysis
- Intellectual property theft analysis
- Activity timeline records
- Cryptanalysis and steganalysis
- Computer Forensics Investigation
Expert Testimony
Gemean’s experts have decades of experience working closely with litigation teams and law enforcement preparing the results of analysis to present in court or other legal proceedings. In addition to filing several affidavits and declarations and serving as court appointed special masters, Gemean’s forensic experts have testified regularly in legal proceedings. Many of these processings have resulted in a positive outcome for our clients.
Mobile Forensics
Our world is becoming more connected daily. Mobile devices are increasingly becoming an integral part of everyone’s daily life. With this comes an expansion of relevant data sources such as photos, voice files, text messages, and application data. Additionally, mobile devices also present various challenges for forensic experts as their models are constantly changing. Gemean uses the latest technology to keep up with the changing technology and rely on our experience and expertise to overcome any challenges we may face. Our experts have collected data from IOS, Android and legacy devices in response to litigation and/or cybersecurity investigations. The focus is not always only on data collection, but we also assist in collecting and integrating the cellular provider records into the matter.
Expert Testimony
Gemean’s experts have decades of experience working closely with litigation teams and law enforcement preparing the results of analysis to present in court or other legal proceedings. In addition to filing several affidavits and declarations and serving as court appointed special masters, Gemean’s forensic experts have testified regularly in legal proceedings. Many of these processings have resulted in a positive outcome for our clients.
Cybersecurity: Cyber Risk Assessments
How mature is your cybersecurity program? Are you at risk of a severe breach? Gemean has developed a sophisticated method to assess your ability to identify, avoid, mitigate, and manage cybersecurity risk. This process is done on-site in order for Gemean to understand the cyber risk associated with your organization. Our assessments will include, but not be limited to, the following:
Enterprise-wide Cybersecurity Program Review and Road Mapping
Gemean understands the nuances of different industries and their regulatory hurdles. Our consultants also audit the security controls of third-party vendors who have access to your data. We ensure that your business partners’ practices are organized, safe, and compliant as well.
Whether is HIPPA, GDPR compliance, NYDFS SEC, PCI, or any other compliance issue we are able perform client-specific assessment that marries strategy, risk management, investment, and risk-transfer decisions. These assessments are based on the National Institute of Standards and Technology (NIST) Cybersecurity Framework and we use other detailed risk matrices to confirm that your policies, training programs, and security infrastructure complies with applicable regulations. Our assessments include:
Data Breach Response and Notification
With data breaches occurring daily the demand for data breach response services is at an unprecedented level. Our data breach response team specializes in two areas.
Incident Response
- Immediate response analysis, resolution, and remediation.
- Data Breach Planning and Training: Developing and testing comprehensive incident response plans to minimize the impact of a data breach, including identification of cause and implementation of remediation measures for affected areas. Our team of professionals consider company processes, as well as roles and responsibilities of individuals throughout the organization.
- Continuous Threat Monitoring and Analysis: – After an incident we can offer monthly vulnerability scans. These scans ensure that critical systems are properly protected against current cyber-attacks and are up to date with all security patches.
- Cyber Incident simulation: We work with organizations to create a tailored simulation of an incident. These exercises are performed on site and can be in multiple locations depending on the organization size. The purpose of these exercises is to evaluate the effectiveness of the current incident response plan as well as educate key stakeholders on methods of handling and incident.