brl Cyberknotts

Incidence Response Service

Screen Shot 2020-05-27 at 7.47.23 AM.png

BRL has the capacity to meet both small and large Cyber Security needs with ability to deploy over 3000 Cyber Specialist, from capital hill to silicone valley, our Cyberknotts are there when you need them!

We tailor the solution to meet you compliance requirements. Attacks on your Cyber security range in severity from a distraction to operation crippling and even fatal. BRL Cyberknotts has dedicated cyber breach incident responders in several countries to help you quickly investigate cyber incidents and thoroughly remediate the environment to get things back to normal.  Cyberknotts have a deep understanding of both existing and emerging threats and their rapidly changing tactics, techniques and procedures. Cyberknott experience ranges from Government work with major contractors in the military environment and for general businesses from SMB’s to conglomerates.

Resources include investigative and remediation expertise with industry-leading threat intelligence with network and endpoint technology to help you with a wide range of threats — from technical response to crisis management. Whether you have 100, 1,000 or 100,000 endpoints, BRL Cyberknotts consultants can be active in a matter of hours, working in compliance with your Breach Lawyer’s standards and attack classification process, or if you don’t have one developing the workplan quickly from the current best practices. Most companies have their own selected security solutions, where possible BRL Cyberknotts works with these systems initially in assessing the situation.  Your Lawyer (Breach Lawyer) will have categorized the breach and decided if the nature of the work requires cyber forensics. 

Immediately a determination is made to involve forensics a special level of Cyberknott is required.  BRL using the appointed Lawyer’s required compliance elements and processes will assess the level of expertise required for the various levels of need that can include attendance at court, forensic analysis isolation facilities, required procedures to involve law enforcement, the reports required and their format, available qualified technicians are reviewed with their manager and the “job” provisioned with any BRL Cyberlab. requirements.

Breach work in all its forms is treated similarly with special attention to costs and overhead to categories of breach where costs are to be paid by a third-party such as insurance.   

In basic terms the work to be done needs to be categorized and once categorized by either “Best Practices” or by the breach lawyer’s compliance.  The remedial work can be resourced. It might require initial Breach assessment or Breach remediation.  in which case analyzing your networks for malicious activity to help you get back to business as usual with confidence quickly and efficiently.

Breach Disaster Averted!

BRL Cyberknott services are offered on a simple wholesale model to improve an MSP’s value add, and to meet a specific Breach Lawyers compliance requirement for Forensics, Breach analysis and remediation.  Cyberknotts work under strict NDA. Cyberknotts operate worldwide sometimes, remotely where personal attendance is impractical.

BRL CyberLab

Many of the same programs and processes used in multi-million-dollar cyber labs are available to run on portable equipment.  Lab locations and their resources, facilities that can be rented in various parts of the world from their owners (locations and conditions of use are available to BRL Cyberknotts if required).  The BRL cyber labs are sterile running operating systems and Cyber forensic software as selected and required by the Cyberknott for the specific forensic exercise.  These solutions are loaded onto sterile systems and assigned to safe keeping and secured by BRL Host protection against malware of any kind no matter the source.

Do something different for the future!

electronic.jpg

Cyberknotts are highly experienced IT professionals with experience spanning 10 - 40 years in sophisticated computer systems and their defense from all manner of attack.  The BRL policy Cyberknotts are required to accept includes that an Attorney hired specifically to address Beach analysis must be followed in today’s environment to void further client issues of compliance. 

There are four distinct parts to incident response and the process starts long before an incident is observed. The size of the company and the real experience of the Attorney will determine the relative success of the venture.

Your Attorney readiness plan should keep you compliant and probably your insurance cover current.  BRL has Best Practices if you don’t have a lawyer or insurance, but if you do Cyberknotts will work with them to provide a compliant response that will augment your insurance not attempt to reinvent your wheels in mid crisis. 

Prepare for the worst, you are of course interested in the company or corporation, but most of the cyber issues are caused by individuals not being aware or making a mistake, or worse. 

The following list of remediation activities are supported by some quite sophisticated computer programs often the same ones the hacker used to rob you and cause the initial incident alerts in the first place, they are constantly under review and development by their supplier and just as often targeted by hackers for methods to beat them.  Indeed “The Industry” will tell you there is no way to avoid the notorious Zero Day attack, the best you can do is monitor constantly and try to detect malicious trending before it becomes deadly.  We believe Artificial Intelligence is no match for the real thing.

Resourceful planning, Risk analysis, Compliance to a fault, Personnel policies that don’t build enemies all have a place in cutting to a minimum recurring errors that make the following simple looking process what should be a regular  way of existence during the life of an average company.

Resourceful planning

1.     Plan

2.     Develop Processes

3.     Test the theories

4.     Drills run penetration tests

Proven detection processes

1.     Analysis

2.     Know the removal drills

Identify the issue

1.     Contain the threat

2.     Remove the threat

3.     Get back to business

After the battle

1.     Postmortem

2.     Re-evaluate strategies

Re-planning and listening to common sense, how much value can you really expect to get from the advice of an entity that relies on failure (yours) for success (Its own).

BRL Cyberknotts chairman at work!

Gordon speaking to private equity group and their lawyers in Irvine California.

Project planning Information (Based on 2019 – 2020 data) rates supplied by BRL

Anticipated Cyberknotts Rates based the job function

Title Daily (US/UK) Ranges in US $

Computer security specialist $302 – $513

Cyber security analyst $324 – $508

Information security engineer $410 – $616

Information security manager $481 – $702

Anticipated Cyberknotts Rates based on experience

Years of Experience Daily (US/UK) (Avg. US$)

0-5 years $315.00

5-10 years $480.00

10-20 years $535.00

20+ years $595.00

Professional Cyber Forensics Qualifications held by Cyberknotts

  • Certified Computer Forensics Examiner (CCFE)

  • Certified Mobile Forensics Examiner (CMFE)

  • Computer Hacking Forensic Investigator (CHFI)

  • GIAC Certified Forensic Examiner (GCFE)

  • GIAC Certified Forensic Analyst (GCFA)

  • Certified Computer Examiner (CCE)

CyberKnotts Podcast

IMG_2242.jpg