855.875.4631 investigations@crypsisgroup.com

Our consultants are experienced in some of the most challenging environments in the world.


Explore More

Incident Response

Risk Management

Digital Investigations

Incident Response

Do you suspect your network is under attack?

Baseline Approach:

IDENTIFY– Locate the initial point of compromise, determine the scope and severity of the breach, and determine the potential business impact and risk.

CONTAIN– Restrict the threat actor’s ability to operate in the environment, minimize further damage to the organization, and to develop a custom containment strategy that recognizes operational requirements.

ERADICATE– Eliminate the threat actor from the environment and improve the organization’s security posture to mitigate the impact of future breaches.

Learn More

Risk Management

Think Outside the Breach

Baseline Approach:

DEFINE– Establish security objectives and develop a roadmap to create and strengthen controls that will achieve them.

DISCOVER– Gather and operationalize intelligence about the network to use as a basis for making the most informed decisions.

PREPARE– Develop an actionable plan and process to manage risks and address threats with an eye toward prevention and impact mitigation.

Learn More

Digital Investigations

Are you looking for evidence?

Baseline Approach:

LOCATE– Crypsis experts go deep to get an understanding of your environment in order to be efficient in the identification and preservation of relevant data. We scour network logs and identify the systems of interest to target for preservation of data.

ANALYZE– We use industry standard tools along with time saving proprietary technologies to peel back the evidence layers to understand what happened with the data.

INVESTIGATE– We have advised legal teams on some of the highest profile digital investigations in recent times, and our investigations hold up in court.

Learn More

We Are Crypsis

We are a group of highly experienced security experts focused on educating and helping the potential targets and victims of cyber attacks.


You’re passionate about security. We’re passionate about security.
Let’s build something together.

Join Our Team

The Latest from Crypsis

Best Practices for Securing Your Network – Part 1

What network security best practices should your company be following in 2018? In this 15 minute mini-webinar, Crypsis Group consultants Thomas Aneiro and Brett Rudloff take a look at the defenses that can keep your network safe. They cover general network security best practices, including...Read More

Bloomberg – Elliott Broidy and the GOP’s Bad Hacking Karma

“If there had been two-factor authentication in place, many of these attacks would not have been possible,” says Sam Rubin, vice president of Crypsis Group, a security advisory firm hired by Broidy. “Securing the human, as they say, is always going to be the weakest...Read More

The New Yorker – The Digital Vigilantes Who Hack Back

Bret Padres, a former Air Force computer-crime investigator who is now the C.E.O. of the Crypsis Group, a cyberforensics firm, told me about some work he had done for a defense contractor whose server had been breached. He examined malicious code that the hackers had...Read More