855.875.4631 investigations@crypsisgroup.com

Our consultants are experienced in some of the most challenging environments in the world.


Explore More

Incident Response

Risk Management

Digital Investigations

Incident Response

Do you suspect your network is under attack?

Baseline Approach:

IDENTIFY– Locate the initial point of compromise, determine the scope and severity of the breach, and determine the potential business impact and risk.

CONTAIN– Restrict the threat actor’s ability to operate in the environment, minimize further damage to the organization, and to develop a custom containment strategy that recognizes operational requirements.

ERADICATE– Eliminate the threat actor from the environment and improve the organization’s security posture to mitigate the impact of future breaches.

Learn More

Risk Management

Think Outside the Breach

Baseline Approach:

DEFINE– Establish security objectives and develop a roadmap to create and strengthen controls that will achieve them.

DISCOVER– Gather and operationalize intelligence about the network to use as a basis for making the most informed decisions.

PREPARE– Develop an actionable plan and process to manage risks and address threats with an eye toward prevention and impact mitigation.

Learn More

Digital Investigations

Are you looking for evidence?

Baseline Approach:

LOCATE– Crypsis experts go deep to get an understanding of your environment in order to be efficient in the identification and preservation of relevant data. We scour network logs and identify the systems of interest to target for preservation of data.

ANALYZE– We use industry standard tools along with time saving proprietary technologies to peel back the evidence layers to understand what happened with the data.

INVESTIGATE– We have advised legal teams on some of the highest profile digital investigations in recent times, and our investigations hold up in court.

Learn More

We Are Crypsis

We are a group of highly experienced security experts focused on educating and helping the potential targets and victims of cyber attacks.


You’re passionate about security. We’re passionate about security.
Let’s build something together.

Join Our Team

The Latest from Crypsis

Russian Hackers Aren’t the Only Ones to Worry About

The scale of the operation, as well as the targets, suggest this was a state operation. “The extent and volume of information that they were able to obtain in these subpoenas goes beyond the capabilities of an individual,” said Sam Rubin, a vice president of...Read More

Best Practices for Securing Your Hosts – Part I

In this 15 minute mini-webinar, Crypsis Group consultants Thomas Aneiro and Brett Rudloff take a look at the defenses that can keep your endpoints safe. They cover general user and endpoint security best practices, the importance of patching, and provide a few resources that can...Read More

What Lies Beneath a Cyber Breach

“Rooney and the Crypsis team are called in after a cyber incident. It often starts with a call from an attorney who has determined that an investigation is required. Crypsis runs proprietary programs and deploys their team of expert consultants to see how a hacker...Read More