case

Forensics / Information Security Investigations Case Studies

These days, with globalization and the evolution of digital devices, the environment surrounding us is changing day by day and moment by moment. In this environment, threats from outside the organization as well as internal fraud are becoming more sophisticated and sophisticated, and there are many incidents that could shake the very foundation of the organization, such as cyber attacks, internal fraud, information leaks, and compliance violations. Once an incident occurs, the damage can be enormous, and restoring trust can be time-consuming and costly. As a leading forensic investigation company, FRONTEO provides one-stop solutions ranging from solutions for normal times when there is no incident (e.g., e-mail monitoring), to responses when an incident occurs (forensic investigation), to post-incident countermeasure proposals. We provide one-stop solutions. Here, we will introduce typical forensic cases and information security investigation cases among various internal fraud/cyber security incidents that have actually occurred.

List of Cases

Case1:
Taking out confidential corporate information
Operation log investigation related to the Unfair Competition Prevention Act

Case2:
Investigation of personal information leakage due to malware infection

< Case 3: Head Office's Peacetime Audit of All Overseas Subsidiaries *Case details are subject to change.

  • HOME      >      
  • Case Studies and Achievements