Forensic /
Information security investigation case study

In recent years, the environment surrounding us is changing day by day, including globalization and the evolution of digital devices. Under these circumstances, threats from outside the organization and fraud committed within the organization are becoming more sophisticated and sophisticated, and many incidents have occurred that could shake the foundations of the organization, such as cyber attacks, internal fraud, information leaks, and compliance violations. doing. Once an incident occurs, the damage can be enormous, and it takes time and money to restore trust. As a leading company in forensic investigations, FRONTEO provides one-stop solutions, from solutions for normal times when no incidents have occurred (email monitoring, etc.), to responses when incidents occur (forensic investigations), to proposals for post-incident countermeasures. We offer Here, we will introduce representative forensic cases and information security investigation cases among the various internal fraud/cyber security cases that actually occur.

List of cases

Case1: Taking out confidential corporate information Operation log investigation related to the Unfair Competition Prevention Law

Case2: Investigation of personal information leakage due to malware infection

<Examples to be posted in the next issue> Case3: Ordinary audit operation of all overseas subsidiaries by the head office *Case content is subject to change.

Case1: Taking out confidential corporate information Operation log investigation related to the Unfair Competition Prevention Law

Case2: Investigation of personal information leakage due to malware infection

<Examples to be posted in the next issue> Case3: Ordinary audit operation of all overseas subsidiaries by the head office *Case content is subject to change.