We will help you detect and respond to threats, investigate and correct them during a comprehensive incident management process. We provide threat monitoring systems and in the event of an incident, we will help you to respond with proven tools and methodologies.

Threat Management

threat management

When prevention fails, there is cyber security notification and actions. Effective threat management directly determines what chances you will have to come out of future incidents with minimal cyber damage or victorious.

Our Services

Security Operations Center

For us, SOC is not just logging or monitoring but it is a comprehensive threat management tool of which logging is only one component. Our understanding of SOC includes Monitoring and Incident Detection, Investigating Incidents and their remediation and also support services such as Vulnerability Management and Threat Intelligence, technologically and from the perspective of terms of all related processes.

  • Creating the Incident Response Program and preparing to handle potential incidents
  • Management of ongoing incidents

SOC Assessment Service delivers complex assessment of your SOC and helps you to
identify strong and weak spots in the SOC function and delivered services.

Read more >

Incident Response

Incidents inevitably happen – and if we are unable to respond properly and effectively to the incident, the impact can be devastating. Only an effective Incident Response program can minimize both direct and indirect financial losses, that are inevitably associated with each incident. An effective response to an incident must be quick and well prepared, only can it have a chance for success.

  • Incident Response Program creating and preparation for coping with potential incidents
  • Management of ongoing incidents

Compromise Discovery & Threat Hunting

Successful attackers can be in a compromised environment for several weeks or months before they are detected. Sooner or later, it is necessary to question how strong is our environment – are we compromised? Is this issue making news in media and so impacting upon our brand?

  • Identification and analysis of anomalies and active threats in the analyzed environment
  • Assessing the status and effectiveness of security measures

Contacts

Lubomír Almer

Lubomír Almer

Threat Management Leader, PwC Czech Republic

Tel: +420 731 652 038

Stay on top of things with us!

You are looking for an expert to help you; you want to request our services; or simply ask something? Let us know about yourself and we will get back to you as soon as possible.

I acknowledge that my personal data provided in the registration questionnaire will be processed by entities from the PwC network mentioned in the "Data controller and contact information" section in the Privacy Statement. This is done in accordance with appropriate legal provisions (mainly the Regulation of the European Parliament and the Council (EU) 2016/679 of 27 April 2016, the General Data Protection Regulation (GDPR) and Act. No. 110/2019 Coll., on personal data processing, as amended) based on the legitimate interests of the above mentioned PwC network entities in order to proceed with my request.

Please, read our Privacy Statement where you can learn more about our approach to personal data and your rights, in particular the right to object to processing.

Hide