Informatique judiciaire - Réponse aux incidents

Incident response

In case of incident, contact 1-450-681-1681 ext. 277

Information security incidents

Information security incidents are now an integral part of technology environments. They can be accidental (caused by unintentional human error or by unavoidable natural acts) or deliberate (caused by malware or intentional violation of an individual).

The consequences can be catastrophic such as disclosure, modification or destruction of sensitive information, interruption of service, financial losses and reputational damage. At varying levels of severity, incidents require an appropriate response, and their management must be integrated in the overall security strategy of organizations. Depending on the nature of the incident, the incident response will consist of several actions, usually technical, to mitigate the impacts and minimize direct and indirect damage to operations.

Incident response illustration

Incident response service

As part of its incident response service, the OKIOK team of experts intervenes in each of these phases, in addition to supporting companies in their internal communication process. OKIOK operates according to a structured methodology, inspired by good practices such as ISO/IEC and NIST standards. When an investigation is required, OKIOK ensures that the collection of digital evidence is carried out according to the state of the art, taking care to preserve the integrity during each step of the process.

Ethical hacking

OKIOK’s expertise in the field of ethical hacking (intrusion testing) makes our experts excellent specialists to intervene in the context of cyberattacks, because they often put themselves in the skin of the hacker to test the security systems of its clients.


  • Establishment of the incident management framework
  • Diagnostic and communication
  • Containment
  • Eradication
  • Investigation
  • Reverse Engineering
  • Recommendations

Case Examples

  • Ransomware
  • Cyber attacks
  • Information leaks
  • Web scraping (harvesting)
  • Deny of service
  • Keyloggers fraud
  • Defacement


Request a presentation – Information Security Incidents

Our consultants have earned the trust of the most demanding customers.

Let us show you why ! Fill out the form below, one of our Rep will contact your shortly.

* Required fields
In order to process your request for information, we only collect your business details as well as your first and last names. Your data will be protected and processed internally in order to contact you to send you information about our products and services. In no case your data will be shared to third parties. By transmitting your information to us, you authorize us to collect and process it for the purpose mentioned above. If you wish to have your data deleted, you can send us an inquiry at and we will proceed within 30 days.
Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Not readable? Change text. captcha txt

Start typing and press Enter to search