Our Cyber Incident Response and Digital Forensics service is a 24/7 service for cyber incidents and data breaches. Our cyber security specialists will help to triage the incident, understand what has happened, and the level of support you require. We are bound by confidentiality, and you have no obligation to proceed.
Our practice operates a global network of cyber incident responders and provides access to multiple specialist services when you need them most, including: Incident Management and Technical Response, Digital Forensics and eDiscovery, Privacy and Data Protection, and Customer Breach Support, Crisis Management and Communications, and Technology Recovery.
Whether confronted with the impacts of destructive malware, compromise of your email systems, or cyber extortion through data theft, our team is equipped with the expertise, resources and capacity to manage the varying impacts of an attack and recover your business to a stronger position.
If you are experiencing a cyber incident, please call us on our 24/7 hotline for immediate advice and assistance from our cyber security specialists.
24x7 Hotline :
1300 639 875
Email :
au-cir@deloitte.com.au
(non-urgent only)
In today’s rapidly changing threat environment, our CIR Retainer services offer you the confidence of knowing your organisation has a team of cyber incident response specialists on speed dial, ready to take swift action when needed.
Our CIR Retainer options allow you to pre-purchase cyber incident response services, providing year-round, 24/7 cyber access to our specialist CIR team. As a retainer client, you’ll have a direct line of communication with our globally-recognised CIR team, allowing you to pick up the phone and mobilise our team to support you in the timely management, triage, investigation and resolution of a cyber incident.
Deloitte has been named a leader in Cyber Incident Response Services in Forrester’s recent reports entitled The Forrester Wave™: Cybersecurity Incident Response Services, Q1 2022 (and previously, Q1 2019)
No two incidents are the same, but there is some commonality in the types of support our clients ask for. The following are the activities we are best practiced at:
Our Cyber Incident Response team can help you investigate, respond to, and recover from a wide range of potential incidents, often varying in size, complexity, and geographic location. Some of the most common incidents we are asked to assist with include:
We have found clients regularly need a range of specialist services during incidents. Our practice operates a global network of cyber incident responders and provides access to multiple specialist services when you need them most, including:•
Prevention is better than cure, and our Cyber Incident Response Advisory services enable you to prepare your incident response capabilities by aligning your people, processes, and technology strategies to proven methodologies. Led and delivered by our Cyber Incident Responders and incorporating lessons learnt from the most recent live incidents, our services include:•
"With its reputation as a premier cybersecurity consulting firm, Deloitte approaches incident response and crisis management holistically with brand and reputation preservation in mind”
“Deloitte emphasizes trust restoration throughout the incident response lifecycle”
“Security leaders looking to ensure board and executive buy-in for transformational efforts tied to incident readiness, response, and overall program maturity should consider Deloitte”
“Should an incident arise, [Deloitte] offers key trust restoration services like notification support and hands-on environment recovery and transformation. All of this is in addition to its data-driven, tool-agnostic incident response capabilities.”
“Deloitte enables clients to manage high-impact events with confidence.”
“Deloitte is a global consultancy with cyber intelligence integrated into its end-to-end services to ensure incident readiness for clients.”
“It has a deep understanding of the requirements for a successful incident response and differentiates in how it articulates these requirements.”