Our CyberSecurity Incident Response Team acts in situations of imminent danger or when you are sinking.


Learn more

Recent years have seen an increase in new vulnerabilities, exploit types, APT groups, ransomware families and cybersecurity attacks in general. Furthermore, the shift to the cloud and acceleration of teleworking, has highlighted the need for organization to ensure protection for a variety of resources accessing the corporate network, resources that represent new opportunities for threat actors. Digital Forensics and Incident Response has become a central capability within the organization’s security strategy. It’s not when you’re suffering a cyber-attack that you have to wonder whom to call, should such situation arise the Telindus-CISRT (Cyber Security Incident Response Team) is one call away.   

  • Advantages
  • Benefits

24/7 Incident Response services

Assisting you should an incident occur with a 24/7 coverage (with a guaranteed SLA)  

Short Incident Response time

First recommendation to contain and evaluate the scope of the cyber-attack

Return to an acceptable business activity situation

Finding the incident root cause, identifying threat actors’ actions on objective and eradicating the threat

Help you recover from a security incident

Support during the recovery phase by leveraging in-house experts from any other ICT and TELCO departements of Telindus (Citrix, Microsoft, NetApp, VMware, network security engineers)

Limit the impact

It is not a matter of preventing all types of attack, it is a matter of having people, processes and technologies in place and being prepared to face emergency to limit the impact should a security incident may occur

Consider proactive activities

Many people associate the term “incident response” with response, recovery and mitigation efforts following a security breach. However, incident response is not just a reactive activity. As best practice and industry frameworks indicate, and as the evolving adversaries and regulations demand, you need to consider proactive activities such a Threat Hunting and Adversary Emulation leveraging the Telindus-CSIRT Threat Intelligence

Threat Hunting

Threat hunting is the practice of proactively searching for cyber threats that are lurking undetected. Threat hunting digs deep to find malicious actors in an environment that have slipped past your initial endpoint security defences by spotting suspicious or unusual activities in the customer network or leveraging publicly available resources applying the threat hunter philosophy “know normal to spot abnormal”

Adversary Emulation

Adversary Emulation is a process of imitating the activities or mimicking or copying the adversaries or threat actor behaviour. Adversary emulation allows organization to test security team against the latest threats used by real threat actor which might pose the greatest risk to the customer. Goal of adversary emulation is to assess the current stance in cyber security aspect of the organization (People, Process, Technology), to improve security posture in a whole process and also to enhance the blue team capabilities for detection and response process


Digital Forensics and Incident Response

Incident Response Readiness

Threat Hunting

Threat Intelligence

Adversary Emulation

ISO 27001 certification


E-mail :
Phone: +352 450 915-1
Hours of operation: 09h00-17h00 CET from Monday to Friday except during Luxembourg’s public holidays
Outside of these hours / in case of emergency / for operational problems :


Enter the characters shown in the image.
Cette question sert à vérifier si vous êtes un visiteur humain ou non afin d'éviter les soumissions de pourriel (spam) automatisées.
By submitting this form, I accept the Telindus personal data protection
*required fields