1. Home/
  2. Services/
  3. Information Security/
  4. Security Operations Secops/
  5. It Forensik En

Newsletter abonnieren

Bleiben Sie auf dem Laufenden mit den neuesten Trends und Entwicklungen

Durch Abonnieren stimmen Sie unseren Datenschutzbestimmungen zu.

A
ADVISORI FTC GmbH

Transformation. Innovation. Sicherheit.

Firmenadresse

Kaiserstraße 44

60329 Frankfurt am Main

Deutschland

Auf Karte ansehen

Kontakt

info@advisori.de+49 69 913 113-01

Mo-Fr: 9:00 - 18:00 Uhr

Unternehmen

Leistungen

Social Media

Folgen Sie uns und bleiben Sie auf dem neuesten Stand.

  • /
  • /

© 2024 ADVISORI FTC GmbH. Alle Rechte vorbehalten.

Your browser does not support the video tag.
Preserve traces. Investigate incidents. Build trust.

IT Forensics

Digital traces are the key to investigating cyberattacks and IT security incidents. Our IT forensics experts support you in evidence preservation, analysis, and prevention — for maximum transparency and security.

  • ✓Rapid and legally defensible preservation of digital evidence
  • ✓In-depth analysis of attack patterns and vulnerabilities
  • ✓Support for internal and external investigations
  • ✓Prevention through derivation of measures and lessons learned

Your strategic success starts here

Our clients trust our expertise in digital transformation, compliance, and risk management

30 Minutes • Non-binding • Immediately available

For optimal preparation of your strategy session:

  • Your strategic goals and objectives
  • Desired business outcomes and ROI
  • Steps already taken

Or contact us directly:

info@advisori.de+49 69 913 113-01

Certifications, Partners and more...

ISO 9001 CertifiedISO 27001 CertifiedISO 14001 CertifiedBeyondTrust PartnerBVMW Bundesverband MitgliedMitigant PartnerGoogle PartnerTop 100 InnovatorMicrosoft AzureAmazon Web Services

Asan Stefanski, Director, ADVISORI FTC GmbH

Our Strengths

  • Experienced IT forensics and incident response experts
  • Latest tools and methods for evidence preservation and analysis
  • Legally defensible documentation and support for investigations
  • Rapid deployment readiness and discreet handling
⚠

Expert Tip

In an emergency, every minute counts: swift action and professional evidence preservation are critical for the successful investigation of IT security incidents. Train your team and keep emergency plans ready to be optimally prepared when it matters.

ADVISORI in Numbers

11+

Years of Experience

120+

Employees

520+

Projects

Our IT forensics follows a structured, legally defensible process that is individually tailored to your organization and the specific incident.

Our Approach:

Immediate preservation and collection of digital evidence

Forensic analysis and evaluation of data

Documentation and reporting for management and authorities

Support for internal and external investigations

Derivation and implementation of preventive measures

"IT forensics is the key to investigating and preventing cyberattacks. Those who are prepared and act swiftly can limit damage, preserve evidence, and strengthen the trust of all stakeholders."
Sarah Richter

Sarah Richter

Head of Information Security, Cyber Security

Expertise & Experience:

10+ years of experience, CISA, CISM, Lead Auditor, DORA, NIS2, BCM, Cyber and Information Security

LinkedIn Profile

Our Services

We offer you tailored solutions for your digital transformation

Evidence Preservation & Analysis

Legally defensible preservation and analysis of digital traces for investigating IT security incidents.

  • Immediate preservation of data and systems
  • Forensic analysis and evaluation
  • Legally defensible documentation
  • Support for investigations and proceedings

Prevention & Consulting

Derivation and implementation of measures for the prevention and improvement of your IT security.

  • Analysis of vulnerabilities and attack vectors
  • Consulting on emergency plans and preventive measures
  • Training and awareness measures
  • Support for the implementation of measures

Looking for a complete overview of all our services?

View Complete Service Overview

Our Areas of Expertise in Information Security

Discover our specialized areas of information security

Strategy

Development of comprehensive security strategies for your company

▼
    • Information Security Strategy
    • Cyber Security Strategy
    • Information Security Governance
    • Cyber Security Governance
    • Cyber Security Framework
    • Policy Framework
    • Security Measures
    • KPI Framework
    • Zero Trust Framework
IT Risk Management

Identification, assessment, and management of IT risks

▼
    • Cyber Risk
    • IT Risk Analysis
    • IT Risk Assessment
    • IT Risk Management Process
    • Control Catalog Development
    • Control Implementation
    • Measure Tracking
    • Effectiveness Testing
    • Audit
    • Management Review
    • Continuous Improvement
Enterprise GRC

Governance, risk, and compliance management at enterprise level

▼
    • GRC Strategy
    • Operating Model
    • Tool Implementation
    • Process Integration
    • Reporting Framework
    • Regulatory Change Management
Identity & Access Management (IAM)

Secure management of identities and access rights

▼
    • Identity & Access Management (IAM)
    • Access Governance
    • Privileged Access Management (PAM)
    • Multi-Faktor Authentifizierung (MFA)
    • Access Control
Security Architecture

Secure architecture concepts for your IT landscape

▼
    • Enterprise Security Architecture
    • Secure Software Development Life Cycle (SSDLC)
    • DevSecOps
    • API Security
    • Cloud Security
    • Network Security
Security Testing

Identification and remediation of security vulnerabilities

▼
    • Vulnerability Management
    • Penetration Testing
    • Security Assessment
    • Vulnerability Remediation
Security Operations (SecOps)

Operational security management for your company

▼
    • SIEM
    • Log Management
    • Threat Detection
    • Threat Analysis
    • Incident Management
    • Incident Response
    • IT Forensics
Data Protection & Encryption

Data protection and encryption solutions

▼
    • Data Classification
    • Encryption Management
    • PKI
    • Data Lifecycle Management
Security Awareness

Employee awareness and training

▼
    • Security Awareness Training
    • Phishing Training
    • Employee Training
    • Leadership Training
    • Culture Development
Business Continuity & Resilience

Ensuring business continuity and resilience

▼
    • BCM Framework
      • Business Impact Analysis
      • Recovery Strategy
      • Crisis Management
      • Emergency Response
      • Testing & Training
      • Create Emergency Documentation
      • Transition to Regular Operations
    • Resilience
      • Digital Resilience
      • Operational Resilience
      • Supply Chain Resilience
      • IT Service Continuity
      • Disaster Recovery
    • Outsourcing Management
      • Strategy
        • Outsourcing Policy
        • Governance Framework
        • Risk Management Integration
        • ESG Criteria
      • Contract Management
        • Contract Design
        • Service Level Agreements
        • Exit Strategy
      • Service Provider Selection
        • Due Diligence
        • Risk Analysis
        • Third Party Management
        • Supply Chain Assessment
      • Service Provider Management
        • Outsourcing Management Health Check

Frequently Asked Questions about IT Forensics

What is IT forensics and when is it used?

IT forensics is the systematic preservation, analysis, and evaluation of digital evidence following IT security incidents or cyberattacks.

🔍 Objectives:

• Investigation of attacks and incidents
• Legally defensible evidence preservation
• Support for internal and external investigations🕵️

♂ ️ Areas of application:

• Cyberattacks (e.g. malware, ransomware)
• Data loss or theft
• Suspected insider threatsIT forensics creates transparency, protects company assets, and is often a prerequisite for legal action.

How does a professional IT forensic investigation proceed?

An IT forensic investigation follows a structured process:

🚨 Immediate measures:

• Preservation of affected systems and data
• Prevention of alterations to evidence

🔬 Analysis:

• Evaluation of digital traces (e.g. log files, hard drives)
• Identification of attack vectors and perpetrators

📝 Documentation:

• Legally defensible recording of all steps
• Preparation of reports for management and authoritiesA professional process is critical for the evidentiary value and successful investigation.

What tools and methods are used in IT forensics?

IT forensics uses specialized tools and methods for evidence preservation and analysis.

🛠 ️ Tools:

• Forensic software (e.g. EnCase, FTK, X-Ways)
• Imaging tools for data preservation
• Log and network analysis tools

🔬 Methods:

• Bit-accurate copies (images) of storage media
• Timeline analyses and recovery of deleted data
• Correlation of events and tracesThe right tool selection and methodology are critical to the quality of results.

Why is legally defensible documentation so important in IT forensics?

Legally defensible documentation is the foundation of every IT forensic investigation.

📑 Benefits:

• Proof of the integrity and authenticity of evidence
• Support for investigations and court proceedings
• Protection against allegations of tampering

📝 Best practices:

• Complete recording of all measures
• Use of hash values for integrity verification
• Ensuring traceability for third partiesOnly with legally defensible documentation can evidence be used in court.

How is digital evidence preserved in IT forensics?

The preservation of digital evidence is carried out in accordance with strict forensic standards.

🔒 Measures:

• Creation of bit-accurate copies (images) of storage media
• Use of tamper-proof storage media
• Documentation of the chain of custody

🛡 ️ Objective:

• Ensuring the integrity and authenticity of evidence
• Traceability for investigators and courtsOnly with professional preservation can digital evidence be used in court.

What role does cooperation with authorities play in IT forensics?

Cooperation with authorities is often essential in serious incidents.

🤝 Benefits:

• Support for investigations and prosecution
• Access to additional resources and specialist knowledge
• Legal certainty in evidence preservation

🔗 Best practices:

• Early involvement of authorities
• Clear communication and documentation
• Compliance with legal requirementsClose cooperation increases the investigation success rate and protects the company legally.

How are insider threats investigated forensically?

Insider threats require particular care in IT forensics.🕵️

♀ ️ Measures:

• Analysis of access logs and user activities
• Review of permissions and data movements
• Ensuring discretion and data protection

🔍 Special considerations:

• Collaboration with HR and compliance
• Use of monitoring and DLP toolsA structured approach minimizes risks and protects sensitive information.

What challenges exist in IT forensics in cloud environments?

Cloud forensics places particular demands on methods and tools.

☁ ️ Challenges:

• Limited access to physical systems
• Dependency on cloud providers
• Complex data structures and distribution

🛠 ️ Approaches:

• Use of cloud-specific forensic tools
• Clear agreements with providers (SLAs)
• Documentation of all accesses and measuresGood preparation is the key to successful cloud forensics.

How are mobile devices examined in IT forensics?

Mobile forensics is a specialized area of IT forensics and requires specific tools and methods.

📱 Procedure:

• Securing the device in airplane mode
• Creation of forensic images (e.g. using Cellebrite, XRY)
• Analysis of apps, messages, and location data

🔒 Challenges:

• Encryption and device locks
• Different operating systems and file systemsMobile forensics often provides critical evidence in incidents and investigations.

What is the significance of timeline analysis in IT forensics?

Timeline analysis is a central tool for reconstructing incidents.

⏳ Benefits:

• Chronological representation of all relevant events
• Identification of attack paths and perpetrator activities
• Evidence of tampering or data exfiltration

🛠 ️ Tools:

• Plaso, log2timeline, X-Ways ForensicsA precise timeline analysis increases evidentiary value and supports investigation.

How is deleted or encrypted data forensically recovered?

The recovery of deleted or encrypted data is an important component of IT forensics.

🧩 Methods:

• Analysis of file systems and storage areas
• Use of specialized recovery tools
• Brute-force or dictionary attacks for encryption

🔐 Challenges:

• Modern encryption can complicate recovery
• Swift action increases the chances of successProfessional forensic investigators maximize the chances of data recovery.

How is the integrity of evidence ensured during analysis?

The integrity of evidence is the highest priority in IT forensics.

🔏 Measures:

• Use of hash values (e.g. SHA‑256) for integrity verification
• Working exclusively with forensic copies
• Complete documentation of all analysis steps

🛡 ️ Objective:

• Proof that evidence has not been altered
• Acceptance of results in courtOnly with strict adherence to these measures can evidence be used in court.

How can IT forensics contribute to the prevention of cyberattacks?

IT forensics provides valuable insights for improving IT security.

🔎 Benefits:

• Identification of vulnerabilities and attack vectors
• Derivation of targeted preventive measures
• Raising employee awareness through lessons learned

🛡 ️ Measures:

• Adaptation of security policies
• Optimization of monitoring and logging
• Conducting awareness trainingPrevention is the most sustainable protection against future attacks.

What role does collaboration with external forensic experts play?

External forensic experts bring specialist knowledge and experience to complex cases.

🤝 Benefits:

• Independent analysis and objective assessment
• Access to the latest tools and methods
• Support for investigations and court proceedings

🔗 Best practices:

• Clear communication and division of responsibilities
• Ensuring confidentiality and data protectionCollaboration increases the investigation success rate and legal certainty.

How are network attacks investigated forensically?

The forensic investigation of network attacks requires specialized tools and expertise.

🌐 Procedure:

• Analysis of network protocols and traffic data
• Identification of command-and-control servers
• Correlation of events from various sources

🛠 ️ Tools:

• Wireshark, Zeek, NetFlow analyzersStructured network forensics is critical for investigating complex attacks.

What challenges exist in international IT forensic investigations?

International investigations bring legal and technical challenges.

🌍 Challenges:

• Different data protection and evidence laws
• Language and time barriers
• Complex data flows across national borders

🌐 Approaches:

• Collaboration with international partners
• Use of global forensic standards
• Careful documentation and legal adviceInternational expertise is the key to success in cross-border cases.

How can IT forensics help investigate ransomware attacks?

IT forensics is critical for the analysis and investigation of ransomware attacks.

🦠 Procedure:

• Identification of the infection path and malware
• Preservation and analysis of encrypted data
• Tracing ransom demands and payment flows

🔍 Benefits:

• Support for data recovery
• Evidence preservation for investigations and insurersA swift forensic analysis increases the chances of successful investigation and damage limitation.

What role does IT forensics play in meeting compliance requirements?

IT forensics supports organizations in meeting legal and regulatory requirements.

📜 Benefits:

• Proof of due diligence obligations in the event of incidents
• Documentation for audits and authorities
• Support for compliance with GDPR, KRITIS, ISO 27001🛡️ Measures:
• Legally defensible evidence preservation and reporting
• Regular review and adaptation of processesCompliance and forensics go hand in hand for sustainable security.

How is evidence exchanged in international investigations?

The exchange of digital evidence across national borders requires particular care.

🌍 Challenges:

• Different legal frameworks
• Requirements for data protection and chain of custody
• Language and format differences

🔗 Best practices:

• Use of internationally recognized standards (e.g. ISO, INTERPOL)
• Careful documentation and encryption
• Collaboration with international authorities and partnersOnly with clear processes can evidence be used internationally.

How can an organization prepare for forensic emergencies?

Preparation is the key to a successful forensic response in an emergency.

🧰 Measures:

• Development of emergency and forensic plans
• Training and awareness-raising for employees
• Regular tests and simulations

🔒 Objective:

• Swift and professional response to incidents
• Minimization of damage and loss of evidenceProactive preparation increases resilience and the ability to act in a crisis.

Success Stories

Discover how we support companies in their digital transformation

Generative KI in der Fertigung

Bosch

KI-Prozessoptimierung für bessere Produktionseffizienz

Fallstudie
BOSCH KI-Prozessoptimierung für bessere Produktionseffizienz

Ergebnisse

Reduzierung der Implementierungszeit von AI-Anwendungen auf wenige Wochen
Verbesserung der Produktqualität durch frühzeitige Fehlererkennung
Steigerung der Effizienz in der Fertigung durch reduzierte Downtime

AI Automatisierung in der Produktion

Festo

Intelligente Vernetzung für zukunftsfähige Produktionssysteme

Fallstudie
FESTO AI Case Study

Ergebnisse

Verbesserung der Produktionsgeschwindigkeit und Flexibilität
Reduzierung der Herstellungskosten durch effizientere Ressourcennutzung
Erhöhung der Kundenzufriedenheit durch personalisierte Produkte

KI-gestützte Fertigungsoptimierung

Siemens

Smarte Fertigungslösungen für maximale Wertschöpfung

Fallstudie
Case study image for KI-gestützte Fertigungsoptimierung

Ergebnisse

Erhebliche Steigerung der Produktionsleistung
Reduzierung von Downtime und Produktionskosten
Verbesserung der Nachhaltigkeit durch effizientere Ressourcennutzung

Digitalisierung im Stahlhandel

Klöckner & Co

Digitalisierung im Stahlhandel

Fallstudie
Digitalisierung im Stahlhandel - Klöckner & Co

Ergebnisse

Über 2 Milliarden Euro Umsatz jährlich über digitale Kanäle
Ziel, bis 2022 60% des Umsatzes online zu erzielen
Verbesserung der Kundenzufriedenheit durch automatisierte Prozesse

Let's

Work Together!

Is your organization ready for the next step into the digital future? Contact us for a personal consultation.

Your strategic success starts here

Our clients trust our expertise in digital transformation, compliance, and risk management

Ready for the next step?

Schedule a strategic consultation with our experts now

30 Minutes • Non-binding • Immediately available

For optimal preparation of your strategy session:

Your strategic goals and challenges
Desired business outcomes and ROI expectations
Current compliance and risk situation
Stakeholders and decision-makers in the project

Prefer direct contact?

Direct hotline for decision-makers

Strategic inquiries via email

Detailed Project Inquiry

For complex inquiries or if you want to provide specific information in advance

ADVISORI Logo
BlogCase StudiesAbout Us
info@advisori.de+49 69 913 113-01

Latest Insights on IT Forensics

Discover our latest articles, expert knowledge and practical guides about IT Forensics

DORA 2026: Warum 44% der Finanzunternehmen nicht compliant sind — und was jetzt zu tun ist

February 23, 2026
15 Min.

44% der Finanzunternehmen kämpfen mit der DORA-Umsetzung. Erfahren Sie, wo die größten Lücken liegen und welche Maßnahmen jetzt Priorität haben.

Boris Friedrich
Read

DORA 2026: Warum 44% der Finanzunternehmen nicht compliant sind — und was jetzt zu tun ist

February 23, 2026
15 Min.

44% der Finanzunternehmen kämpfen mit der DORA-Umsetzung. Erfahren Sie, wo die größten Lücken liegen und welche Maßnahmen jetzt Priorität haben.

Boris Friedrich
Read
Regulierungswelle 2026: NIS2, DORA, AI Act & CRA — Was Unternehmen jetzt tun müssen
Informationssicherheit

Regulierungswelle 2026: NIS2, DORA, AI Act & CRA — Was Unternehmen jetzt tun müssen

February 23, 2026
20 Min.

NIS2, DORA, AI Act und CRA treffen 2026 gleichzeitig. Fristen, Überschneidungen und konkrete Maßnahmen — der komplette Leitfaden für Entscheider.

Boris Friedrich
Read
Regulierungswelle 2026: NIS2, DORA, AI Act & CRA — Was Unternehmen jetzt tun müssen
Informationssicherheit

Regulierungswelle 2026: NIS2, DORA, AI Act & CRA — Was Unternehmen jetzt tun müssen

February 23, 2026
20 Min.

NIS2, DORA, AI Act und CRA treffen 2026 gleichzeitig. Fristen, Überschneidungen und konkrete Maßnahmen — der komplette Leitfaden für Entscheider.

Boris Friedrich
Read

NIS2-Frist verpasst? Diese Bußgelder und Haftungsrisiken drohen ab März 2026

February 21, 2026
6 Min.

29.000 Unternehmen müssen sich bis 6. März 2026 beim BSI registrieren. Was bei Versäumnis droht: Bußgelder bis 10 Mio. €, persönliche Geschäftsführer-Haftung und BSI-Aufsichtsmaßnahmen.

Boris Friedrich
Read

NIS2 trifft KI: Warum AI Governance jetzt Pflicht wird

February 21, 2026
7 Min.

NIS2 fordert Risikomanagement für alle ICT-Systeme — inklusive KI. Ab August 2026 kommen die Hochrisiko-Pflichten des EU AI Act dazu. Warum Unternehmen AI Governance jetzt in ihre NIS2-Compliance einbauen müssen.

Boris Friedrich
Read
View All Articles