1. Home/
  2. Services/
  3. Information Security/
  4. Security Operations Secops/
  5. It Forensik En

Subscribe to Newsletter

Stay up to date with the latest trends and developments

By subscribing, you agree to our privacy policy.

A
ADVISORI FTC GmbH

Transformation. Innovation. Security.

Office Address

Kaiserstraße 44

60329 Frankfurt am Main

Germany

View on map

Contact

info@advisori.de+49 69 913 113-01

Mon-Fri: 9:00 AM - 6:00 PM

Company

Services

Social Media

Follow us and stay up to date.

  • /
  • /

© 2024 ADVISORI FTC GmbH. Alle Rechte vorbehalten.

Your browser does not support the video tag.
Preserve traces. Investigate incidents. Build trust.

IT Forensics

Digital traces are the key to investigating cyberattacks and IT security incidents. Our IT forensics experts support you in evidence preservation, analysis, and prevention — for maximum transparency and security.

  • ✓Rapid and legally defensible preservation of digital evidence
  • ✓In-depth analysis of attack patterns and vulnerabilities
  • ✓Support for internal and external investigations
  • ✓Prevention through derivation of measures and lessons learned

Your strategic success starts here

Our clients trust our expertise in digital transformation, compliance, and risk management

30 Minutes • Non-binding • Immediately available

For optimal preparation of your strategy session:

  • Your strategic goals and objectives
  • Desired business outcomes and ROI
  • Steps already taken

Or contact us directly:

info@advisori.de+49 69 913 113-01

Certifications, Partners and more...

ISO 9001 CertifiedISO 27001 CertifiedISO 14001 CertifiedBeyondTrust PartnerBVMW Bundesverband MitgliedMitigant PartnerGoogle PartnerTop 100 InnovatorMicrosoft AzureAmazon Web Services

Asan Stefanski, Director, ADVISORI FTC GmbH

Our Strengths

  • Experienced IT forensics and incident response experts
  • Latest tools and methods for evidence preservation and analysis
  • Legally defensible documentation and support for investigations
  • Rapid deployment readiness and discreet handling
⚠

Expert Tip

In an emergency, every minute counts: swift action and professional evidence preservation are critical for the successful investigation of IT security incidents. Train your team and keep emergency plans ready to be optimally prepared when it matters.

ADVISORI in Numbers

11+

Years of Experience

120+

Employees

520+

Projects

Our IT forensics follows a structured, legally defensible process that is individually tailored to your organization and the specific incident.

Our Approach:

Immediate preservation and collection of digital evidence

Forensic analysis and evaluation of data

Documentation and reporting for management and authorities

Support for internal and external investigations

Derivation and implementation of preventive measures

"IT forensics is the key to investigating and preventing cyberattacks. Those who are prepared and act swiftly can limit damage, preserve evidence, and strengthen the trust of all stakeholders."
Sarah Richter

Sarah Richter

Head of Information Security, Cyber Security

Expertise & Experience:

10+ years of experience, CISA, CISM, Lead Auditor, DORA, NIS2, BCM, Cyber and Information Security

LinkedIn Profile

Our Services

We offer you tailored solutions for your digital transformation

Evidence Preservation & Analysis

Legally defensible preservation and analysis of digital traces for investigating IT security incidents.

  • Immediate preservation of data and systems
  • Forensic analysis and evaluation
  • Legally defensible documentation
  • Support for investigations and proceedings

Prevention & Consulting

Derivation and implementation of measures for the prevention and improvement of your IT security.

  • Analysis of vulnerabilities and attack vectors
  • Consulting on emergency plans and preventive measures
  • Training and awareness measures
  • Support for the implementation of measures

Our Competencies in Security Operations (SecOps)

Choose the area that fits your requirements

Incident Management

Effective incident management is the key to successfully defending against and handling cyberattacks. We help you detect security incidents early, manage them professionally, and learn from them — for a resilient organization.

Incident Response

A well-conceived incident response plan is the key to successfully managing cyberattacks. We support you in rapid response, evidence preservation, and the sustainable recovery of your systems.

Log Management

We support you in the efficient collection, analysis, and management of log data. From strategy development to technical implementation – for a future-proof IT security infrastructure.

Security Information and Event Management (SIEM)

We support you in the implementation, optimization, and operation of your SIEM solutions for effective threat detection and security incident management.

Threat Analysis

Identify and understand threats before they become security incidents. Our professional threat analysis combines advanced technologies with expert analysis for comprehensive protection of your digital assets.

Threat Detection

Enhance your cybersecurity through advanced threat detection that identifies modern attack methods before they can cause damage. Our tailored solutions combine the latest technologies, threat intelligence, and specialized expertise to detect complex threats at an early stage.

Frequently Asked Questions about IT Forensics

What is IT forensics and when is it used?

IT forensics is the systematic preservation, analysis, and evaluation of digital evidence following IT security incidents or cyberattacks.

🔍 Objectives:

• Investigation of attacks and incidents
• Legally defensible evidence preservation
• Support for internal and external investigations🕵️

♂ ️ Areas of application:

• Cyberattacks (e.g. malware, ransomware)
• Data loss or theft
• Suspected insider threatsIT forensics creates transparency, protects company assets, and is often a prerequisite for legal action.

How does a professional IT forensic investigation proceed?

An IT forensic investigation follows a structured process:

🚨 Immediate measures:

• Preservation of affected systems and data
• Prevention of alterations to evidence

🔬 Analysis:

• Evaluation of digital traces (e.g. log files, hard drives)
• Identification of attack vectors and perpetrators

📝 Documentation:

• Legally defensible recording of all steps
• Preparation of reports for management and authoritiesA professional process is critical for the evidentiary value and successful investigation.

What tools and methods are used in IT forensics?

IT forensics uses specialized tools and methods for evidence preservation and analysis.

🛠 ️ Tools:

• Forensic software (e.g. EnCase, FTK, X-Ways)
• Imaging tools for data preservation
• Log and network analysis tools

🔬 Methods:

• Bit-accurate copies (images) of storage media
• Timeline analyses and recovery of deleted data
• Correlation of events and tracesThe right tool selection and methodology are critical to the quality of results.

Why is legally defensible documentation so important in IT forensics?

Legally defensible documentation is the foundation of every IT forensic investigation.

📑 Benefits:

• Proof of the integrity and authenticity of evidence
• Support for investigations and court proceedings
• Protection against allegations of tampering

📝 Best practices:

• Complete recording of all measures
• Use of hash values for integrity verification
• Ensuring traceability for third partiesOnly with legally defensible documentation can evidence be used in court.

How is digital evidence preserved in IT forensics?

The preservation of digital evidence is carried out in accordance with strict forensic standards.

🔒 Measures:

• Creation of bit-accurate copies (images) of storage media
• Use of tamper-proof storage media
• Documentation of the chain of custody

🛡 ️ Objective:

• Ensuring the integrity and authenticity of evidence
• Traceability for investigators and courtsOnly with professional preservation can digital evidence be used in court.

What role does cooperation with authorities play in IT forensics?

Cooperation with authorities is often essential in serious incidents.

🤝 Benefits:

• Support for investigations and prosecution
• Access to additional resources and specialist knowledge
• Legal certainty in evidence preservation

🔗 Best practices:

• Early involvement of authorities
• Clear communication and documentation
• Compliance with legal requirementsClose cooperation increases the investigation success rate and protects the company legally.

How are insider threats investigated forensically?

Insider threats require particular care in IT forensics.🕵️

♀ ️ Measures:

• Analysis of access logs and user activities
• Review of permissions and data movements
• Ensuring discretion and data protection

🔍 Special considerations:

• Collaboration with HR and compliance
• Use of monitoring and DLP toolsA structured approach minimizes risks and protects sensitive information.

What challenges exist in IT forensics in cloud environments?

Cloud forensics places particular demands on methods and tools.

☁ ️ Challenges:

• Limited access to physical systems
• Dependency on cloud providers
• Complex data structures and distribution

🛠 ️ Approaches:

• Use of cloud-specific forensic tools
• Clear agreements with providers (SLAs)
• Documentation of all accesses and measuresGood preparation is the key to successful cloud forensics.

How are mobile devices examined in IT forensics?

Mobile forensics is a specialized area of IT forensics and requires specific tools and methods.

📱 Procedure:

• Securing the device in airplane mode
• Creation of forensic images (e.g. using Cellebrite, XRY)
• Analysis of apps, messages, and location data

🔒 Challenges:

• Encryption and device locks
• Different operating systems and file systemsMobile forensics often provides critical evidence in incidents and investigations.

What is the significance of timeline analysis in IT forensics?

Timeline analysis is a central tool for reconstructing incidents.

⏳ Benefits:

• Chronological representation of all relevant events
• Identification of attack paths and perpetrator activities
• Evidence of tampering or data exfiltration

🛠 ️ Tools:

• Plaso, log2timeline, X-Ways ForensicsA precise timeline analysis increases evidentiary value and supports investigation.

How is deleted or encrypted data forensically recovered?

The recovery of deleted or encrypted data is an important component of IT forensics.

🧩 Methods:

• Analysis of file systems and storage areas
• Use of specialized recovery tools
• Brute-force or dictionary attacks for encryption

🔐 Challenges:

• Modern encryption can complicate recovery
• Swift action increases the chances of successProfessional forensic investigators maximize the chances of data recovery.

How is the integrity of evidence ensured during analysis?

The integrity of evidence is the highest priority in IT forensics.

🔏 Measures:

• Use of hash values (e.g. SHA‑256) for integrity verification
• Working exclusively with forensic copies
• Complete documentation of all analysis steps

🛡 ️ Objective:

• Proof that evidence has not been altered
• Acceptance of results in courtOnly with strict adherence to these measures can evidence be used in court.

How can IT forensics contribute to the prevention of cyberattacks?

IT forensics provides valuable insights for improving IT security.

🔎 Benefits:

• Identification of vulnerabilities and attack vectors
• Derivation of targeted preventive measures
• Raising employee awareness through lessons learned

🛡 ️ Measures:

• Adaptation of security policies
• Optimization of monitoring and logging
• Conducting awareness trainingPrevention is the most sustainable protection against future attacks.

What role does collaboration with external forensic experts play?

External forensic experts bring specialist knowledge and experience to complex cases.

🤝 Benefits:

• Independent analysis and objective assessment
• Access to the latest tools and methods
• Support for investigations and court proceedings

🔗 Best practices:

• Clear communication and division of responsibilities
• Ensuring confidentiality and data protectionCollaboration increases the investigation success rate and legal certainty.

How are network attacks investigated forensically?

The forensic investigation of network attacks requires specialized tools and expertise.

🌐 Procedure:

• Analysis of network protocols and traffic data
• Identification of command-and-control servers
• Correlation of events from various sources

🛠 ️ Tools:

• Wireshark, Zeek, NetFlow analyzersStructured network forensics is critical for investigating complex attacks.

What challenges exist in international IT forensic investigations?

International investigations bring legal and technical challenges.

🌍 Challenges:

• Different data protection and evidence laws
• Language and time barriers
• Complex data flows across national borders

🌐 Approaches:

• Collaboration with international partners
• Use of global forensic standards
• Careful documentation and legal adviceInternational expertise is the key to success in cross-border cases.

How can IT forensics help investigate ransomware attacks?

IT forensics is critical for the analysis and investigation of ransomware attacks.

🦠 Procedure:

• Identification of the infection path and malware
• Preservation and analysis of encrypted data
• Tracing ransom demands and payment flows

🔍 Benefits:

• Support for data recovery
• Evidence preservation for investigations and insurersA swift forensic analysis increases the chances of successful investigation and damage limitation.

What role does IT forensics play in meeting compliance requirements?

IT forensics supports organizations in meeting legal and regulatory requirements.

📜 Benefits:

• Proof of due diligence obligations in the event of incidents
• Documentation for audits and authorities
• Support for compliance with GDPR, KRITIS, ISO 27001🛡️ Measures:
• Legally defensible evidence preservation and reporting
• Regular review and adaptation of processesCompliance and forensics go hand in hand for sustainable security.

How is evidence exchanged in international investigations?

The exchange of digital evidence across national borders requires particular care.

🌍 Challenges:

• Different legal frameworks
• Requirements for data protection and chain of custody
• Language and format differences

🔗 Best practices:

• Use of internationally recognized standards (e.g. ISO, INTERPOL)
• Careful documentation and encryption
• Collaboration with international authorities and partnersOnly with clear processes can evidence be used internationally.

How can an organization prepare for forensic emergencies?

Preparation is the key to a successful forensic response in an emergency.

🧰 Measures:

• Development of emergency and forensic plans
• Training and awareness-raising for employees
• Regular tests and simulations

🔒 Objective:

• Swift and professional response to incidents
• Minimization of damage and loss of evidenceProactive preparation increases resilience and the ability to act in a crisis.

Success Stories

Discover how we support companies in their digital transformation

Digitalization in Steel Trading

Klöckner & Co

Digital Transformation in Steel Trading

Case Study
Digitalisierung im Stahlhandel - Klöckner & Co

Results

Over 2 billion euros in annual revenue through digital channels
Goal to achieve 60% of revenue online by 2022
Improved customer satisfaction through automated processes

AI-Powered Manufacturing Optimization

Siemens

Smart Manufacturing Solutions for Maximum Value Creation

Case Study
Case study image for AI-Powered Manufacturing Optimization

Results

Significant increase in production performance
Reduction of downtime and production costs
Improved sustainability through more efficient resource utilization

AI Automation in Production

Festo

Intelligent Networking for Future-Proof Production Systems

Case Study
FESTO AI Case Study

Results

Improved production speed and flexibility
Reduced manufacturing costs through more efficient resource utilization
Increased customer satisfaction through personalized products

Generative AI in Manufacturing

Bosch

AI Process Optimization for Improved Production Efficiency

Case Study
BOSCH KI-Prozessoptimierung für bessere Produktionseffizienz

Results

Reduction of AI application implementation time to just a few weeks
Improvement in product quality through early defect detection
Increased manufacturing efficiency through reduced downtime

Let's

Work Together!

Is your organization ready for the next step into the digital future? Contact us for a personal consultation.

Your strategic success starts here

Our clients trust our expertise in digital transformation, compliance, and risk management

Ready for the next step?

Schedule a strategic consultation with our experts now

30 Minutes • Non-binding • Immediately available

For optimal preparation of your strategy session:

Your strategic goals and challenges
Desired business outcomes and ROI expectations
Current compliance and risk situation
Stakeholders and decision-makers in the project

Prefer direct contact?

Direct hotline for decision-makers

Strategic inquiries via email

Detailed Project Inquiry

For complex inquiries or if you want to provide specific information in advance

Latest Insights on IT Forensics

Discover our latest articles, expert knowledge and practical guides about IT Forensics

SIEM vs. XDR vs. SOAR: Which Security Operations Tools Do You Need?
Informationssicherheit

SIEM vs. XDR vs. SOAR: Which Security Operations Tools Do You Need?

April 17, 2026
14 min

SIEM, XDR, and SOAR serve different purposes in the security operations stack. This comparison explains capabilities, costs, and which combination fits your organization — from SME without SOC to enterprise with 10+ analysts.

Boris Friedrich
Read
BSI IT-Grundschutz: A Pragmatic Entry into Information Security for SMEs
Informationssicherheit

BSI IT-Grundschutz: A Pragmatic Entry into Information Security for SMEs

April 17, 2026
12 min

The BSI IT-Grundschutz offers a structured, modular approach to information security with three protection levels. This guide covers the building blocks, the Grundschutz Check, how it compares to ISO 27001, and the path from basic protection to certification for SMEs.

Boris Friedrich
Read
DevSecOps: How to Integrate Security into Your CI/CD Pipeline
Informationssicherheit

DevSecOps: How to Integrate Security into Your CI/CD Pipeline

April 17, 2026
14 min

DevSecOps embeds security into every stage of software development and delivery. This guide covers the security tools for each pipeline stage (SAST, SCA, DAST, container scanning), implementation roadmap, security gates, and how DevSecOps satisfies DORA, NIS2, and CRA requirements.

Boris Friedrich
Read
Cyber Insurance: Requirements, Costs, and Selection Guide for Businesses 2026
Informationssicherheit

Cyber Insurance: Requirements, Costs, and Selection Guide for Businesses 2026

April 17, 2026
12 min

Cyber insurance covers financial losses from cyberattacks, data breaches, and IT outages. This guide explains what insurers require in 2026, coverage types, costs by company size, and how to choose the right policy — including how ISO 27001 certification reduces premiums.

Boris Friedrich
Read
ISMS Implementation: How to Build an ISO 27001 Information Security Management System Step by Step
Informationssicherheit

ISMS Implementation: How to Build an ISO 27001 Information Security Management System Step by Step

April 17, 2026
16 min

Building an ISMS per ISO 27001 is the structured path to demonstrable information security. This guide covers the complete implementation in 8 steps — from gap analysis through risk assessment, SoA creation, control implementation, internal audit, to certification — with timelines, costs, and practical advice.

Boris Friedrich
Read
IT Security Concept: Template and Practical Guide for SMEs
Informationssicherheit

IT Security Concept: Template and Practical Guide for SMEs

April 17, 2026
12 min

An IT security concept is the foundational document for your organization’s information security. This practical guide provides a template and step-by-step instructions for SMEs to create their first security concept — aligned with BSI Grundschutz and ISO 27001.

Boris Friedrich
Read
View All Articles
ADVISORI Logo
BlogCase StudiesAbout Us
info@advisori.de+49 69 913 113-01