Home / Solutions / Incident Response
24/7 IR Hotline Mid-incident? Call 1-437-747-0878 — an analyst picks up live.

Incident response, built to contain in hours, not days.

When ransomware hits, a laptop goes missing, or a user clicks the wrong link, minutes matter. Retainer-backed IR from senior, Canadian-staffed forensic analysts — with BreachGuard handling the privacy-law workflow, your SOC handling the technical containment, and one contract holding it all together.

1-hour response SLA on retainer
Canadian forensic analysts, same time zone
Privacy & regulatory workflow included
What you get

A response that starts before the retainer call ends.

IR is the one service you hope never to use. When you do, the gap between "I think we’re breached" and "the fire is out" is the only number that matters. Here’s what we commit to.

<1 hr
Retainer response SLA
From hotline pickup to a senior responder on your bridge, with context already loaded.
24/7
Canadian responders
Live analyst on every call. No call-back, no offshore handoff, no voicemail loop.
4
Phase methodology
Activate, Contain, Investigate, Recover. Same disciplined playbook every engagement.
1
Contract, end-to-end
Forensics, legal liaison, regulator notification, BreachGuard — one accountable team.
What's included

Twelve services, three layers.

Immediate response stops the bleed. Investigation & recovery rebuilds trust. Readiness makes sure you’re never caught flat-footed again.

Immediate Response

Hours 0–72

24/7 IR Hotline

One number, one team, live pickup around the clock. Retainer clients skip the queue entirely.

Incident Triage & Containment

Scope the blast radius, isolate affected systems, revoke compromised credentials. Stop the spread before it becomes a catastrophe.

Stack: EDR tooling (Defender, CrowdStrike, SentinelOne), IAM revocation, network segmentation

Digital Forensics & Evidence Preservation

Court-admissible chain of custody. Memory, disk, and cloud artifacts captured before attackers cover tracks.

Stack: FTK, EnCase, Velociraptor, KAPE, X-Ways

Ransomware Response

Containment, threat-actor communication protocols, decryption feasibility analysis, and informed recovery decisions. Legal counsel coordinated throughout.

Malware Analysis

Static and dynamic analysis, IOC extraction, and TTP mapping to MITRE ATT&CK. Findings feed into your SOC as detection content.

Investigation & Recovery

Days 3–30

Root Cause & Scope Analysis

How did they get in. Where did they go. What did they take. Documented, evidenced, and explained in a report your board can act on.

Data Recovery & System Rebuild

Backup validation, clean-room rebuild of compromised systems, and verified restoration. No ghost backdoors left behind.

Legal & Insurance Liaison

Breach counsel coordination, cyber-insurance claim support, and evidence packaging to preserve privilege and maximize coverage.

Regulatory Notification

Federal and provincial privacy regulator filings, affected-individual notices, and timeline management — driven by BreachGuard.

Readiness & Program

Before it happens

IR Retainer Programs

Pre-negotiated hours, guaranteed response SLA, and a responder already familiar with your environment. The difference between days and hours.

IR Playbook Development

Incident-class playbooks (ransomware, BEC, insider, data loss) with decision trees, contact matrices, and communication templates.

Tabletop Exercises

Executive and technical tabletop simulations run by senior incident commanders. Find the gaps in a boardroom, not a breach.

Inside BreachGuard

Canadian privacy law, wired into every response.

When a cyber incident touches personal information, it stops being an IT problem — it becomes a PIPEDA, Quebec Law 25, and provincial-regulator problem with strict timelines. BreachGuard is the privacy-incident workflow AlecTech built to run in parallel with the technical response: notification thresholds, regulator templates, affected-individual disclosure, and audit-ready reporting, all Canadian-hosted.

  • PIPEDA Real Risk of Significant Harm (RROSH) assessment built in
  • Quebec Law 25, Alberta PIPA, BC PIPA, and Ontario PHIPA mapped
  • Regulator-ready notification templates with timeline tracking
  • Privacy-impact assessment and affected-individual disclosure workflows
Learn more about BreachGuard
PIPEDA
Federal + all provincial privacy laws covered
72 hr
Law 25 & PIPEDA notification timers tracked live
100%
Canadian-hosted, no cross-border data movement
1
Workflow, every regulator, every engagement

One MSSP. Every capability on the other end of the phone.

When the call comes in at 2 a.m., it lands with the same team already running your SOC, your IT, and your compliance program. Detections become evidence. Evidence becomes regulatory filings. Filings become lessons learned. All one team, one contract, one chain of accountability.

Tooling, platforms, and partners
Vendor-agnostic forensics and response. Tier-1 partnerships across the platforms your environment actually runs on — plus alignment with the frameworks regulators and insurers expect.
NIST SP 800-61r2
SANS PICERL
MITRE ATT&CK
PIPEDA / Law 25
PHIPA / PIPA
ISO/IEC 27035
IR methodology

From phone ringing to post-mortem in four phases.

The same disciplined playbook every engagement. No surprises on scope, timeline, or deliverables — even in the worst week of your year.

  • 01Hour 0–1
    Activate Hotline triage, senior responder engaged, bridge opened. ROE signed, scope established, legal counsel looped if needed.
  • 02Hours 1–72
    Contain Isolate, revoke, block. Preserve evidence. Stop the bleed while BreachGuard starts the regulatory clock if personal data is in scope.
  • 03Days 3–14
    Investigate Forensic analysis, root cause, scope determination, IOC extraction. Daily updates to your incident commander and legal counsel.
  • 04Weeks 2–6
    Recover Clean rebuild, monitoring uplift, lessons-learned report, regulator filings submitted, retainer detection content deployed.

Every engagement is led by a named incident commander with a senior forensic analyst and a BreachGuard advisor on the bridge from hour one. You get one point of accountability, not a rotation of ticket-takers.

Deliverables include: incident narrative, forensic timeline, IOC package (STIX/TAXII), executive summary, regulator filings, and a lessons-learned session with your leadership team.

Every finding feeds your SOC as new detection content — so the same incident never happens twice.

How we engage

Three models. One chain of custody.

The best time to plan for an incident is before it happens. The second-best time is the moment the phone rings. There’s a path for both.

Model B

Emergency IR

Already mid-incident with no retainer? We still pick up. Emergency rates apply; response time is best-effort.

  • Live analyst on the hotline, 24/7
  • Best-effort response time (typically 4–8 hours)
  • Full forensic and recovery capability
  • BreachGuard workflow engaged immediately
  • Option to convert to retainer post-incident
Best for: organizations in an active incident without a current IR provider. We help, and we help you plan so this is the last time you call cold.
Model C

IR Readiness Program

Playbook development, tabletop exercises, and IR training. Preparation, not response.

  • Incident-class playbooks (ransomware, BEC, insider, data loss)
  • Annual executive and technical tabletops
  • IR training for internal responders
  • Communication and legal-liaison templates
  • Optional retainer add-on
Best for: organizations building internal IR capability but needing external guidance, templates, and exercise facilitation.

The call you hope you never make. Make it easier.

A 15-minute retainer discussion with a senior incident commander — not a sales rep. We’ll walk through your environment, sketch what a response would look like on your worst day, and put a plan on paper before you need it.