Automated data breach reviews to identify high-risk data

When searches of breached datasets are required, we use machine learning and advanced analytics to accurately identify the documents that need to be manually reviewed

Get in touch

Data breach risk

Sensitive information including personal data, account credentials and intellectual property are frequently targeted and stolen by threat actors during cyber incidents. Sensitive data lost in breaches can affect notification obligations, and can lead to fines, lawsuits and other types of harm. To quantify the impact of a data breach and the risk to affected organisations and individuals, it is important to quickly and efficiently identify high-risk data in compromised accounts and exfiltrated datasets.

How we can help

Our data breach analysts are focused on defensibly reducing the population of documents for manual review, using a combination of data filtering, deduplication, machine learning, advanced analytics and workflow design

We collect the data then deduplicate and filter it, so that only the files of interest are carved out and so that documents are only reviewed once

Our machine learning models substantially reduce false positives by intelligently matching sensitive data types, rather than relying on text pattern searches

Our impact assessment reports categorise sensitive data by type and risk level, so that only the documents that are most relevant are selected for review

We collect the data then deduplicate and filter it, so that only the files of interest are carved out and so that documents are only reviewed once

Our machine learning models substantially reduce false positives by intelligently matching sensitive data types, rather than relying on text pattern searches

Our impact assessment reports categorise sensitive data by type and risk level, so that only the documents that are most relevant are selected for review

Why Asceris?

  • Our cyber incident responders hand over seamlessly to our data breach specialists, avoiding any delays between the investigation and the breach review
  • Our team has extensive experience in data breach analytics and in managing review platforms for data breach review and litigation support
  • Our technology platform is purpose-built for data breach reviews and compiling notification lists
  • We use data analytics to defensibly reduce the review population, enabling our clients to make data-driven decisions regarding which documents should be in scope for the manual review
  • We work with managed review partners who can provide review support when required, enabling us to scale to very large reviews or meet extremely challenging deadlines