The listings featured on this site are from companies from which this site receives compensation. This influences: Appearance, order, and manner in which these listings are presented.
Our videos have over 5 million views on Youtube! Visit our channel now »
Disclosure:
Professional Reviews

vpnMentor contains reviews that are written by our community reviewers. These take into consideration the reviewers’ independent and professional examination of the products/services.

Ownership

vpnMentor was established in 2014 as an independent site reviewing VPN services and covering privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, ZenMate, Private Internet Access, and Intego, which may be reviewed on this website.

Affiliate Commissions Advertising

vpnMentor contains reviews that follow the strict reviewing standards, including ethical standards, that we have adopted. Such standards require that each review will take into consideration the independent, honest and professional examination of the reviewer. That being said, we may earn a commission when a user completes an action using our links, at no additional cost to them. On listicle pages, we rank vendors based on a system that prioritizes the reviewer’s examination of each service, but also considers feedback received from our readers and our commercial agreements with providers.

Reviews Guidelines

The reviews published on vpnMentor are written by community reviewers that examine the products according to our strict reviewing standards. Such standards ensure that each review prioritizes the independent, professional and honest examination of the reviewer, and takes into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings we publish may also take into consideration the affiliate commissions we earn for purchases through links on our website.

LIFARS – Proactive and Reactive Cybersecurity Solution

Kristina Perunicic Updated on 12th July 2023 Managing Editor
Table of Contents

When most people hear the word “forensics” they think of police investigations and TV shows like CSI and Law and Order.  However, in the rapidly expanding world of computer security, digital forensics is playing an ever-increasingly important role alongside security intelligence gathering.

Ondrej Krehel founded LIFARS in 2013, after spending many years analyzing, preventing, and investigating cybersecurity attacks. In our recent discussion, he explains how he sees the future of cybersecurity and what services his company offers to prevent and battle potential attackers.

Please tell me a little bit about yourself and your background.

I am the CEO and Founder of LIFARS LLC, which is an international cybersecurity and digital forensics firm, based in New York City. Before starting LIFARS, I was the Chief Information Security Officer of Identity Theft 911, the nation’s premier identity theft recovery and data breach management service. I also have experience conducting forensics investigations and managing the cybersecurity department at Stroz Friedberg and at Loews Corporation. With two decades of experience in computer security and digital forensics, I have been involved in a broad range of IT security matters. Some of my efforts have received attention from CNN, Reuters, The Wall Street Journal and The New York Times, among many others.

I’d like to start by understanding the company, at a very high level.  First of all, what does LIFARS stand for?

LIFARS stands for Liberty Investigation Forensic And Response Services.

Your web site says that LIFARS is a “digital forensics and cybersecurity intelligence firm.” What exactly does that mean?

Our focus areas are incident response, digital forensics, technical assessments, advisory services, and intelligence gathering from various cases we have processed.

What are the main services and products that you offer?

LIFARS provides a diverse array of cybersecurity solutions that are tailored to each client’s business objectives. Our main solutions include digital forensic investigations, incident response, and ransomware solutions. We have experience with various cases ranging from minor intrusions to high-profile, multinational security breaches. Our expert team of emergency responders is  available  both remotely and onsite.  With our thorough remediation, clients won’t have to face a “worst-case-scenario”.  We have dealt with a number of ransomware cases, where we mitigated the risks of ransomware and refined the security posture of our client organizations.

Do you develop your own software or just recommend and configure third-party products?

As I briefly mentioned above, we conduct digital forensic investigations, incident response, web application security testing, and digital risk assessments. Think of us as a consulting firm that delivers holistic solutions, including third party products, rather than a software or hardware provider.

However, we do have an extensive alliance network, which allows us to access the latest and the best tools in the market. We have around 10 alliances that we work with closely, and these strong relationships help us to provide the most suitable products for each type of clients.

lifars booth

Are you normally called in only after a security incident occurs?

LIFARS offers both proactive and reactive measures when facing incidents. From advisory services and training to intrusion source detection and remediation, our team of experienced professionals ensure immediate assistance and expert advice. We are the modern cyber ambulance. As technology continues to become more innovative, so does the tactics used by malicious hackers. From individuals to businesses to academic institutions and agencies, the number of cybercrimes is increasing and there is no sign of it slowing down. LIFARS’ expert team provides a variety of services to ensure your information is kept safe, or in the case of an incident, is recovered.

How do you define your market? Who is your specific target audience within that market?

Any company that deals with valuable data could be a target of cybercriminals and that is our audience. However, we work mainly for small to mid-sized organizations that are dealing with sensitive data. We have clients from financial service firms, insurance companies, hospitals, law firms, etc.

How many customers do you have today? Where are they mainly located?

We have processed hundreds of incidents, including a number of ransomware forensic cases, in a calendar year.  We primarily operate in North America and Europe.

How would you describe your current typical customer?

Our typical customer has some incident response team members already on staff, and needs to increase cyber resilience, effectiveness and velocity of cyber response.

Who are some of your biggest customers?

We work for various clients from Fortune 20 companies to small and mid-sized organizations. The detailed information about our clients is confidential due to legal agreements.

If we were to segment your services into (i) preemptive activities, (ii) crisis (breach) management, and (iii) training, what would be the percentage of your overall efforts/revenues would each of those categories represent?

I would have to say both preemptive activities and crisis management would cover 70% of what we do. Managed detection, threat hunting, and managed incident response would be part of the preemptive solutions we offer and incident response retainers and digital forensics would be part of crisis management solution.

Who do you see as your main competitors?

I believe we are too different to have competitors. Most of the firms operating in the space of incident response are billion-dollar companies. We have a smaller team here, but we do have an excellent network with a number of alliances, which makes us unique. We work with an appropriate alliance in the network for each of the case we deal with, so we can tailor our service that fits to the client organization’s needs. I believe this makes us different from any other companies that offer the same services.

How do you see your services and tools as different and/or better than theirs?

We offer a customized security plan that is specific for each customer. We map out a step-by-step program together with our clients that is tailored to each organization’s needs and objectives. Moreover, we guarantee premier response time for our clients, as we provide superior speed and accuracy in execution.

How many employees do you have today? Where are they located?

Including all the contractors with whom we work, we have more or less 50 employees, who are located mainly in NYC.

How do you see cyber security in general, and security forensics in particular, evolving in the coming years?

Orchestration and automation will play a significant role in cybersecurity and digital forensics. However, even with the new technology that is coming in, forensics examiners will still be needed for resolution and remediation of data breaches.

lifars qubit-conference

What are your future plans for LIFARS?

We will grow and share success with LIFARS team members. Our team here works hard and we all believe that one day rewards will present themselves.

How did you first get involved in cyber security and digital forensics?

I have always been very curious about mathematical algebra, and other computer systems. Since I was in university, I’ve always enjoyed breaking codes and have been interested in security structures in operating systems. My major in mathematical physics helped me bring a scientific view into the field. At one point, I was able to break a complicated encryption system designed by one of the Swiss banks in a case within the US Department of Justice. I truly have passion in what I do, and I do enjoy being part of the industry.

You are also on the faculty of IANS -  the Institute for Applied Network Security. Please tell me about that.

The IANS Faculty includes thought-leaders and industry experts in the information security community. I am part of the faculty in order to share my insights with other IANS members and at many IANS hosted events. Most recently, I was invited to the IANS Toronto Forum to present 3 different sessions related to threat intelligence, incident response planning, and threat hunting.

lifars speaking

Another organization you are involved in is OWASP - Open Web Application Security Project. What is that project?

OWASP is a community where members share insights, tools, and technologies in the field of web application security.  Important aspects that people focus on are forensics investigations of compromised web applications.

How many hours a day do you normally work?  What do you like to do when you are not working?

Due to the rapid growth of our company and the multitude of intricate tasks to manage, my workload is substantial. Many of my days are packed with appointments, and there are occasions when I need to dedicate full-time hours to work even on weekends. Nevertheless, whenever I find myself with free time, I thoroughly enjoy engaging in outdoor sports activities.

Is there anything else you’d like to share with our readers?

Do not underestimate the time and effort you have to put in to be one of the top in your domain. What will define you is your impact and execution in what you do. Understand what your capabilities are and then build trust and integrity for your success.

About the Author

Kristina Perunicic is a former editor for vpnMentor. She’s a cybersecurity expert with an interest in VPNs and their importance in the digital privacy landscape.

Did you like this article? Rate it!
I hated it! I don't really like it It was ok Pretty good! Loved it!
out of 10 - Voted by users
Thank you for your feedback