Digital Forensics
Forensics Support
Identify the attack vectors and root cause of the incident, as well as indicators of compromise to help prevent the attack from reoccurring
- Conducts intrusion analysis and full disk forensic analysis
- Utilize industry standard processes to preserve evidence and ensure findings are forensically sound
- Full disk forensics to support root cause analysis, and the identification of threat actor tactics, techniques, and procedures