Digital Forensics
Forensics Support
Identify the attack vectors and root cause of the incident, as well as indicators of compromise to help prevent the attack from recurring.
- Threat hunting and reach back forensic analysis
- Utilize processes approved by LE including Secret Service, FBI, and CISA
- Shared between agencies that will help mitigate future attacks.
- Different purpose for NCNG forensics vs law enforcement