Digital Forensics

Forensics Support

Identify the attack vectors and root cause of the incident, as well as indicators of compromise to help prevent the attack from recurring. 

  • Threat hunting and reach back forensic analysis
  • Utilize processes approved by LE including Secret Service, FBI, and CISA
  • Shared between agencies that will help mitigate future attacks. 
  • Different purpose for NCNG forensics vs law enforcement