Forensic Investigation and Gathering Evidence
Giuseppe Vaciago
Partner
R&P Legal – Rossotto, Colombatto & Partners
- Does the company have procedures in place to secure and preserve computer-related evidence when the cyberattack occurs?
- Preparing a training plan to contain the damage and collecting essential data required for analysis
- Determining the scope of the breach
- Hiring the essential external forensics experts to supplement or support the internal company
- Limiting damage before evidence is lost or compromised
- Using your forensics team to proactively and continuously monitoring for possible risks in the network