Forensic Investigation and Gathering Evidence

May 23, 2017 5:15pm

Giuseppe Vaciago
Partner
R&P Legal – Rossotto, Colombatto & Partners

  • Does the company have procedures in place to secure and preserve computer-related evidence when the cyberattack occurs?
  • Preparing a training plan to contain the damage and collecting essential data required for analysis
  • Determining the scope of the breach
  • Hiring the essential external forensics experts to supplement or support the internal company
  • Limiting damage before evidence is lost or compromised
  • Using your forensics team to proactively and continuously monitoring for possible risks in the network