• Methods for collecting initial evidence during a cyber incident
  • Preservation of digital evidence and chain of custody
  • Conducting thorough investigations and analysis of cyber incidents