Are You Experiencing a Cyberattack or Suspect a Breach?
- How did the attacker get into my environment?
- How did they move within the environment?
- During what timeframe did the attack occur?
- What networks, systems and data did they access?
- What were the attacker’s actions and objectives?
- Did the attacker exfiltrate (steal) data?
- How can I minimize the risk of a future attack?