•
Interviews with involved professionals to understand the incident.
•
Identification, investigation and isolation of machines related to the incident.
•
Memory acquisition (up to three acquisitions, depending on the degree of reliability, criticality and sensitivity of the data and the environment).
•
Acquisition of disk image of each machine (potentially, two copies - online or offline).
•
Acquisition of hibernation files and pagefiles.
•
Memory analysis for locating and understanding fraud and/or data leaks.
•
Hibernation analysis and pagefiles for locating and understanding fraud and/or leak.
•
Digital Forensic analysis on files, records, application data, and metadata.
•
Recovery of lost/deleted files directories (when it is possible).
•
Dynamic analysis on disk image of each system related to the incident (application behavior).
•
Event correlation between memory, disk and application data analysis.
•
Presentation of the generated report.