Security Breach Analysis and Incident Response Review

Security Breach Analysis: we will analyze logs and other evidences related to security breaches in order to provide a good understanding of the point of entry, the vector, and areas of the network that have been compromised.  This information is critical in order to perform an effective incident response review.  It is possible that if no digital traces are found, we will need to perform a penetration test in order to identify point of entry (intrusion) and point of exit (exfiltration).