o Pin pointing the attacker’s initial
point of entry into company network
o Analysis of Malware found on hard drive
o Detecting lateral movement across network
o Analysis of attacker techniques and
methodologies
o Detecting stolen data off a company
network
o Tracing attacker techniques through
memory analysis