Investigation procedures for suspected or confirmed data exfiltration incidents.
Framework for investigating data loss incidents and determining regulatory notification requirements.
Evaluate the exfiltration indicators.
Identify what data may have been exfiltrated.
Determine how the exfiltration occurred.
Evaluate notification and reporting requirements.
Stop the bleeding and prevent recurrence.