• Training cyberattack response teams to protect critical data and contain breach damage • Collecting and protecting cyber forensics to pinpoint the breach, supply evidence and aid investigators • Notifying affected clients to detail extent of stolen data, likelihood of identity theft and institutional and law enforcement responses