• Triage and basic incident handling 
  • Creating incident handling procedures and testing 
  • Large scale incident handling 
  • Cooperation with Law Enforcement agencies 
  • Identifying and handling cyber-crime traces 
  • Incident handling and cooperation during phishing campaign 
  • Law enforcement view of computer security incidents 
  • Law enforcement needs for evidence analysis 
  • Role of (tabletop) exercises in developing incident handling capability