This document instructs the reader to research a well-known public data breach or incident response, including how the system was compromised, how the problem was addressed, and what could have been done to prevent it. The reader is directed to digital forensic forums or blogs such as Forensic Focus, SANS Digital Forensics Blog, or the Magnet Forensics Blog for resources on past incidents.