The document discusses forensic investigation techniques for cyber incidents. It describes Storm Cyber.Care's services including lightweight cyber risk assessments, integrated cyber incident response, and helping clients create and test cyber incident response plans. It then discusses forensic investigation methods, including analyzing the method of attack, affected systems, data movement, responsible parties, and potential impacts. Technical response objectives and common incident types like business email compromise are also summarized. The challenges of analyzing data from hijacked email mailboxes is covered, along with Storm's 10-step process for analyzing mailbox data and creating a register of affected data subjects.