This document contains the summary of a presentation on real time forensics. It discusses how real time forensics can uncover the culprit while the evidence is still fresh by finding out what was damaged or stolen, the attack method used, where data was sent, and allowing recovery of compromised systems. It also examines what it would take to implement real time forensics across an entire enterprise system in real time.