Determining if an event constitutes a security incident subject to investigation;
Conducting an appropriate investigation into the root cause, source and nature of a computer security incident, assessing the extent of damage, and recommending an effective response;
Coordinating efforts to preserve evidence of the incident;
Interviewing affected users;
Managing the release of information to the user community;
Preparing a report of findings, root causes, lessons learned, and recommended actions for management review.