This document discusses memory forensics and incident response. It notes that 46-58% of large organizational losses are due to insider threats, even though identifying offenders and recovering assets from insider incidents should be easier. However, in 40% of insider incidents, those responsible are never identified due to insufficient evidence. This is often because 61% of businesses do not have access to forensic technology or procedures. The document then outlines best practices for incident response, including collecting volatile memory data and using tools like Volatility to analyze RAM and identify intrusions. It also discusses challenges like anti-forensics programs and using direct memory access via FireWire to bypass passwords and collect passwords from memory.