Centralized collection of system events is a vital element of effective cybersecurity
forensics and analysis. By correlating these events, organizations can uncover an attacker’s activities and trace their movements within the network. This process also supports monitoring, early detection, prevention, and containment efforts. Pyramid outlines the necessary inventories of systems and related data that must be collected to enable thorough cyber forensic investigations. It is essential to understand that different systems generate different types of event logs; therefore, efforts are made to present a unified and coherent view of potential breaches.