Specifications include, but are not limited to: 1) Assign an expert level cybersecurity professional to respond and act upon request within 24 hours. 2) Discuss and agree on objectives of each incident/breach to ensure both parties have consensus on what to achieve. 3) Provide incident assessment and response to Kent State university in respond to security incident events that may have caused by internal or external malicious actors or large-scale breaches. 4) Provide expert level forensics investigation and analysis service with accurate results and reports based on logs from provided systems, network devices, web sites. 5) Provide remediation and eradication plan after thorough investigation and analysis. 6) Provide detailed investigation report including executive summary, event timeline, critical findings/analysis, remediation recommendation at end of each engagement for various audience – technical staff, senior management, third party regulators, insurers or litigators. Kent State can request to revise the report twice and provide technical and executive briefing(s). 7) Options to perform remote incident Response Service with custom remote devices or commercial endpoint software to gain visibility and save time and travel expense. 8) Communication will be very critical during the investigation process. Kent State will provide needed information timely and expect daily summary of progress and findings.