Credential theft, email compromise, and wire fraud attacks have skyrocketed during the last year. Managing these incidents can be as simple as risk and impact analysis to full scale digital forensic investigations. Our presentation will provide a brief overview of the attack vectors, threat actors, and style of the attacks. The main focus will be on going through the investigation process and using case studies to demonstrate different techniques and processes. We will use case studies to link to.