— Sloth Boss
Your Sample Challenge
A mid-sized healthcare company discovers suspicious network activity during a routine security audit - multiple failed login attempts from various IP addresses targeting their patient records database, followed by successful authentication from an unfamiliar geographic location. The security team must quickly determine whether this represents a coordinated breach attempt, compromised credentials from a phishing campaign, or legitimate access from a traveling employee who forgot to notify IT about their remote work. They need to analyze authentication logs, cross-reference IP addresses with known threat intelligence feeds, review recent email security alerts for potential phishing attempts, and implement immediate containment measures without disrupting critical healthcare operations, all while ensuring HIPAA compliance and preparing an incident report for regulatory authorities within the mandated 72-hour window.