Regardless of the type of cybercrime or data exposure, Kroll has the human and technology resources to act quickly to identify threats, secure valuable data, and investigate a digital trail wherever it may lead. If an attack comes from the inside, we combine our digital forensic expertise with recognised investigative methods, including employee interviews and surveillance, to determine how anyone with access to sensitive information may have interacted with a client’s system.
In the case of an outside attack, such as malware, ransomware or business email compromise, our investigators collect and examine both digital and physical evidence to determine where, when and how an incident occurred and if the client’s systems are still vulnerable. Kroll can determine what data may have been compromised and if any digital evidence has been altered or erased. Our experts work with our client’s in-house teams to recover data and accurately recreate events to develop an effective recovery plan.
A global software company based in Europe received an email from an anonymous source stating the sender had access to personally identifiable information, confidential financial data and IP source code for one of its subsidiaries. The sender gave Kroll’s client two weeks to pay a ransom of one million euros in bitcoin before it was leaked. Kroll's forensic investigators got to work – ascertaining that the information in question could only have come from an insider threat. Our experts identified the individual responsible – a former employee - and provided the necessary evidence to assist with a prosecution and eventual conviction.
For more details, read the full case study.
Members of Kroll’s cybercrime investigation team reflect our multidisciplinary approach to leadership and problem-solving. If a client faces litigation or regulatory action, our experts work closely with their in-house and outside counsel and other senior executives to explicate forensics data to help make their case. We can also assemble case files for referral to regulators or law enforcement and, if requested, serve as expert witnesses.
Below are a selection few of our services available to support incident response and cyber investigations:
Many more solutions are available, use the links on this page to explore them further or speak to a Kroll expert today via our 24x7 cyber incident hotlines or our contact page.
Today, you learn your company is experiencing a serious cyber incident. It could be a ransomware attack, a hacked O365 email account, the theft of PII or PHI, data exposure from misconfigured network settings. What is the first step you should take?
Kroll’s field-proven incident response tabletop exercises provide a customised test of every aspect of an organisation’s cyber response plan.
Manage risk, not spreadsheets. Identify and address cyber threats in third-party relationships to ensure compliance with regulations such as NYDFS, FARS, GDPR, etc.
Kroll’s cyber audits and reviews ensure third parties handle sensitive data according to regulatory guidelines and industry standards.
Safely perform attacks on your production environment to test your security technology and processes.
Manage cyber risk and data security governance with Kroll’s defensible cybersecurity strategy framework.
by Tiernan Connolly
by Alex Cowperthwaite, Pratik Amin
by George Glass, Laurie Iacono, Keith Wojcieszek