Computer & Digital Forensics

Kroll’s team of computer forensics experts can assist at any stage of an investigation or litigation to ensure no digital evidence is overlooked, regardless of the number or location of data sources.
Contact Us

When dealing with allegations of fraud, financial tampering, computer crime, employee misconduct and other wrongdoing, corporations, law firms, and government agencies often have to follow digital trails to find all the relevant evidence.

Kroll’s computer forensic experts assist clients with their most complex and sensitive investigative or litigation matters involving electronic evidence or data preservation. 

 

Complete Coverage

Kroll’s team of computer forensics experts can step in at any stage of an investigation or litigation to help ensure no digital evidence is lost or overlooked, regardless of the number or location of data sources.

Cyber Crime Investigation

Using our vast computer forensics expertise along with more traditional techniques, our investigators examine all physical and digital evidence to determine what did or did not happen.

Data Preservation

For organisations involved in an investigation or litigation, Kroll uses the latest cost-effective and defensible methods to identify and preserve electronic data.

Data Collection

Our team deploys the most up-to-date and forensically sound methodologies to gather our clients’ data for any digital investigation, analysis or discovery, regardless of the volume and complexity of their data systems.

Data Recovery and Forensic Analysis

If a client’s data has been purposely or accidentally altered or deleted, our digital forensics experts will examine the digital clues left behind to quickly and defensibly recover any relevant information.

Expert Testimony and Reporting

Kroll’s experts have the necessary credentials and experience to serve as credible expert witnesses or special masters appointed by the court.

Talk to a Cyber Expert

Kroll is ready to help, 24x7. Use the links on this page to explore our services further or speak to a Kroll expert today via our 24x7 cyber hotlines or our contact page.

Incident Response Plan Development

Today, you learn your company is experiencing a serious cyber incident. It could be a ransomware attack, a hacked O365 email account, the theft of PII or PHI, data exposure from misconfigured network settings. What is the first step you should take?

Incident Response Tabletop Exercises

Kroll’s field-proven incident response tabletop exercises provide a customised test of every aspect of an organisation’s cyber response plan.

Virtual CISO (vCISO) Advisory Services

Kroll’s Virtual CISO (vCISO) services help an organisation’s executives and data security teams safeguard information assets while providing augmented cyber expertise to support and secure business operations, reduce risk, and signal to stakeholders a commitment to data security.


FAST Attack Simulation

Safely perform attacks on your production environment to test your security technology and processes.

Optimised Third-Party Cyber Risk Management Programmes

Manage risk, not spreadsheets. Identify and address cyber threats in third-party relationships to ensure compliance with regulations such as NYDFS, FARS, GDPR, etc.

Third Party Cyber Audits and Reviews

Kroll’s cyber audits and reviews ensure third parties handle sensitive data according to regulatory guidelines and industry standards.