SkeletonXE - Responding to the CISCO Vulnerability (CVE-2023-20198)
by George Glass, Laurie Iacono, Ryan Hicks

The art of crafting a notification letter is one that can sometimes be taken for granted – and yet it is your primary communication with stakeholders regarding your data security incident, making it of great significance in controlling your message and quelling breach population fears. There are many nuances, but any good letter will include some basic information:
Your Kroll team will work with you and your legal counsel to draft a personalized, plain-language communication that provides information about your data breach event, as well as the solutions being offered. We’ll segment your letters by state to address unique regulatory stipulations and will optimize delivery routes to help you meet required deadlines.
Once the letter has been drafted, Kroll will also be on hand to assist with the logistics of mailing, and preparing for responses from your affected population. We will work closely with your team to optimize speed and deliverability, while also reducing unnecessary notification costs. Kroll’s team can work with you to:
Once this is completed, we can review your mailing list and separate the groups that require special handling, such as: children, adults, expatriates or decedents. We can separate these categories, identifying which individuals might have special considerations for consumer services, or groups that are at a higher risk based on information lost.
Incident response, digital forensics, breach notification, security strategy, managed security services, discovery solutions, security transformation.
Kroll’s elite security leaders deliver rapid responses for over 3,000 incidents per year and have the resources and expertise to support the entire incident lifecycle, including litigation demands. Gain peace of mind in a crisis.
Kroll's computer forensics experts ensure that no digital evidence is overlooked and assist at any stage of an investigation or litigation, regardless of the number or location of data sources.
Stop cyberattacks. Kroll Responder managed detection and response is fueled by seasoned IR experts and frontline threat intelligence to deliver unrivaled response.
Kroll’s Virtual CISO (vCISO) services help executives, security and technology teams safeguard information assets while supporting business operations with augmented cyber expertise to reduce business risk, signal commitment to data security and enhance overall security posture.
Kroll’s ransomware preparedness assessment helps your organization avoid ransomware attacks by examining 14 crucial security areas and attack vectors.
Kroll delivers more than a typical incident response retainer—secure a true cyber risk retainer with elite digital forensics and incident response capabilities and maximum flexibility for proactive and notification services.
by George Glass, Laurie Iacono, Ryan Hicks
by Roman Guillermo, George Glass, Cristhian Parrot
by Josh Mitchell, Mario Ciccarelli