We replace uncertainty with answers. Find out how by exploring the actions we take to help you or your industry.
From investigations to cyber security, we find answers to your most critical questions every step of the way.
We bring the unknown to light by helping you manage compliance, navigate litigation, and mitigate risk relating to fraud, impropriety and security threats.
Our experts share their insights.
We're here to help.
Our Experts Share Their Insights
Kroll, has teamed up with Liberty Asia, a charitable organization, to produce a series of whitepaper on the latest intelligence and best practice to mitigate any hidden compliance and reputational risks relating to human trafficking issues.
Read The Whitepaper
Beyond Regulatory Enforcement: The Rise of Reputational Risk
Download the report
Building Resilience in a Volatile World
2016 Kroll & Legal Week Benchmarker Report
Read The Report
Insider threat, accidental exposure, even theft of paper records once again factor as predominant causes of data breach for our clients in 2015.
Read the report
Thank you for some great reads here..,Hopefully, these tips will help me on my next international business trip.
Excellent article on smart phones and forensics. There is a market opportunity for investigation services and mobile security solution providers to partner and provide end to end (breach to prosecution) solutions. Customers seem to be caught in the middle. Several consulting firms provide advice, but not solutions, while solution providers have solution but not the forensic / investigation expertise. Does Kroll partner with any mobile security solution providers to offer a total solution? I would think your customers (prospects) would align and welcome the combined expertise in reducing risk to their business operations.
New Era Associates
Dave, very well written and thank you for sharing. Hope all is well.
Here are some predictions of the issues we expect to occur next year and a few resolutions your business or organization should consider to help you defend your systems and data.
Prior to 2016, the majority of data breaches in the headlines involved the large-scale theft of credit card numbers from major retailers.
It’s 3 a.m., and you are awakened by the sounds of sirens blaring outside. All of the cell phones in your house start to chirp, and when you look down, you see an emergency notification with a warning to evacuate immediately. The alert says to head north and that all major roads will be used as one-way streets to enable a rapid evacuation.