Cyber
State of Cyber Defense: Healthcare Edition
A deep dive into the latest threats and vulnerabilities facing the health care sector along with gaps in detection and response impacting improvement efforts.
The KAPE enterprise license is effective as of the date of purchase of the license, and it grants the licensee the ability to install, use and run KAPE on the licensee's network for use by up to the number of authorized users in this order. The total number of authorized users will not exceed the number outlined in such order, except as expressly agreed to in writing by the parties and subject to any appropriate adjustment of the license fees payable under such order. Under the terms of this agreement, the KAPE enterprise license is valid for one year following the date of purchase and renews automatically for a 12-month term unless expressly agreed to in writing by the parties and subject to any appropriate adjustment of the license fees.
In addition to the rights to use KAPE commercially, licensees receive discounts on the KAPE intensive training and certification programs and are pre-qualified to take the KAPE certification exam.
To complete the purchase, users are required to read and agree to the KAPE enterprise license terms and conditions. Once this step is complete, the users are directed to our payment gateway where they can choose the number of licenses and complete the purchase.
Learn how to jumpstart your forensic investigations and find meaningful data fast with a live KAPE training session led by a Kroll instructor.
The latest KAPE tutorials, webcasts and guides created by Kroll instructors.
Find, collect and process forensically useful artifacts in minutes.
A deep dive into the latest threats and vulnerabilities facing the health care sector along with gaps in detection and response impacting improvement efforts.
Join Kroll experts at the RSA Conference in San Francisco May 6-9, 2024. Stop by booth 2239 in the South Expo Hall to meet our team.
Join the Q1 2024 Cyber Threat Landscape Virtual Briefing as Kroll’s cyber threat analysts outline notable trends and insights from our incident response intelligence.
by Eric Zimmerman, Andrew Rathbun
by Eric Zimmerman, Andrew Rathbun
by Eric Zimmerman, Andrew Rathbun
by Eric Zimmerman