If a company has a detailed cybersecurity incident response plan (IRP) in place, it will be prepared to act promptly and effectively to protect its network, operations, and reputation. Whether a client wants to validate its existing IRP or develop their first plan, Kroll's experts can help.
With a team of cybersecurity experts who respond globally to thousands of incidents each year, Kroll knows the risk landscape and has seen the value of being prepared.
When helping clients develop or validate an IRP, our methodology integrates our experts’ front-line experience investigating persistent and emerging cyber threats with recognised industry security standards, including the NIST Cybersecurity Framework and CIS Controls™, while also considering a client’s unique needs and concerns as well as any local, regional or industry regulations.
Our IRP support covers several key areas including:
Having a robust IRP in place not only provides practical guidance to team members, it also signals to regulators, customers, investors, and other important stakeholders an organisation’s commitment to proactively addressing cyber threats. Take advantage of Kroll's extensive experience and expertise in responding to cyber incidents and be better prepared to respond to a cyberattack. For more information on developing a new incident response plan or testing and validating an existing plan, contact us today.
Stop cyberattacks. Kroll Responder managed detection and response is fueled by seasoned IR experts and frontline threat intelligence to deliver unrivaled response.
Today, you learn your company is experiencing a serious cyber incident. It could be a ransomware attack, a hacked O365 email account, the theft of PII or PHI, data exposure from misconfigured network settings. What is the first step you should take?
Kroll’s field-proven incident response tabletop exercises provide a customised test of every aspect of an organisation’s cyber response plan.
Manage risk, not spreadsheets. Identify and address cyber threats in third-party relationships to ensure compliance with regulations such as NYDFS, FARS, GDPR, etc.
Kroll’s cyber audits and reviews ensure third parties handle sensitive data according to regulatory guidelines and industry standards.
Safely perform attacks on your production environment to test your security technology and processes.
by Laurie Iacono, Keith Wojcieszek, George Glass
by Howard Johnson, A. Scott Davidson, Bob Bartell, CFA, Dafydd Evans, Stephanie Lau, Joel Bowers, Stephen Burt, Josh Benn, Nicholas Collins, Alexandre Pierantoni, David Lu, Jake Newman, Mathew Holden
by Andrew Rathbun, Eric Zimmerman