![](https://media-cdn.kroll.com/jssmedia/kroll-images/headshots/frank-marano.png?h=160&iar=0&w=140&mw=384)
Kroll’s client – a global software company based in Europe – received an email from anonymous source claiming it had access to sensitive data, including personally identifiable information, confidential financial records, and IP source code for a subsidiary. The sender demanded a ransom of one million euros in bitcoin and gave the client two weeks to pay before the data would be leaked.
Kroll’s team of forensic investigators determined that someone inside the company was source of the infiltration. We identified the individual responsible and gathered essential information to assist with a prosecution.
For more details, read the full case study.
Today, you learn your company is experiencing a serious cyber incident. It could be a ransomware attack, a hacked O365 email account, the theft of PII or PHI, data exposure from misconfigured network settings. What is the first step you should take?
Kroll’s field-proven incident response tabletop exercises provide a customised test of every aspect of an organisation’s cyber response plan.
Manage risk, not spreadsheets. Identify and address cyber threats in third-party relationships to ensure compliance with regulations such as NYDFS, FARS, GDPR, etc.
Kroll’s cyber audits and reviews ensure third parties handle sensitive data according to regulatory guidelines and industry standards.
Safely perform attacks on your production environment to test your security technology and processes.
Manage cyber risk and data security governance with Kroll’s defensible cybersecurity strategy framework.
by Alex Cowperthwaite, Pratik Amin
by George Glass, Laurie Iacono, Keith Wojcieszek
by Alex Cowperthwaite