Cyber Litigation Support

Whether responding to an investigatory matter, forensic discovery demand, or information security incident, Kroll’s forensic engineers have extensive experience providing litigation support to help clients win cases and mitigate loss.
Contact Us

To support a client’s case, our experts will produce accurate and credible declarations, affidavits, and customised reports on evidence collected and key findings of our investigations. We also provide independent assessments of compliance with consent decrees, court orders, contractual obligations, and any other legal or regulatory requirements.

Kroll’s team members can also serve as expert witnesses on virtually any topic relating to digital information, including: 

  • The forensic soundness of any data collections performed by our own forensic experts 
  • Reliability of any collection practices performed by a litigation opponent or third party
  • Reporting our own findings and forensic analysis 

Many of our experts have considerable experience testifying before judges, juries, and arbitrators as expert witnesses. Kroll’s team members are also often appointed by courts to serve as special masters. Each of our experts can provide evidence of their credentials, qualifications and experience with a current Curriculum Vita, listing cases in which they have testified.

If necessary, our team can also provide a customised training program to help prepare a client’s in-house professionals to serve as expert witnesses.   

Talk to a Cyber Expert

Kroll is ready to help, 24x7. Use the links on this page to explore our services further or speak to a Kroll expert today via our 24x7 cyber hotlines or our contact page.

Incident Response Tabletop Exercises

Kroll’s field-proven incident response tabletop exercises provide a customised test of every aspect of an organisation’s cyber response plan.

Incident Response Plan Development

Today, you learn your company is experiencing a serious cyber incident. It could be a ransomware attack, a hacked O365 email account, the theft of PII or PHI, data exposure from misconfigured network settings. What is the first step you should take?

Optimised Third-Party Cyber Risk Management Programmes

Manage risk, not spreadsheets. Identify and address cyber threats in third-party relationships to ensure compliance with regulations such as NYDFS, FARS, GDPR, etc.

Third Party Cyber Audits and Reviews

Kroll’s cyber audits and reviews ensure third parties handle sensitive data according to regulatory guidelines and industry standards.

FAST Attack Simulation

Safely perform attacks on your production environment to test your security technology and processes.