-
24X7 Hotline 24X7 Hotline
Cyber Litigation Support
Whether responding to an investigatory matter, forensic discovery demand, or information security incident, Kroll’s forensic engineers have extensive experience providing litigation support to help clients win cases and mitigate loss.
Contact UsTo support a client’s case, our experts will produce accurate and credible declarations, affidavits, and customised reports on evidence collected and key findings of our investigations. We also provide independent assessments of compliance with consent decrees, court orders, contractual obligations, and any other legal or regulatory requirements.
Kroll’s team members can also serve as expert witnesses on virtually any topic relating to digital information, including:
- The forensic soundness of any data collections performed by our own forensic experts
- Reliability of any collection practices performed by a litigation opponent or third party
- Reporting our own findings and forensic analysis
Many of our experts have considerable experience testifying before judges, juries, and arbitrators as expert witnesses. Kroll’s team members are also often appointed by courts to serve as special masters. Each of our experts can provide evidence of their credentials, qualifications and experience with a current Curriculum Vita, listing cases in which they have testified.
If necessary, our team can also provide a customised training program to help prepare a client’s in-house professionals to serve as expert witnesses.
Talk to a Cyber Expert
Kroll is ready to help, 24x7. Use the links on this page to explore our services further or speak to a Kroll expert today via our 24x7 cyber hotlines or our contact page.
Connect With Us
Explore areas we can helpStay Ahead with Kroll
Incident Response Tabletop Exercises
Kroll’s field-proven incident response tabletop exercises provide a customised test of every aspect of an organisation’s cyber response plan.
Incident Response Plan Development
Today, you learn your company is experiencing a serious cyber incident. It could be a ransomware attack, a hacked O365 email account, the theft of PII or PHI, data exposure from misconfigured network settings. What is the first step you should take?
Optimised Third-Party Cyber Risk Management Programmes
Manage risk, not spreadsheets. Identify and address cyber threats in third-party relationships to ensure compliance with regulations such as NYDFS, FARS, GDPR, etc.
Third Party Cyber Audits and Reviews
Kroll’s cyber audits and reviews ensure third parties handle sensitive data according to regulatory guidelines and industry standards.
FAST Attack Simulation
Safely perform attacks on your production environment to test your security technology and processes.