We replace uncertainty with answers. Find out how by exploring the actions we take to help you or your industry.
From investigations to cyber security, we find answers to your most critical questions every step of the way.
We bring the unknown to light by helping you manage compliance, navigate litigation, and mitigate risk relating to fraud, impropriety and security threats.
Our experts share their insights.
We're here to help.
Our Experts Share Their Insights
Kroll’s latest issue in the Spotlight Asia series, tracing the activity of PE and VC investors in the regions’ swiftly evolving tech investment landscape
DOWNLOAD THE REPORT
Forging New Paths in Times of Uncertainty
Download the Report
Cyber Risk: GCS take responsability
Read The Report
Kroll, has teamed up with Liberty Asia, a charitable organization, to produce a series of whitepaper on the latest intelligence and best practice to mitigate any hidden compliance and reputational risks relating to human trafficking issues.
Read The Whitepaper
Thank you for some great reads here..,Hopefully, these tips will help me on my next international business trip.
Excellent article on smart phones and forensics. There is a market opportunity for investigation services and mobile security solution providers to partner and provide end to end (breach to prosecution) solutions. Customers seem to be caught in the middle. Several consulting firms provide advice, but not solutions, while solution providers have solution but not the forensic / investigation expertise. Does Kroll partner with any mobile security solution providers to offer a total solution? I would think your customers (prospects) would align and welcome the combined expertise in reducing risk to their business operations.
New Era Associates
Dave, very well written and thank you for sharing. Hope all is well.
As part of our training services, Kroll can lead members of your incident response team through the following 12 basic principles for effective and properly conducted internal investigations.
As our world grows increasingly digital and interconnected, having a defensible cybersecurity framework should be on your reevaluation checklist.