10117 Berlin
As the leading independent provider of risk and financial advisory solutions, Kroll leverages our unique insights, data and technology to help clients stay ahead of complex demands.
Kroll recently hosted its third webinar series in partnership with the International Valuation Standards Council (IVSC)
Expert provider of complex administrative solutions for capital events globally. Our services include claims and noticing administration, debt restructuring and liability management services, agency and trustee services and more.
End-to-end governance, advisory and monitorship solutions to detect, mitigate and remediate security, legal, compliance and regulatory risk.
Middle Market M&A, Strategic Advisory, Debt Advisory and Private Capital Markets, Restructuring and Insolvency Services, Financial Due Diligence, Fairness Opinions, Solvency Opinions and ESOP/ERISA Advisory.
Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory.
Advisory and technology solutions, including policies and procedures, screening and due diligence, disclosures and reporting and investigations, value creation, and monitoring.
World-wide expert services and tech-enabled advisory through all stages of diligence, forensic investigation, litigation, disputes and testimony.
Valuation of businesses, assets and alternative investments for financial reporting, tax and other purposes.
by Jonathan Jacobs, Rebecca Nelson, David Liu, Andreas Stoecklin, Alexander Kessler, Jan Hortebusch, Joanna Bartecki
by Nicholas Collins, Matt De La O, Vineet Asthana, Rory O'Sullivan, Corey Maurer, Scott Munro, Efraim Chalamish, Philipp Bose
Drilling down into the latest threats and vulnerabilities of the manufacturing sector, identifying the gaps in detection and response, which are currently impacting the mitigation process.
Kroll offers a glimpse into the security vulnerabilities faced by businesses adopting Artificial Intelligence (AI), Machine Learning (ML) and Large Language Model (LLM) following eight months of LLM penetration testing.