Making the Most of Digital Risk Protection in Today’s Threat Landscape October 6, 2021 Webcast

or to bookmark this page

Click here to bookmark this page

Click here to remove bookmark

Hosted by Kroll and Redscan cyber risk experts, this webcast will address digital risk protection (DRP) and share impactful use cases for today’s threat landscape. Often classified as “dark web monitoring,” DRP can be merged with cyber threat intelligence services to not only track threats but take action against threats happening outside of your network. Examples of such include, but are not limited to social media platforms, forums, domain registrations and account takeovers. 

The session also will include examples of effective DRP deployment and how it can be leveraged in ransomware investigations, brand and fraud protection, high-visibility staff protection, reputational management and more.

Schedule: 11:00 a.m. – 11:45 a.m. (ET) / 04:00 p.m. – 04:45 p.m. (BST)

This Webcast Will Cover

  • How adversaries are leveraging compromised credentials easily available for sale on the dark web, and how DRP programs can be applied in such cases
  • How DRP programs can help minimize exposure in highly politicized or activist-prone environments, especially with NGOs and other high-profile executives
  • How when you align threat intelligence and DRP measures, when dealing with ransomware attacks involving data exfiltration, you can minimize costly breach notification mandates
  • How to leverage DRP as part of cyber due diligence exercises to uncover risks ahead of or during transactions
 

Presenters

  • Keith Wojcieszek, Managing Director, Cyber Risk
  • Laurie Iacono, Senior Vice President, Cyber Risk 
  • George Glass, Head of Threat Intelligence, Redscan, a Kroll business (Host)
2021-10-06T00:00:00.0000000 0001-01-01T00:00:00.0000000 /-/media/kroll/images/events/2021/featured-images/webcast-digital-risk-protection.jpg /en/insights/events/2021/webcast-digital-risk-protection event {E39587AD-8F0B-4FE2-865F-969BC5501096} {41DDB890-9D90-40C4-91B5-6EA832C9060A} {3A077BFC-C74A-40AF-A14C-13BCF6E3873E} {2F9D4938-E5F0-4F9C-9A20-C4A5DCF79130} {010E62CD-5FFC-47D2-9A88-ACC26BCD8EAC} {058CEC4B-AB74-4982-A8CC-B399FCB93BB2} {A3E80394-4BDC-4E1D-8266-0653FE885E69} {34183564-0FD0-4B23-83DD-F39E7A73B28B} {2DEEE4D2-8278-4C50-B3FF-1563BB257804}

Contact Us

Other Areas We Can Help

Cyber Risk

Cyber Risk

Global, end-to-end cyber risk solutions.

Cyber Risk
Incident Response and Litigation Support

Cyber Litigation Support

Expert witnesses on any cyber topic including forensic data collection and analysis.

Cyber Litigation Support
Incident Response and Litigation Support

24x7 Incident Response

Compliant notifications, reputation-saving remediation, and litigation support.

24x7 Incident Response
Cyber Risk Retainers

Cyber Risk Retainers

Secure a true cyber risk retainer with elite digital forensics and incident response capabilities.

Cyber Risk Retainers
Has COVID-19 Impacted Your Ability to Preserve Evidence for Future Litigation?

Ransomware Preparedness Assessment

Helps your organization avoid ransomware attacks by examining 14 crucial security areas and attack vectors.

Ransomware Preparedness Assessment
Cyber Risk: The New Due Diligence Frontier, Identity Monitoring

Data Breach Notification Letters

Notification letters personalized by industry including healthcare, financial, legal and others.

Data Breach Notification Letters

Insights

Events

New Trends Identified Kroll's 2021 Anti-Bribery and Corruption Benchmarking Report

Calendar

Location

Kroll Alternative Investments Virtual Conference

Calendar

Location