Kroll’s field-proven cyber security assessment and testing solutions help identify, evaluate and prioritize risks to people, data, operations and technologies worldwide.
Proactively assess the security of your data systems and processes with our insider’s view of today’s greatest cyber risks. We have worked in enterprises and law enforcement agencies on threat intelligence, and led global teams through incidents and investigations. We translate what we’ve learned from working on over 2,000 cyber incidents annually into a nuanced view of where gaps may exist in your security and how to prioritize improvements. You can count on Kroll advisors for impartial, technology-agnostic assessments.
Your data lives in a dynamic ecosystem of hardware, software, business processes and human interaction. With all four elements constantly in flux, Kroll knows it’s hard to keep up with all the ways that accidental or malicious compromises can happen. By teaming up with Kroll to review your data systems and processes on a regular basis—either as a whole or when you make changes, additions, or upgrades—you gain Kroll’s 360-degree view of cyber risk.
Kroll assessments are conducted by consultants with extraordinary business acumen, human insight and technical expertise. Our team collectively holds more than 100 industry certifications, including CISA, CRISC, CISSP, PFI, QSA, GPEN, CREST and more.
We customize our assessments for the complexity of your business operations, including any applicable regulatory or industry-specific standards (NIST, MITRE, HIPAA, NY-DFS, PCI, GDPR, etc.). Kroll is also technology agnostic, which reflects our longstanding reputation as a trusted impartial advisor, investigator and factfinder.
Kroll’s system assessments provide pragmatic insights for proactive or remedial strategies—from a regular component in your defensible cyber security program to acquisition due diligence, or when recovering from an incident and the need to harden security is greater than ever.
Kroll system and risk preparedness assessments and testing services are also included as part of an array of proactive services available through our client-friendly cyber risk retainers for maximum tangible value.
Robust Cyber Risk Preparedness Assessments and Testing
We have the business acumen, human insight and technical expertise and resources to review your organization’s information security program end-to-end, from policies and procedures to human factor influences and technical controls for every data touchpoint in your organization. Below are a few of our cyber security assessment and testing solutions:
- Email and Cloud Security Assessments
From our global casework, we know that cloud implementations have proved to be an Achilles’ heel in many cyber security programs. Kroll’s cloud security assessments will evaluate technical security controls in place, such as firewalls, intrusion detection solutions, antivirus software and log management. We also examine security management processes such as policy development and adherence, analytics on collected security data and data classification programs.
- Ransomware Preparedness
From our vast experience with ransomware investigations, Kroll has distilled 14 crucial security areas and ransomware attack vectors that organizations should examine to identify where their defenses are strong and where vulnerabilities exist.
- Regulatory and Standards-Based Assessments
Merging legal and technical expertise, Kroll evaluates and maps existing controls to a wide range of regulatory frameworks, such as HIPAA, GDPR, CCPA, PIPEDA, NY DFS, CMMC , NY SHIELD and industry standards such as ISO 27001, NIST 800-53 and CIS Top 20.
- Web Application Security Assessments
In addition to examining web applications for inherent security flaws and vulnerabilities, Kroll can also identify if any developers, internal or third-party, have inadvertently left critical code exposed on cloud-based repositories like GitHub, Bitbucket and Gitlab.
- Data Mapping and Inventory
Beyond providing the foundational knowledge for a true look at the state of your systems, Kroll’s privacy data mapping and inventory can shed a light on the location of sensitive and regulated data that may have arisen in your organization out of sight and out of your control.
- Penetration Testing
Kroll’s CREST-certified experts simulate attacks on your data ecosystem using the same techniques real-world hackers deploy to gain access to digital assets. Common targets include the internet perimeter, internal and external network infrastructure, websites, databases, applications and even your employees.
- Incident Response Plans and Tabletop Exercises
Field-proven incident response tabletop exercise scenarios are customized to test all aspects of your response plan and mature your program.