Cyber Risk

Cyber Litigation Support

Whether responding to an investigatory matter, forensic discovery demand, or information security incident, Kroll’s forensic engineers have extensive experience providing litigation support to help clients win cases and mitigate losses.

Depending on your specific need, we can author declarations, affidavits, and any expert reporting necessary to support your case with a customized report on the evidence collected and key findings of the investigation. Independent assessments of compliance with consent decrees, agreements, court orders, contractual obligations, and other requirements can be provided additionally.

We can also serve as expert witnesses on almost any topic relating to digital information, including:

  • Expert testimony on the forensic soundness of data collections performed by our own team of data collection and forensic experts
  • Expert testimony on the reliability of collection practices utilized by your opponent or a third party
  • Expert reporting on our own findings and forensic analysis

Many of our experts have considerable expert testimony experience in presenting findings to judges, juries, and arbitrators, with many having served as special masters at the court’s appointment. These experts can provide evidence of experience and qualifications in an up-to-date Curriculum Vita, listing cases in which they have provided testimony.

If needed, Kroll can offer expert witness training by law professors and attorneys designed exclusively for your professionals.

/en/services/cyber-risk/investigate-and-respond/cyber-litigation-support /-/media/kroll/images/banners/services/jpg/desktop/cyber-risk.ashx service

Related Services

Cyber Risk

Cyber Risk

End-to-end cyber security services provided by unrivaled experts.

Cyber Risk
Disputes

Disputes

Expert analysis and testimony in the context of litigation and/or commercial disputes

Disputes
Cyber Risk

Remediate and Restore

Call center and breach notification services across a myriad of industries and geographies.

Remediate and Restore
Cyber Risk

Investigate and Respond

Identify vulnerabilities, intrusions and data ex-filtrations and provide recommended solutions.

Investigate and Respond
Cyber Risk

Prepare and Prevent

Internal and external assessments to evaluate clients' systems, applications, and facilities.

Prepare and Prevent

News