![David White is EMEA Leader David White is EMEA Leader](https://media-cdn.kroll.com/jssmedia/kroll/images/headshots/directors/david-white.png?h=160&iar=0&w=140&mw=384)
JURISDICTION | NOTIFICATION | CALL CENTER | IDENTITY MONITORING | IDENTITY THEFT RESTORATION | CREDIT MONITORING |
---|---|---|---|---|---|
UNITED STATES | ![]() | ![]() | ![]() | ![]() | ![]() |
CANADA | ![]() | ![]() | ![]() | ![]() | ![]() |
UNITED KINGDOM | ![]() | ![]() | ![]() | ![]() | ![]() |
EUROPE | ![]() | ![]() | |||
ASIA* | ![]() | ![]() |
Services include drafting communications, full-service mailing, alternate notifications.
Kroll provides your breach population with direct access to investigative experts for live support and best practice advice, as well as identity restoration should they become victims of identity theft.
Kroll will work with your team to implement a personalized, plain-language notification letter that provides pertinent information and maintains message control.
Kroll's expertise handling large-scale notifications for highly regulated industries helps you increase efficiencies and meet regulatory requirements.
Credit monitoring can be a powerful tool to offer in the wake of a data breach. Kroll provides a monitoring alert system that’s backed by the expertise of our licensed investigator team.
Kroll’s unique combination of identity monitoring services can detect more types of identity theft than credit monitoring alone, providing practical help to combat identity theft and fraud.
by Laurie Iacono, Keith Wojcieszek, George Glass
by Laurie Iacono, Keith Wojcieszek, George Glass
by David White
by Laurie Iacono, Keith Wojcieszek, George Glass
Drilling down into the latest threats and vulnerabilities of the manufacturing sector, identifying the gaps in detection and response, which are currently impacting the mitigation process.
Our quarterly threat landscape reports are fuelled by frontline incident response intel and elite analysts.
Kroll offers a glimpse into the security vulnerabilities faced by businesses adopting Artificial Intelligence (AI), Machine Learning (ML) and Large Language Model (LLM) following eight months of LLM penetration testing.