Go beyond evidence to insight: our experienced investigators and technologists can identify, collect, preserve, search and present complex data to deliver case-changing insights in litigation, arbitration or disputes.
Kroll can provide industry leading support through all stages of the eDiscovery Reference Model (EDRM).
Kroll has been retained on thousands of matters with a mandate of identifying sensitive data known to be exfiltrated by threat actors. Personally identifiable information and personal health information of employees and customers is commonly leaked during ransomware and business email compromise events. The leaked personally identifiable information is often protected under mandatory reporting requirements. Kroll uses the RelativityOne review platform to process, search, and perform analytics to defensibly reduce the data set to records potentially containing sensitive data. Automation is used where possible to extract the detected information, and review attorneys are retained to manually review and extract information where analytics or other automation is not effective. Through this process, all sensitive data is consolidated into a deliverable with an entry for each affected individual or business. These deliverables are designed to be easily leveraged by Kroll’s Identity Theft Breach Notification team.
Litigation Kroll’s team of experts work with clients to develop a litigation strategy, collect evidence for analysis and eDiscovery process, write reports, sit for depositions, assist counsel with examining opposing experts, and testify before courts and arbitration panels. Kroll has assisted numerous clients in obtaining favorable outcomes in “bet the company” litigation matters.
In addition to being a Relativity® Certified Partner, our team carries best in class certifications:
Kroll’s Litigation Support team has seasoned digital forensics investigators and Relativity-certified administrators to help your team defensibly preserve evidence and gain valuable insights faster, anywhere in the world.
Services include drafting communications, full-service mailing, alternate notifications.
Kroll’s multi-layered approach to cloud security consulting services merges our industry-leading team of AWS and Azure-certified architects, cloud security experts and unrivalled incident expertise.
Kroll’s field-proven incident response tabletop exercise scenarios are customized to test all aspects of your response plan and mature your program.
Stop cyberattacks. Kroll Responder managed detection and response is fueled by seasoned IR experts and frontline threat intelligence to deliver unrivaled response.
Improve investigations and reduce your potential for litigation and fines with the strict chain-of-custody protocol our experts follow at every stage of the data collection process.
With a global mobile device forensics team and a proven track record in investigation and litigation support, Kroll enables key digital insights to be accessed quickly and securely.
by Andrew Rathbun, Eric Zimmerman
by David White
by George Glass
by Dave Truman