55 East 52nd St, 17th Floor, New York, NY 10055, United States
As the leading independent provider of risk and financial advisory solutions, Kroll leverages our unique insights, data and technology to help clients stay ahead of complex demands
As the leading independent provider of risk and financial advisory solutions, Kroll leverages our unique insights, data and technology to help clients stay ahead of complex demands. Kroll's team of more than 6,500 professionals worldwide continues the firm’s nearly 100-year history of trusted expertise spanning risk, governance, transactions and valuation. Our advanced solutions and intelligence provide clients the foresight they need to create an enduring competitive advantage. At Kroll, our values define who we are and how we partner with clients and communities.
Imagine being able to detect and respond swiftly to credible threats on your servers, laptops, and workstations backed by the world leaders in cyber investigations and continuous threat hunting and response solutions. Kroll’s CyberDetectER® Endpoint, in an exclusive partnership with Red Canary, gives you that confidence, relieving the burden and......
Anything that affects your facilities, operations, or people can put your business continuity at risk, from natural disasters like hurricanes that stall shipments of critical components, to infrastructure failures like overtaxed power grids, to civil unrest or labor strikes. Kroll’s expertise and knowledge to assess the effectiveness of your existing business......
Claims of fraud, financial tampering, computer crime, employee misconduct, and other wrongdoing require corporations, law firms, and government agencies to follow digital trails to piece together facts that lead to the truth. Kroll’s computer forensics experts help ensure no digital evidence is overlooked and assist at any stage of a digital......
Out of nowhere, a crisis strikes. These events may include natural disasters, business interruptions, criminal or malfeasance perpetrated by individuals, or violent political activity. Do your business leaders and employees know how to react to an active shooter situation, political or social unrest, a medical emergency or a hazmat incident? We......
Ensure corporate policy design is keeping pace with your dynamic risk environment Your organization likely has policies in place aimed at keeping information secure and responding to a data security incident. Such safety measures are required by a number of federal, state, and industry regulations. Yet policies aren’t just a matter......
When it comes to data breach prevention, what you don’t know can hurt you. Your company faces IT risk daily – whether you’re fending off internal threats or enhancing protection against external intrusions. How well are you balancing your need to lock down data with tighter security controls, while providing your......
Preparing for GDPR compliance Article 37 of the General Data Protection Regulation (GDPR) mandates the appointment of a Data Protection Officer (DPO) for all public authorities and other organisations where the core activities of the controller or the processor involve “regular and systematic monitoring of data subjects on a large scale” or......
Data recovery: extending your window of opportunity When a data breach event occurs, your company only has a short window of time to gather critical evidence. Internal IT resources are often forced to act as a first line of defense — but first responders who are untrained in data recovery and......
Executives face threats that vary widely depending on the industry, size of the company, geopolitical locations, and the individual’s profile. Our aim is to establish and maintain a safe working and living environment for our clients while continually minimizing risk. We achieve this by providing executive protection operatives to support......
When compromised, criminals can take advantage of sensitive data like Social Security Numbers and Medical ID Numbers for months, or even years, before suspicious activity appears in credit reports. Organizations often choose to provide consumers with Kroll's identity monitoring solution to reveal known triggers of identity theft that credit monitoring alone......
IDShield, powered by Kroll, is built on decades of experience in helping people secure their personal information. This powerful service monitors identities from multiple angles – keeping a watchful eye for theft and fraud and alerting you to changes we detect. With IDShield, you receive 24/7 monitoring of the information you......
Even with the most robust controls in place, a data breach may still occur Kroll has helped countless organizations worldwide respond to data loss — and we can help you. We respond quickly when your confidential information is compromised, no matter the source of the data breach, whether it’s the result......
When organizations lose information, the cause can be traced to one — or more — of five risk factors: people, paper documents, information technology systems, other electronic devices, such as tablets or memory sticks, and surveillance devices (bugs). Our experts can guide you in the selection and implementation of security controls......
For the first time in 10 years of reporting, information theft, loss, or attack was the most prevalent type of fraud experienced said executives surveyed in Kroll's Global Fraud & Risk Report 2017/2018. There are myriad ways – and places – that your organization’s sensitive or confidential data can be accidentally......
Malicious software attacks that succeed in infiltrating a company’s network pose a strong threat to commercial and public sector interests. At Kroll, we help organizations identify and analyze suspected malware to determine exactly what it was — or was not — capable of doing. Understanding the threat from viruses and spyware No......
Your organization’s data and networks are under siege by cyber criminals. As a security-conscious organization, you continually try to protect against the many threats and vulnerabilities facing your cyber assets. How confident are you that your protective measures are effective against current and emerging cyberattacks? The way cyber professionals recommend to......
Kroll provides a variety of security risk management services to family offices and high net worth individuals. Threats to personal security can surface in varied and unexpected ways, including opportunistic street crime, obsessive stalkers, medical emergencies, accidents, fires and natural disasters. Our objective is to recommend a security strategy that provides......
It is not uncommon today to find that individuals involved in compromising a company’s intellectual property (IP) are a combination of current or former employees, competitors, trusted customers, distributors, or vendors. For this reason, the security equation must encompass issues of management structure, operational security, and cyber security. Protecting your intellectual......
Security measures are of little use if they are not enforced. A security audit assesses how effectively your organization’s security policies are being implemented. Our audits will show you where gaps and vulnerabilities might exist in your current systems and procedures. In more than 40 years, we have seen countless reasons......
Good security risk management begins with a master plan — a vision of the security department, its roles and responsibilities, and how it fits into the overall organization. We have found that security is more effective when you look at your organization as a whole. Accordingly, we address all aspects of......
While many consultants view security strictly from the electronic system perspective, our security planning philosophy is grounded in our experience designing comprehensive security programs for clients across a multitude of industries. In our approach, we balance the three basic elements of security: architecture, operations and electronic systems. Under this philosophy, we......
Do you have policies and procedures that cover risks like workplace violence, bomb threats, active shooters or natural disasters? How about executive protection or travel to high-risk areas? How do you know if current procedures will be sufficient or effective? Given the complexity of most organizations, developing effective security programs can......
Security system procurement and implementation can be overwhelming responsibilities. Kroll understands. Our systems experts and security specialists will ensure that the systems you choose not only meet the functional and technical requirements, but are also installed on time and within budget and represent the best value for you. During system procurement,......
Our trainings can encompass broad points of view to narrow solution-oriented presentations to meet the challenges of specific business units. We work with institutions to understand their needs and what training they need, then customize presentations around the staff, facility and risk. Our work is tailored directly to each client......
No matter how secure your company’s IT system is, sometimes your risk of data breach depends on who you associate with. In today’s complex business environment, large amounts of sensitive data are often shared with partners, outside vendors and service providers — who all have their own dedicated IT systems,......
Comprehensive threat and vulnerability assessments are essential to securing your organization. Our multidisciplinary approach looks at security from every angle to mitigate risks — from the physical environment to the human element to the role of technology. Effective security starts with a clear understanding of your vulnerabilities. We can help you......
Corporate and social disaffection is a breeding ground for threatening behavior from individuals aimed at institutions, corporations, or their personnel. This can take many forms — from stalking and harassment to unwanted communications and disruptions. Our staff of former prosecutors, law enforcement officers and security specialists can investigate the source of......
Irrespective of regulatory scrutiny in your industry or your organization, too much is at stake to not have a CISO on your team. A full-time data security leader has the specialized technical knowledge and corporate governance experience to help build not only a strong cyber security foundation, but also the......
Knowledge is power Is your company’s IT system vulnerable to attacks by malicious outsiders? Could internal enemies damage your data security? Kroll’s vulnerability scanning services can help you answer these important questions — mapping out a prioritized pathway to increased cyber security for your business. Kroll’s team of licensed experts will run......