Every organisation must be prepared to respond quickly and effectively to a cyber incident to ensure continuity of operations and protect their reputations. Privacy and consumer protection regulations also require timely response and notification for cyber incidents.
Kroll’s cyber risk retainer offers maximum flexibility and transparent pricing to ensure our clients get tangible value for their money and have peace of mind knowing they can depend on our prioritised response and global resources in a crisis.
Our cyber risk retainer can adapt to and maximise a company’s existing security stack, so there’s no need to buy new tech. Clients can also leverage our comprehensive slate of cyber risk solutions to strengthen their overall resiliency.
Kroll understands that the prospect of preparing for and responding to a cyber incident is fraught with unknowns. Our robust but flexible cyber risk retainer can be adapted to any business, ensuring our clients have the comfort of knowing Kroll’s cyber risk experts will respond immediately to contain and remediate any incident. Whether it is for taking proactive security measures or responding to a breach, Kroll’s cyber risk retainer services are configurable to the needs and environment of any organisation, regardless of the technologies they use.
Our retainer options help alleviate the pressure organisations feel to maximise the value of their cybersecurity investments with an upfront service and pricing structure.
Unlike most providers, you can customise retainer packages to include a wide range of services:
Vendors | Digital Forensics | Incident Response | Breach Notification | Testing & Assessments | Tabletop Exercises | Litigation Support |
---|---|---|---|---|---|---|
Kroll | ||||||
Others |
“As a Cyber Risk Retainer client, we have appreciated Kroll’s expedited response for potentially critical issues. Their subject matter expertise allowed us to contain a situation prior to it developing into a significant issue.” – Option Care Health | |
“Kroll's Cyber Risk Retainer program gave us the flexibility to utilise our retainer credits to help us accomplish some of our IT security goals during the year, while having the peace of mind that we had a Tier 1 partner to quickly respond if we had some type of cyber incident.” – Netscout Systems, Inc |
Cyber insurance plays an integral role in mature cybersecurity systems. Fortunately, Kroll is an approved vendor for more than 60 cyber insurance carriers around the world. We have a dedicated insurance team to help our clients handle claims effectively.
Premier | Plus | |
---|---|---|
Response Time Service Levels | Incident support contact within two hours (24/7/365) | Incident support contact within four hours (24/7/365) |
Service Credits Application | 100% of retainer credits can be applied towards any cyber risk consulting service | |
Rollover Credits | Up to 20% of unused services credit may be applied to the following year upon renewal | |
Rate Discount | 15% discount on any additional hourly-based proactive or incident response cyber risk service | 10% discount on any additional hourly-based proactive or incident response cyber risk service |
Unlike most cyber risk firms, Kroll lets clients customise their cyber risk retainers to meet their unique security needs by choosing from a wide range of proactive, response and notification service options. Available services include:
Kroll manages over 3,000 cyber investigations every year for clients of all sizes and complexities. We also have decades of experience helping clients notify customers affected by breaches. We can help you determine the right cyber risk retainer for you, beyond incident response. For peace of mind and support before and during an incident, speak with one of our cyber experts today.
Kroll’s field-proven incident response tabletop exercises provide a customised test of every aspect of an organisation’s cyber response plan.
Today, you learn your company is experiencing a serious cyber incident. It could be a ransomware attack, a hacked O365 email account, the theft of PII or PHI, data exposure from misconfigured network settings. What is the first step you should take?
Manage risk, not spreadsheets. Identify and address cyber threats in third-party relationships to ensure compliance with regulations such as NYDFS, FARS, GDPR, etc.
Kroll’s cyber audits and reviews ensure third parties handle sensitive data according to regulatory guidelines and industry standards.
Manage cyber risk and data security governance with Kroll’s defensible cybersecurity strategy framework.
Safely perform attacks on your production environment to test your security technology and processes.
by Andrew Rathbun, Eric Zimmerman
by David White
by George Glass
by Dave Truman