www.kroll.com
Open in
urlscan Pro
2606:4700::6812:112a
Public Scan
Submitted URL: https://csoadvisory.com/
Effective URL: https://www.kroll.com/en/services/cyber-risk/governance-advisory/virtual-ciso-advisory-services
Submission: On August 02 via api from US — Scanned from DE
Effective URL: https://www.kroll.com/en/services/cyber-risk/governance-advisory/virtual-ciso-advisory-services
Submission: On August 02 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
* Solutions * Hotlines * Contact Us Kroll-Logo * Solutions * Hotlines * Contact Us Search-Icon * Quick links * Global Technology Outage and Implications for Businesses * Why High-Quality Data is Crucial to Fighting Financial Crime * Kroll Lowers Its Recommended U.S. Equity Risk Premium to 5.0% * Popular topics * Valuation Advisory Services * Compliance and Regulation * Corporate Finance and Restructuring * Cyber Risk * Investigations and Disputes * Digital Technology Solutions * Business Services * Environmental, Social and Governance Advisory Services (ESG) Search-Icon Burger-Icon * SOLUTIONS * INDUSTRIES * ABOUT * INSIGHTS * CAREERS * Valuation * Compliance and Regulation * Investigations and Disputes * Business Services * Cyber Risk * Corporate Finance and Restructuring * Digital Technology Solutions * Environmental, Social and Governance See All Solutions * Consumer and Retail * Financial Services * Industrials * Technology, Media and Telecom * Energy and Mining * Healthcare and Life Sciences * Real Estate See all Industries Who We Are * Overview * Our Experts * History * Locations * Newsroom Our Work * Client Stories * Transactions * Restructuring Administration Cases * Settlement Administration Cases Trending Topics * Anti-Money Laundering * Artificial Intelligence * Cost of Capital * Cryptocurrency * Cyber Risk * Financial Crime * M&A Updates * Valuation Outlook By Type * Blogs / Publications * Client Stories * Events * Webcasts and Videos CAREERS Learn about careers with us and search open job opportunities here. Get a Quote24X7 Hotline Cyber Governance and Strategy VIRTUAL CISO (VCISO) ADVISORY SERVICES Kroll’s Virtual CISO (vCISO) services help executives, security and technology teams safeguard information assets while supporting business operations with augmented cyber expertise to reduce business risk, signal commitment to data security and enhance overall security posture. Contact Us EXPLORE CYBER RISK * Threat Exposure and Validation * Cyber Risk Assessments * Cloud Security Services * Incident Response and Litigation Support * Incident Response Tabletop Exercises * Kroll Responder * Cyber Risk Retainer Irrespective of regulatory scrutiny in your industry or organization, too much is at stake to not have a CISO. A security leader has the specialized technical knowledge and corporate governance experience to help build a strong cyber security foundation and the agility to prevent, detect and mitigate evolving threats while enhancing the “security IQ” of your entire organization. Kroll’s team of experts includes seasoned former CISOs from a variety of industries who can strengthen your existing staff, set strategic objectives to support business-critical technology demands and balance IT administration, as well as establish clear communication with the board of directors, investors and government agencies. Whether you are looking for an interim CISO, a resource to support your CISO or a longer-term arrangement, Kroll’s Virtual CISO Advisory Services provide the leadership you need, when you need it. You can rely on a vCISO from Kroll to have the technical expertise, business acumen and communication skills to make an immediate difference. Our experts have served in a broad range of industries for companies of various sizes and will know how to align information security strategies with your company’s unique needs and challenges. Services and offerings include: * Setting or directing privacy and security policies, standards, procedures and guidelines * Managing and directing information security teams * Engaging with executive management * Running risk assessments on operational security * Providing threat intelligence and managing enterprise security * Crisis management Sample high-level security strategy outline KROLL’S VIRTUAL CISO ADVISORY SERVICES HELP YOU PREPARE, PROTECT AND STRENGTHEN DEFENSES Our vCISO Advisory Services are tailored to your specific situation and information security needs. While you have a number of options when it comes to the scope and length of services, there are four areas where most organizations benefit from the experience of a vCISO: STRATEGY DEFINITION Guiding executives across business function and IT, Kroll’s vCISO helps identify business threats, provides a baseline for your current security program and defines security strategy in line with business objectives and technology strategies. Our phased approach helps ensure an effective and efficient strategy that leverages NIST 800-53 and can be mapped to multiple cyber regulations (e.g., PCI, HIPAA, GDPR, FINRA, NYDFS). ASSESSMENT Evaluating culture, processes and technologies from a security governance perspective, Kroll’s vCISO develops prioritized actions to help effectively manage your information security strategy and program. Assessments can include: * Interviews with stakeholders across the technical, business and executive teams as well as gathering documentation * Robust reviews of a variety of areas, including information asset management, acceptable use policies, data classification, threat and vulnerability management and third-party management OVERSIGHT Based on the assessment findings, Kroll’s vCISO can provide various types and levels of ongoing support, including: * Developing policies and procedures to close gaps in documentation * Developing a remediation plan with actionable, prioritized recommendations * Implementing the remediation plan * Providing ongoing strategic guidance that is less intensive, but assists the organization in maintaining long-term goals TRAINING Security awareness is an important part of maintaining a robust program. Your vCISO can recommend and help implement training on topics for every level of user group within your organization. This can range from the highly technical (e.g., secure coding practices) to general data handling education to combating business email compromise. The vCISO can also oversee controlled phishing campaigns, conducted by Kroll, to gauge employee security awareness. IT ENVIRONMENT SECURITY DESIGN For organizations looking to build from the ground up, Kroll’s vCISO can provide your team with necessary system hardening configuration guides and network designs. This will also include multiple security protections and incident monitoring controls. VIRTUAL CISOS BRING EXPERIENCE, EXPERTISE, LEADERSHIP Kroll’s vCISO Advisory Services are drawn on the experience of former CISOs from a variety of industries—from professional services firms to multinational conglomerates—and bring a valuable blend of technical, executive and organizational experience. They are among the most accomplished technical experts practicing today, with special insight into evolving threats and solutions from their work at the front lines of cyber security. Kroll’s vCISOs are supported by our global, multidisciplinary team that includes former FBI, Interpol and U.S. Secret Service agents; former information technology and security executives; digital forensic scientists; intelligence analysts; and regulatory specialists from a wide variety of industries. This high-caliber team will help put your entire information security program on the maturity fast track. Finding an experienced, well-qualified CISO in today’s competitive information security job market can be challenging, time-consuming and expensive. If you need a CISO now, then this is the perfect time to consider Kroll’s Virtual CISO Advisory Services. TALK TO A KROLL EXPERT Kroll is ready to help, 24x7. Use the links on this page to explore our services further or speak to a Kroll expert today via our 24x7 cyber hotlines or our contact page. Contact Us Cyber Hotlines FREQUENTLY ASKED QUESTIONS WHAT IS A VIRTUAL CISO? A virtual chief information security officer (“virtual CISO” or “vCISO”) is a specialist information security professional that organizations can call on for support with planning and executing an effective cybersecurity strategy. Virtual CISOs provide vital security experience, expertise and leadership to companies as and when they need it. -------------------------------------------------------------------------------- WHAT DOES A VIRTUAL CISO DO? -------------------------------------------------------------------------------- WHAT SERVICES CAN A VCISO PROVIDE? -------------------------------------------------------------------------------- WHAT ARE THE BENEFITS OF A VCISO SERVICE? -------------------------------------------------------------------------------- HOW DO I KNOW IF USING A VCISO SERVICE IS APPROPRIATE FOR MY ORGANIZATION? -------------------------------------------------------------------------------- HOW MUCH DOES A VCISO SERVICE COST? -------------------------------------------------------------------------------- WHAT TYPE OF EXPERTISE SHOULD I LOOK FOR IN A POTENTIAL VCISO? CONNECT WITH US John deCraen John deCraen Associate Managing Director Cyber Risk Dallas +1 973 775 8303PhoneJohn deCraen Ira Levy Ira Levy Associate Managing Director Cyber Risk Washington DC +1 2024491854Phone Walmir Freitas Walmir Freitas Regional Managing Director, LATAM Cyber Risk Sao Paulo +55 11 3897 0916PhoneWalmir Freitas Swiper slider PrevSwiper slider Next Stay Ahead with Kroll -------------------------------------------------------------------------------- APPLICATION SECURITY SERVICES Kroll’s product security experts upscale your AppSec program with strategic application security services catered to your team’s culture and needs, merging engineering and security into a nimble unit. Application Security Services Application Security Services OPTIMIZED THIRD-PARTY CYBER RISK MANAGEMENT PROGRAMS Manage risk, not spreadsheets. Identify and remediate cybersecurity risks inherent in third-party relationships, helping achieve compliance with regulations such as NYDFS, FARS, GDPR, etc. Optimized Third-Party Cyber Risk Management Programs Optimized Third-Party Cyber Risk Management Programs THIRD PARTY CYBER AUDITS AND REVIEWS Ensure that your third parties are handling sensitive data according to regulatory guidelines and industry standards with our cyber audits and reviews. Third Party Cyber Audits and Reviews Third Party Cyber Audits and Reviews -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- CFIUS COMPLIANCE AND REVIEW Helping organizations manage CFIUS, Team Telecom and FOCI requirements. CFIUS Compliance and Review CFIUS Compliance and Review INCIDENT RESPONSE TABLETOP EXERCISES Kroll’s field-proven incident response tabletop exercise scenarios are customized to test all aspects of your response plan and mature your program. Incident Response Tabletop Exercises Incident Response Tabletop Exercises Explore Insights Preparing For DORA: A Guide For Financial Institutions Cyber Litigation Support PREPARING FOR DORA: A GUIDE FOR FINANCIAL INSTITUTIONS Juli 3, 2024 by Tiernan Connolly Q1 2024 Cyber Threat Landscape Report: Insider Threat & Phishing Evolve Under AI Auspices Threat Intelligence Q1 2024 CYBER THREAT LANDSCAPE REPORT: INSIDER THREAT & PHISHING EVOLVE UNDER AI AUSPICES Mai 22, 2024 by Laurie Iacono, Keith Wojcieszek, George Glass PasskeyScanner: A Kroll BurpSuite Extension for Passkeys Cyber PASSKEYSCANNER: A KROLL BURPSUITE EXTENSION FOR PASSKEYS April 23, 2024 by Alex Cowperthwaite Q4 2023 Cyber Threat Landscape Report: Threat Actors Breach the Outer Limits Threat Intelligence Q4 2023 CYBER THREAT LANDSCAPE REPORT: THREAT ACTORS BREACH THE OUTER LIMITS Februar 21, 2024 by Laurie Iacono, Keith Wojcieszek, George Glass Events Webinar – Q2 2024 Cyber Threat Landscape Virtual Briefing Threat Intelligence WEBINAR – Q2 2024 CYBER THREAT LANDSCAPE VIRTUAL BRIEFING August 21, 2024|Online Our quarterly threat landscape reports are fuelled by frontline incident response intel and elite analysts. Register Now Webinar – AI Security Testing: Prompt Injection Everywhere Cyber WEBINAR – AI SECURITY TESTING: PROMPT INJECTION EVERYWHERE September 25, 2024|Online Kroll offers a glimpse into the security vulnerabilities faced by businesses adopting Artificial Intelligence (AI), Machine Learning (ML) and Large Language Model (LLM) following eight months of LLM penetration testing. Register Now News Kroll Launches AI-Powered Document Review At A Fixed Fee Cost Press Release KROLL LAUNCHES AI-POWERED DOCUMENT REVIEW AT A FIXED FEE COST Mai 16, 2024 Kroll named as Major Player in IDC’s Worldwide Cybersecurity Consulting Services 2024 Vendor Assessment Press Release KROLL NAMED AS MAJOR PLAYER IN IDC’S WORLDWIDE CYBERSECURITY CONSULTING SERVICES 2024 VENDOR ASSESSMENT April 25, 2024 Kroll Appoints Dave Burg as Global Head of Cyber Risk to Bolster World-Leading Business Press Release KROLL APPOINTS DAVE BURG AS GLOBAL HEAD OF CYBER RISK TO BOLSTER WORLD-LEADING BUSINESS März 12, 2024 Kroll Expands Cyber Partner Program with MSP Specialization Press Release KROLL EXPANDS CYBER PARTNER PROGRAM WITH MSP SPECIALIZATION Oktober 17, 2023 KROLL IS HEADQUARTERED IN NEW YORK WITH OFFICES AROUND THE WORLD. 55 East 52nd Street 17 Fl New York NY 10055 +1 212 593 1000 Social-Icons Social-Icons Social-Icons Social-Icons Social-Icons Sign up to receive periodic news, reports, and invitations from Kroll. Our privacy policy describes how your data will be processed. Subscribe to Kroll More About Kroll * About * Solutions * Trending Topics * Client Stories * Careers * Find an Expert * Locations * Media Inquiry Global * Accessibility * Code of Conduct * Cookies * Data Privacy Framework * Disclosure * Kroll Ethics Hotline * Modern Slavery Statement * Privacy Policy * Licensing © 2024 Kroll, LLC. All rights reserved. Kroll is not affiliated with Kroll Bond Rating Agency, Kroll OnTrack Inc. or their affiliated businesses. Read more. We use cookies to remember users and provide the best possible experience. Some cookies are essential, others help us improve your experience through insights on how the site is used. Please visit ourcookie notice for more information. Manage Preferences Decline Accept All COOKIES PREFERENCE CENTER * YOUR PRIVACY * ESSENTIAL COOKIES * FUNCTIONAL COOKIES * ANALYTICS COOKIES * ADVERTISING COOKIES YOUR PRIVACY We use cookies to remember users and give you the best possible experience. Some cookies are essential, others help us improve your experience through insights on how the site is used. Please visit our cookie notice for more information. ESSENTIAL COOKIES Always Active These cookies are essential in order to enable you to move around the site and use its features. Without these cookies, services you have asked for cannot be provided. Cookies Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to function. Certain functional cookies also allow us to respond to service or other inquiries received through a form. Cookies Details ANALYTICS COOKIES Analytics Cookies Analytics cookies track aggregate site performance, web speed, traffic sources, video plays and other aggregate data across the site. These cookies allow us to personalize web experience by type of visitor and, upon certain circumstances, by individual user. Individual user information is recognized through form completions or response to other marketing campaigns. Cookies Details ADVERTISING COOKIES Advertising Cookies Upon occasion, our firm advertises on certain media sites and these cookies track campaign performance. Cookies may be set by our firm or by our advertising partners. The cookies may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details Back Button COOKIE LIST Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Confirm Allow All