FORENSIC TECHNOLOGY SERVICES

Our certified, experienced team of forensic technology professionals can assist you with full-scale technology investigations, litigation support matters, and response to data breach incidents across all industry lines.

Read an Incident Response client story.

 

Litigation and eDiscovery Consulting

Full Lifecycle eDiscovery Services | Data Map Consulting | Legally Versed Professional Experts | Defensible Data Collection and Preservation 

We are intimately familiar with the discovery and litigation process and stand behind our findings. We perform full lifecycle eDiscovery services, scoping, meet and confer, collections, pre-processing and processing, review hosting, and productions. Kraft Kennedy experts are qualified to testify on our findings as electronic discovery and technology expert witnesses. We perform custodian interviews and on-site inspections to create organization data maps and identify key custodians and repositories of data and preserve electronic evidence using defensible methods.

Digital Forensics & Incident Response

Incident Remediation | Evidence Preservation | Forensic Investigation  | Computer Forensic Examination 

Not even the best security program is infallible. Without experts to help you manage a quick response to an event, you risk damage to your reputation and client relationships as well as significant financial exposure. Kraft Kennedy’s certified digital forensic and incident response professionals use proven technology and procedures to accurately identify incidents, preserve evidence, forensically investigate the data and remediate the problems. Our experts follow industry-recognized best practices and are qualified to testify in state and federal court.

 

See our Information Protection Services.

For more information, please contact us at (800) 523-3081 or  (312) 273-4316, or email FTS@kraftkennedy.com. 


 

ISG Page-03

Using Work E-mail For Personal Business

Q&A With Forensic Investigator Douglas Brush 

Security Training: Why Learning Security Best Practices is in Everyone’s Best Interest

Security Best Practices: Tricks Attackers Use

Lenovo’s Superfish Casts Light on Security Concerns About Pre-Installed Software 

Getting a Security Audit? Is Your Firm Ready? 

Smartphone Data Security: Keep Data Confidential During and After Device Use 

ISG Page-04

The Data Breaches Are Coming: Tips for Successful Incident Response

Download Icon - KK-24

ISG Page-05

CyberFETCH Interview with Douglas Brush, Director of the ISG

ILTA Interview with Douglas Brush

Video: Designing and Deploying an Information Governance Program

Flyers

Information Security and Governance

Digital Forensics and eDiscovery