Skip to Content

This website will offer limited functionality in this browser. We only support the recent versions of major browsers like Chrome, Firefox, Safari, and Edge.

CRA Logo CRA Logo CRA
  • About Us
  • Our People
  • Locations
  • Engagements
  • Contact CRA
  • Investor Relations
Engagements

Cybersecurity incident response

CRA identifies hidden application data flows inserted by a hacker.

Related Capabilities
  • Cybersecurity Incident Response
Share

Related Insights

    • Cybersecurity Incident Response
    • Articles

    Evidence Preservation: The Key to Limiting the Scope of a Breach

    This article is published in the Spring 2021 Issue of the ABA Cybersecurity and Data Privacy Newsletter. Data exfiltration and extortion continues to be a...

    • Cybersecurity Incident Response
    • Articles

    Law firms as prime targets for hackers: 7 steps to reducing cyber risks

    This paper seeks to help all organisations and institutions, not just law firms, better understand the threats they face and why they should work toward better...

Explore our thinking
  • Alumni
  • CRA Auctions
  • European Competition
  • Marakon
  • Privacy
  • Copyright & Trademarks
  • Modern Slavery Act Statement

Copyright © 2022

CRA International, Inc. ®

Charles River Associates ®