Kivu Consulting (a part of Quorum Cyber)

Kivu Consulting (a part of Quorum Cyber)

Speciality: External Network

Berkeley, United States 35 employees
[01] About

Cybersecurity and incident response firm based in Berkeley, California; 21 employees, $3.0M revenue, founded 2009; specializes in forensic response, breach management, and penetration testing, including external and deep fake testing services; global rank #9,052,495, serving clients worldwide.

Kivu Consulting, part of Quorum Cyber, combines technical and legal expertise to deliver world-class investigative, discovery, and forensic solutions globally. For over 15 years, our team of experienced digital forensic investigators and cybercrime fighters has used threat intelligence decision-making to protect organizations against data compromises, theft of trade secrets, and unauthorized access to data. Leveraging intel from over 5,500 cases, we are leaders in identifying, containing, and mitigating cyber threats. Our team of experts carries industry-leading certifications and uses cutting-edge technology to strengthen defenses against the ever-changing threat landscape. As part of Quorum Cyber, we have expanded resources and reach, enhancing our ability to deliver the same trusted service while helping organizations build resilience and navigate complex cyber challenges. Kivu’s investigators have testified as computer forensic experts in state and Federal court, and presented their findings to state and Federal regulators.
[02] Services
The Company Offers Incident Response
Penetration Testing
Risk Management
Cyber Forensics Investigation
Managed Security Services
Security Program Maturity Assessments
A Range Of Threat-led Cybersecurity Solutions Including Detection And Response
Cloud Security
Identity Security Advisory.
[03] Certifications
Certified Information Systems Security Professional (cissp)

Origins of CISSP


The Certified Information Systems Security Professional (CISSP) certification was created by the International Information System Security Certification Consortium, known as (ISC)², in 1994. It was developed in response to the growing need for a standardized credential that could validate the knowledge and expertise of information security professionals. The certification was designed to establish a common body of knowledge for the cybersecurity field and provide organizations with a reliable way to identify qualified security practitioners during a time when information security was becoming increasingly critical to business operations.


Industry Value and Importance


The CISSP is widely recognized as one of the most prestigious and valued credentials in the cybersecurity industry. It demonstrates that holders possess comprehensive knowledge across eight security domains, including security architecture, risk management, and software security. Many government agencies, including the U.S. Department of Defense, and Fortune 500 companies either require or strongly prefer CISSP certification for senior security positions. The certification's rigorous requirements—including five years of professional experience and passing a challenging exam—combined with mandatory continuing education, ensure that CISSP holders maintain current, relevant expertise, making it a trusted benchmark for cybersecurity competence worldwide.

Certified Information Systems Auditor (cisa)

Origin of CISA


The Certified Information Systems Auditor (CISA) certification was created by ISACA (Information Systems Audit and Control Association) in 1978. ISACA, founded in 1969, developed CISA to establish a standard for professionals working in IT audit, control, and security. The certification emerged in response to the growing need for qualified individuals who could audit information systems and ensure their proper governance, as organizations increasingly relied on computer systems for critical business operations.


Industry Value and Importance


CISA is widely recognized as one of the premier certifications for IT audit and control professionals. It demonstrates an individual's expertise in assessing vulnerabilities, implementing controls, and ensuring compliance with industry standards and regulations. Employers value CISA holders because the certification requires significant professional experience and passing a comprehensive exam covering domains like information system auditing, governance, and risk management. Many organizations, particularly in financial services, healthcare, and government sectors, specifically seek or require CISA certification for audit and compliance roles, making it a valuable credential for career advancement in IT governance and security.

Encase Certified Examiner (ence)
SANS GIAC Certified Incident Handler (gcih)
Certified Ethical Hacker (ceh)

Certified Ethical Hacker (CEH) Certification


Origin and Creation


The Certified Ethical Hacker (CEH) certification was created by the International Council of E-Commerce Consultants (EC-Council) in 2003. EC-Council, founded by Jay Bavisi, developed this certification in response to the growing need for standardized training in ethical hacking and penetration testing methodologies. The program was designed to legitimize the practice of "white hat" hacking by establishing a professional framework for security professionals who need to think like malicious hackers in order to better defend their organizations' systems and networks.


Industry Value and Importance


The CEH certification is widely recognized and valued in the cybersecurity industry because it validates a professional's knowledge of current hacking techniques, tools, and methodologies from an attacker's perspective. Many government agencies, including the U.S. Department of Defense, and numerous private sector organizations recognize CEH as meeting their information assurance training requirements. The certification demonstrates that holders understand how to identify vulnerabilities and weaknesses in systems, making them valuable assets for organizations seeking to strengthen their security posture through proactive testing and assessment.

[05] Notable Clients
  • University of Central Lancashire