KPMG's technology consultants assist clients in conducting risk assessments by identifying technology threats & vulnerabilities.
KPMG assists clients in conducting risk assessments by identifying technology threats.
The increasing dependence on technology for core business processes (IT enabled transformation) renders information confidentiality, integrity and availability essential. It puts forth the need for effective and risk-based information security planning. KPMG's technology consultants can assist clients in conducting risk assessments by identifying technology threats & vulnerabilities,evaluating business impact (BIA) as well as compliance exceptions. In particular, we provide penetration testing and vulnerability scanning services to assist our clients to identify key vulnerabilities and risks. We design enterprise-wide security and continuity strategies, architecture based on industry standards and security control frameworks (i.e. ISO/IEC 2700x etc.). Further we implement security solutions for mitigating key technology risks such as those related to access control/ management.
Crossing the line - Consumer privacy survey (PDF)
Identity and Access Management (PDF)
Cloud Certification (PDF)
Consumer Loss Barometer (PDF)
Cyber Defense Services: Penetration Testing (PDF)
Cyber Defense Services: Security Testing (PDF)
Elektronisches Patientendossier - EPDG Zertifizierung (PDF, in German)
Feel Free - A new approach to cyber security
How to bounce back from cyber fatigue (PDF)
Managing the insider risk (PDF)