KPMG's technology consultants assist clients in conducting risk assessments by identifying technology threats & vulnerabilities.
KPMG assists clients in conducting risk assessments by identifying technology threats.
The increasing dependence on technology for core business processes (IT enabled transformation) renders information confidentiality, integrity and availability essential. It puts forth the need for effective and risk-based information security planning. KPMG's technology consultants can assist clients in conducting risk assessments by identifying technology threats & vulnerabilities,evaluating business impact (BIA) as well as compliance exceptions. In particular, we provide penetration testing and vulnerability scanning services to assist our clients to identify key vulnerabilities and risks. We design enterprise-wide security and continuity strategies, architecture based on industry standards and security control frameworks (i.e. ISO/IEC 2700x etc.). Further we implement security solutions for mitigating key technology risks such as those related to access control/ management.
Crossing the line - Consumer privacy survey (PDF)
Cloud Certification (PDF)
Consumer Loss Barometer (PDF)
Cyber Defense Services: Penetration Testing (PDF)
Cyber Defense Services: Security Testing (PDF)
Data archiving – Certified according to BS 10008 (PDF)
Electronic Records Management Systems (PDF)
Elektronisches Patientendossier - EPDG Zertifizierung (PDF, in German)
Feel Free - A new approach to cyber security
FINMA Circular 2008/21 - Excerpt (PDF)
How to bounce back from cyber fatigue (PDF)
Identity and Access Management (PDF)
KPMG's Certification Compliance and Methodology (PDF)
Managing the insider risk (PDF)
Privileged Access Management (PDF)
Boardroom Questions: Cyber Security - what does it mean for the board? (PDF)