Information Protection and Business Resilience

Information Protection and Business Resilience

KPMG's technology consultants assist clients in conducting risk assessments by identifying technology threats & vulnerabilities.

KPMG assists clients in conducting risk assessments by identifying technology threats.

The increasing dependence on technology for core business processes (IT enabled transformation) renders information confidentiality, integrity and availability essential. It puts forth the need for effective and risk-based information security planning. KPMG's technology consultants assist clients in conducting risk assessments by identifying technology threats and vulnerabilities,evaluating business impact (BIA) as well as compliance exceptions.
By providing penetration testing and vulnerability scanning services, we help our clients identify key vulnerabilities and risks. We also offer design enterprise-wide security and continuity strategies, architecture based on industry standards and security control frameworks (i.e. ISO/IEC 2700x etc.). And we implement security solutions for mitigating key technology risks such as those related to access control/ management.


KPMG's expertise

  • Cyber Security: KPMG supports companies developing effective protection against cybercrime and seeking to progress from a reactive approach to an efficient prevention strategy.
  • Certification Services: KPMG offers a wide range of certifications for data privacy & data protection, information security, operational IT management, records management as well as qualified and advanced digital signatures.


Further information

Crossing the line - Consumer privacy survey (PDF)
Cloud Certification (PDF)
Consumer Loss Barometer (PDF)
Cyber Defence Services: Penetration Testing
Cyber Defence Services: Security Testing
Data archiving – Certified according to BS 10008 (PDF)
eIDAS Certification (PDF)
Electronic Records Management Systems (PDF)
Elektronisches Patientendossier - EPDG Zertifizierung (PDF, in German)
Feel Free - A new approach to cyber security 
FINMA Circular 2008/21 - Excerpt (PDF)
How to bounce back from cyber fatigue (PDF)
Identity and Access Management (PDF)
KPMG's Certification Compliance and Methodology (PDF)
Cyber Security: Managing the insider risk (PDF)
Privileged Access Management (PDF)
Boardroom Questions: Cyber Security - what does it mean for the board? (PDF)

Connect with us


Request for proposal



Cyber Security

Taking a closer look at the current state of Swiss companies' cyber resilience.

Read more

Key contacts

“Classic” Topics to tackle Cyber Security remain

Please find below our collection of topics and solutions of the recent past.

Read more

The Internet of Things

The Internet of Things (IoT) is set to revolutionise society yet again.

Read more

Expert Blog

Read the latest articles from our consulting experts.

Read blog articles