KPMG's technology consultants assist clients in conducting risk assessments by identifying technology threats & vulnerabilities.
KPMG assists clients in conducting risk assessments by identifying technology threats.
The increasing dependence on technology for core business processes (IT enabled transformation) renders information confidentiality, integrity and availability essential. It puts forth the need for effective and risk-based information security planning. KPMG's technology consultants assist clients in conducting risk assessments by identifying technology threats and vulnerabilities,evaluating business impact (BIA) as well as compliance exceptions.
By providing penetration testing and vulnerability scanning services, we help our clients identify key vulnerabilities and risks. We also offer design enterprise-wide security and continuity strategies, architecture based on industry standards and security control frameworks (i.e. ISO/IEC 2700x etc.). And we implement security solutions for mitigating key technology risks such as those related to access control/ management.
Boardroom Questions: Cyber Security - what does it mean for the board? (PDF)
“Classic” Topics to tackle Cyber Security remain
Crossing the line - Consumer privacy survey (PDF)
Cloud Certification (PDF)
Consumer Loss Barometer (PDF)
Cyber Defence Services: Penetration Testing (PDF)
Cyber Defence Services: Security Testing (PDF)
Cyber Security: Managing the insider risk (PDF)
Data archiving – Certified according to BS 10008 (PDF)
eIDAS Certification (PDF)
Electronic Records Management Systems (PDF)
Elektronisches Patientendossier - EPDG Zertifizierung (PDF, in German)
Feel Free - A new approach to cyber security
FINMA Circular 2008/21 - Excerpt (PDF)
How to bounce back from cyber fatigue (PDF)
Identity and Access Management (PDF)
ISO / IEC 27001 (PDF)
ISO / IEC 27018 (PDF)
KPMG's Certification Compliance and Methodology (PDF)
Privileged Access Management (PDF)
Reaping the security advantage: Talking to bank CEOs (PDF)