KPMG's technology consultants assist clients in conducting risk assessments by identifying technology threats & vulnerabilities.
KPMG assists clients in conducting risk assessments by identifying technology threats.
The increasing dependence on technology for core business processes (IT enabled transformation) renders information confidentiality, integrity and availability essential. It puts forth the need for effective and risk-based information security planning. KPMG's technology consultants assist clients in conducting risk assessments by identifying technology threats and vulnerabilities,evaluating business impact (BIA) as well as compliance exceptions.
By providing penetration testing and vulnerability scanning services, we help our clients identify key vulnerabilities and risks. We also offer design enterprise-wide security and continuity strategies, architecture based on industry standards and security control frameworks (i.e. ISO/IEC 2700x etc.). And we implement security solutions for mitigating key technology risks such as those related to access control/ management.
Boardroom Questions: Cyber Security - what does it mean for the board? (PDF)
Cyber Defence Services: Penetration Testing (PDF)
Cyber Defence Services: Security Testing (PDF)
Data archiving – Certified according to BS 10008 (PDF)
eIDAS Certification (PDF)
Electronic Records Management Systems (PDF)
Elektronisches Patientendossier - EPDG Zertifizierung (PDF, in German)
Identity and Access Management (PDF)
ISO / IEC 27001 (PDF)
ISO / IEC 27018 (PDF)
KPMG's Certification Compliance and Methodology (PDF)
Privileged Access Management (PDF)
Reaping the security advantage: Talking to bank CEOs (PDF)