Share with your friends

Cyber defense

Cyber defense

Technical cyber security assessments (VA/  PT, Application and Mobility Security)

  • KPMG assists organizations in identifying vulnerabilities present in their wired or wireless as well as network or application infrastructure and develop actionable remediation recommendations.
  • KPMG can also assist organizations in the assessment or development of a threat and vulnerability management program, aligned to your industry and investment appetite or assess your service provider or approach to address the changed threat landscape and new technology platforms.

Security review of components (firewalls, network  devices, databases,  etc.)

  • KPMG assists organizations in identifying security misconfiguration present in their wired or wireless network or application infrastructure and suggest actionable remediation recommendations.
  • Through discussions with staff, critical components will be identified and prioritised. Depending on requirements we will then resource the relevant skills.

Industry specific operational  technology security assessment and  testing (Power, Energy, Telecom, Healthcare, payment channels)

  • With  the convergence of IT –OT systems cyber threats and attacks are now successfully targeted to OT ICS, Supervisory control and data acquisition (SCADA) or even PLC RTC etc.
  • KPMG works with client to design a comprehensive ICS security framework including cyber governance structure, ICS security policy, procedures and control system incident response management.
  • We have worked with large Power Utility, Energy, Oil & Gas organizations to secure its OT environment and  identify security threats in the use of legacy solutions.

Red teaming / blue team advisory

  • Red Teaming is a muti-layered attack simulation designed to measure how well an organization’s people, networks, application and physical security controls can withstand an attack from a real life adversary.
  • Red Teams are external entities brought in to test the effectiveness of a security program. This is accomplished by emulating the behaviors and techniques of likely attackers in the most realistic way possible. In a Red Team assessment only the high level stakeholders at the CEO and the CTO level are informed
  • Blue Teams refer to the internal security team that defends against both real attackers and red teams. Blue teams should be distinguished from standard security teams in most organizations

Cyber Drills

  • An Organization may take every possible effort to prevent a cyber-attack. It may have the best possible technology and process controls. An attack may still be successful.
  • In such an event it always helps to be prepared. Most organizations concentrate only on the preventive and detective controls and fail to strengthen their reactive controls. Most Business Continuity and Disaster Recovery plans do not consider Cyber Security risks or their resilience plans
  • Organizations need to evaluate if their staff is adequately equipped to detect, defend, contain and respond to a cyber-incident.
  • Organizations should periodically evaluate their Cyber Incident Response capabilities. This can happen via mock cyber war drills or simulation exercises. 

Connect with us