Explore challenges and top-of-mind concerns of business leaders today.
To thrive in today's marketplace, one must never stop learning. Here we offer our latest thinking and top-of-mind resources.
Our multi-disciplinary approach and deep, practical industry knowledge, skills and capabilities help our clients meet challenges and respond to opportunities.
Connect with us via webcast, podcast, or in person at industry events.
Principal, Cyber Security Leader, KPMG US
Blog postings related to Cyber Security
Advanced technologies pose threats that require cyber security to be embedded in all technology-fueled growth decisions
Life sciences and healthcare organizations need to become future-proof from risk to gain an advantage with emerging technologies.
Does your organization put security concerns front and center?
Businesses risk customer trust and business growth by not prioritizing cyber security.
Emerging digital threats demand companies take new precautions to protect their customers and their bottom line in the new year.
Financial services organizations seek to balance security with convenience to reach today’s digitally-savvy customers.
Elevate your risk management functions by building a proactive culture of collaboration and innovation that supports the business.
Privacy rights requests challenge organizations to deliver an optimized process to help consumers take control of their information.
Learn the practicalities of personal information collection and in what form(s) it should be inventoried and/or mapped.
Leverage existing compliance efforts to meet new regulatory requirements during this time of global privacy revolution.
Often times, discussion around “why” vulnerability management is still a challenge for businesses leads to talk of a “whack-a-mole” mentality.
Aerospace and defense firms step up hiring of engineers and skilled workers
Fixing your business by breaking your IT infrastructure
Your organization needs both fast and secure web performance to deliver great business results.
It is important to define the scope and parameter of your bug bounty program and provides a checklist for success.
Bug bounty programs may well be a valuable solution your information security team should embrace.
DevOps can help identify process bottlenecks, playbook misstep problems, and other issues that can leave the organization open to risk.
DevOps provides opportunities in the software development life cycle to make things safer, as fast as possible, and at the right cost.
Troubles on the transformation front: From tackling cyber risk to dealing with data
Explore five factors that are likely to make cybersecurity a challenge, but are also opportunities for companies to demonstrate that they are proactively fending off threats.