Explore challenges and top-of-mind concerns of business leaders today.
To thrive in today's marketplace, one must never stop learning. Here we offer our latest thinking and top-of-mind resources.
Our multi-disciplinary approach and deep, practical industry knowledge, skills and capabilities help our clients meet challenges and respond to opportunities.
Connect with us via webcast, podcast, or in person at industry events.
Cyber Security Leader, KPMG US
Key requirements for effectively implementing Automated Governance
Speeding away from security
Proactive resilience to cyber threats
Three critical elements that must be addressed
Key updates and impacts
How bug bounty programs can deliver return on investment
What makes this type of fraud a challenge to detect
Strategies for identifying synthetic identity fraud
A $6 billion problem
Aspects of vulnerability discovery and how to adjust your vulnerability management accordingly
How can we provide a jump start for DevOps professionals to build and maintain secure applications?
What’s next after third party cookies go away
How VEX documents save time and resources
Introducing an AI digital worker to your third-party security efforts
Key features you need in your SBOM tooling
Take a Proactive Approach to Cyber Security
Taking a proactive approach to data management dilemmas.
Getting the security operating model ‘right’ must remain a key priority for business leaders
The perimeter-less cyber security model is a promising design for the evolving threat environment
Key problem areas of IPv6 architecture and suggestions to enable organizations to plan accordingly
The case for elevating the third-party security leader role
Understanding your application portfolio and building a tailored plan to reduce risk with less effort
The changing face of ransomware
The ascent of the FSSCC Cybersecurity profile
How KPMG and SolarWinds continue to work together post-event to determine the origin of the attack and enable SolarWinds to move forward with confidence
A path to success
Expanding and enriching the use of data within the assessment process
An overview of the software supply chain attack used against SolarWinds
First steps to increase confidence in your build environment's integrity
A new type of User access log
Visibility enables data protection. Transparency and protection build trust.
Cobalt strike and the potential implications of alleged leaked source code
Constructive regulation in third-party assurance
Defining a new approach towards third-party security
Managing data and maintaining privacy compliance throughout the supply chain
Enabling the business securely
Managing cyber security risks when building software at DevOps speed
Perspectives on an assessment approach
More groups across an organization can make use of SBOMs to reduce risk.
How can they reduce risk for your organization?