Industries

Helping clients meet their business challenges begins with an in-depth understanding of the industries in which they work. That’s why KPMG LLP established its industry-driven structure. In fact, KPMG LLP was the first of the Big Four firms to organize itself along the same industry lines as clients.

How We Work

We bring together passionate problem-solvers, innovative technologies, and full-service capabilities to create opportunity with every insight.

Learn more

Careers & Culture

What is culture? Culture is how we do things around here. It is the combination of a predominant mindset, actions (both big and small) that we all commit to every day, and the underlying processes, programs and systems supporting how work gets done.

Learn more

Creating confident consumers

KPMG helped a global provider of financial services technology build robust cyber strategy, defenses and response capabilities.

Client

A global provider of financial services technology

Sector

Technology

Project

Cyber security transformation

Client challenge

At a time when it’s never been more important to protect the privacy of corporate and customer financial data, this global provider of financial services technology  decided to proactively initiate a massive transformation of its cyber security capabilities to reduce the risk of exposure for the organization and its customers.

The company wanted to remediate its security vulnerabilities quickly and identify and fill any gaps existing across its global corporate network. It also wanted to establish a governance model and take advantage of the latest technologies to give the company the confidence that it could operate without disruption from a future cyber security event.

KPMG's involvement grew to ten separate work streams as this client discovered the depth and breadth of our capabilities.

Approach

Working shoulder to shoulder with this company beginning in 2016, KPMG member firm professionals have helped the company focus on strategy and governance, organizational transformation, and cyber defense. 

1

We established a project management office (PMO) to run the entire gamut of this multimillion-dollar cyber transformation program. We created a wide-ranging governance model and developed a full slate of metrics to measure the program’s success.

2

Bringing together the staffs of the CIO, CISO, and CTO functions, we established objectives, milestones, decision-making processes, and critical success factors. Soon, we were asked to lead weekly steering committee meetings composed of the top 40 most critical players to bring discipline and clarity to the transformation.

3

As the company became more aware of the depth and breadth of our capabilities, our involvement grew to 10 separate work streams. We were able to increase our resources quickly, from the initial 3 senior-level professionals on site to a total of 24 seasoned consultants, accessible both on site and around the world.

    4

    Building upon our work in the corporate security transformation, the client requested our support to further enhance capabilities in its Security Operations Center.

    5

    In parallel to the support provided to the CIO, CISO, and CTO organizations, we supported the company’s global privacy officer with an enterprise-wide upgrade to privacy policies and procedures as required under the European Union’s General Data Protection Regulation (GDPR).

    With these enhanced capabilities, the company is well positioned to make bold decisions and feel confident that its cyber strategy, defenses, and recovery capabilities will protect its business and support its growth strategies for years to come.

    Benefits to client

    To better secure its online corporate data, the company is implementing a number of new protocols that:

    1

    Provide a comprehensive assessment of mission-critical corporate applications to identify security deficiencies and gaps and provide a viable remediation road map, including detailed steps to reduce overall risk and further protect critical applications.

    2

    Develop an effective plan and road map for addressing identified deficiencies and vulnerabilities in the corporate infrastructure (e.g., servers, data technology, network) to improve the company’s security posture and reduce risk.

    3

    Protect data and data flows by assisting with the implementation of leading technology like crypto key management, encryption configuration leading practices, and encryption capabilities.

    4

    Allow users to have a single sign-on with the added protection of two-factor authentication to prevent fraudulent access and significantly reduce the number of phishing attempts.

    5

    Give all customer support teams improved capabilities to further protect customer information and train teams on the intricacies of privacy guidelines around the world.

    6

    Leverage advanced methodologies and technologies like data science, process automation, and asset management to improve insight into critical security controls and capabilities and reduce risk.

      7

      Quickly identify anomalies so that managers can make more informed decisions and employees can regain trust in organization-wide reporting and metrics.

      8

      Gain an end-to-end view of the company’s technology infrastructure to triage incidents and remediate vulnerabilities quickly should a future cyber event occur.

      KPMG insights

      • Transformation is an end-to-end process

        Point solutions won’t solve the problem. Transformation is a combination of people, processes, technologies, and change management programs that can stand up, build, run, and maintain security capabilities for the long term.

      • Internal stakeholders must play on the same team

        When an organization is fortifying itself against a cyber attack, decisions must happen quickly. There’s no time to waste debating alternatives. Take emotions and egos out of the situation and just let the data speak. Put the “brutal facts” on the table to better focus everyone on the common task at hand to achieve consensus quickly. 

      • Simpler is better

        More technology and more processes don’t always guarantee more security. Aim for simplicity.

      Creating confident consumers

      Creating confident consumers

      KPMG helped a global provider of financial services technology build robust cyber strategy, defenses and response capabilities.

      Download PDF

      Meet our team

      Image of Vijay Jajoo
      Vijay Jajoo
      Principal, Cyber Security, KPMG US
      Image of Sreekar Krishna, PhD
      Sreekar Krishna, PhD
      National Leader of Artificial Intelligence and Head of Data Engineering, KPMG US

      Explore other services tailored to your business

      Thank you!

      Thank you for contacting KPMG. We will respond to you as soon as possible.

      Contact KPMG

      Use this form to submit general inquiries to KPMG. We will respond to you as soon as possible.

      By submitting, you agree that KPMG LLP may process any personal information you provide pursuant to KPMG LLP's Privacy Statement.

      An error occurred. Please contact customer support.

      Job seekers

      Visit our careers section or search our jobs database.

      Submit RFP

      Use the RFP submission form to detail the services KPMG can help assist you with.

      Office locations

      International hotline

      You can confidentially report concerns to the KPMG International hotline

      Press contacts

      Do you need to speak with our Press Office? Here's how to get in touch.

      Headline