Global

Protect 

Cyber attacks are growing in scale and sophistication. Technological advances and changing working practices have created additional opportunities for cyber criminals and hacktivists. Simultaneously, public and private organizations’ major e-crime risks relate to the actions of malicious or former employees, able to exploit customer and employee data, Intellectual Property (IP) or knowledge of system weaknesses.

The protect phase of KPMG’s Cyber Security Framework is about designing and implementing your cyber defense infrastructure.


What’s on your mind?

  • What should the overall design of my defense infrastructure look like?
  • How do I ensure network security?
  • How do I ensure only authorized employees have access to our systems and applications?
  • How can I improve the security of information we store in the cloud?
  • How can I limit the opportunities for malicious insiders in my organization?
  • How do I identify and fix system vulnerabilities?
  • What should my governance and controls look like?
  • How can I design my people processes to minimize security risks?

Our services

KPMG member firms can help you to design, implement and improve your cyber defense infrastructure. Whether from a people, process or technology viewpoint, our services will help you protect your information assets and reduce vulnerabilities to cyber attack. KPMG’s services include:


  • Cyber defense operating model design

    Design and implementation of the overall defense infrastructure


  • Identity and access management

    KPMG member firms assist clients to cut through complexity and help ensure enterprise system access is aligned to roles, duties and privileges


  • Data loss prevention

    KPMG member firms help clients prioritize the protection of their most important assets, designing efficient methods to identify and prevent accidental and deliberate data loss.


  • Security and technology assessments

    Through KPMG’s network of security laboratories we can test and improve the elements of your security and technology infrastructure, including:

    • External, internal and wireless vulnerability testing and improvement – what information assets can be compromised?
    • Network segregation testing and improvement – is your network security appropriately configured?
    • ‘Red Team’ exercises to simulate advanced attacks against your entire organization to assess your detection and response capabilities

  • People process reviews

    KPMG member firms can help you understand and improve vulnerabilities posed by your people processes

 

 

Feedback

We want to hear your point of view. Email us at globaladvisory@kpmg.com.

 Learn more

Share this

Share this

Malcolm Marshall

Malcolm Marshall

Global Head, Information Protection & Business Resilience

44 20 73115456

John Hermans

John Hermans

Cyber Security Lead Partner, KPMG in the Netherlands

+31 6 51366389