Enter your keyword

About Cyber Security

The constantly evolving threat landscape means that cyber risk is  an  everyday  business  consideration,  in  the  same  way  that threats in the real world has always been. Cyber security is not a quick technical fix nor is it a matter solely for the IT department.

KPMG Cyber Security team assists organisations in  transforming their  security,  privacy  and  continuity  controls into  business-enabling platforms  while maintaining the confidentiality, integrity and availability of critical business functions. The KPMG Cyber approach strategically  aligns  with our clients’ business priorities and compliance needs.

The KPMG Cyber Approach

The KPMG Cyber approach is designed to be simple, effective and most importantly, aligned with the business needs of our clients.

Our  services  are  segmented  and  supported  by  specialised teams, providing our clients with  the  right  resources  for  any particular cyber-related need. Below is a breakdown of service offerings and our approach to cyber security:


Helping clients understand and improve their current state of preparedness against cyber-attacks, including services such as:

  • Cyber Readiness Assessment
  • Cyber Strategy and Transformation
  • Cyber Governance and Resilience
  • Data Governance and Privacy
  • Emerging Technology Risk Management
  • Threat Modeling
  • Cyber Defense Architecture Design


Helping clients design and implement their cyber defense infrastructure, including services such as:

  • Identity and Access Governance
  • Cloud Service and Cloud Provider Assessments
  • Vulnerability Management
  • Secure Application Development Services
  • Data Leakage Prevention Services
  • Critical Infrastructure Services
  • Secure SDLC


Helping clients maintain visibility of their cyber weaknesses and respond to cyber-attacks, including services such as:

  • Cyber Operations and Incident Response
  • Vulnerability and Penetration Testing
  • Platform and Network Security Assessments
  • Threat Detection and Intelligence Services
  • Cyber Asset Inventory Services
  • Post Breach Investigation


Helping clients embed cyber security into culture and decision making of the organization including services such as:

  • Cyber Security Awareness
  • Cyber Incident Simulation
  • Red Team / Blue team Exercises
  • Cyber in the Boardroom Services

Join the growing list of Participants at the Cyber Security Conference 2017.