Cyber services

Protect critical business processes, assets and data from cyber attacks

Jim Wilhelm

Jim Wilhelm

Principal, Cyber Security, KPMG US

+1 267-256-7271

As more IT systems shift to the cloud, organizations continue to push more cloud technologies and solutions into their digital transformation portfolio. This requires security teams to secure not only existing infrastructure, but also learn, train, and adopt new approaches to incident response. When a cyber security incident occurs, the need to quickly identify, contain, remediate, and report a security incident is crucial to an organization’s financial, reputational, legal, and operational risk.

Cyber risk can affect brand reputation, investor confidence, customer experience, product integrity and much more. Leveraging tools like the Microsoft Azure Cloud environment, Microsoft 365, and Microsoft Sentinel, KPMG cyber security professionals help you to:

  • Respond to threats faster and reduce actual security risks
  • Decrease your time to implementation or go to market
  • Gain cost advantages as a result of greater efficiency
  • Increase work productivity with Microsoft 365 collaboration
  • Foresee issues and respond before they become a reality

Enabling secure collaboration

Global bank secures Microsoft 365 file sharing

Video transcript

With the increased adoption of cloud computing, and the globalization of systems, processes, and supply chains, more customer data is being collected, retained, disclosed, and transferred around the globe.

Unfortunately, data breaches continue to rise, so it is more important than ever to build trust in how we are handling customer data.

KPMG is leveraging Microsoft technology to build cyber security solutions that prevent data loss and identify and monitor threats.

In this demonstration, we show how we helped a global bank secure one-drive file sharing among employees and non-employees.

Adele, a retail manager, is on a group chat with her colleague Christine and Sai, an external insurance agent. They are discussing Mortgage and Sales documents. Adele intends to separately share all files with Christine and then share only the public documents with Sai. Unfortunately, she makes a mistake and uploads all of the files to the group chat. This presents a potential data breach for the bank. Christine, as an employee of the bank, is able to view and open all of the files. She can also view the security controls for each and note the ones that are marked as confidential. Sai has access to all non-sensitive, public files that are shared.

However, since Sai is not an employee, when he tries to open one of the documents containing confidential information, the system automatically denies him access. Based on the content and sensitivity of the file, the bank’s cyber security tool flags confidential documents and blocks access to external users. This helps protect them from data breaches.

Leveraging the Microsoft Compliance Center app, the bank can use data loss prevention policies to block files that are unclassified, confidential, or contain NPPI data.

The bank also uses the Microsoft Defender for Cloud app to catch misclassified and unclassified files and restrict them from being shared externally.

KPMG can help you create and implement security policies that meet your specific requirements. With the right cyber security solution in place, you can reduce data loss and incidence response time while generating operational costs savings.

Secure your organization, build trust with your customers, and gain a competitive advantage.

Business led. Technology enabled.

Learn more at: