Moving towards compliance with identity governance for files

Protecting an organization’s most sensitive information

Jim Wilhelm

Jim Wilhelm

Principal, Cyber Security, KPMG US

+1 267-256-7271

Protecting an organization’s most sensitive information—intellectual property, financial documents, personal information on both employees and customers, etc.—is an important responsibility for information technology (IT) and security departments. Amid the growing presence of cyber crimes and theft, industry and government regulations, including the Health Insurance Portability and Accountability Act, the Payment Card Industry Data Security Standard, the Sarbanes-Oxley Act, and the European General Data Protection Regulation, were put into place to help protect this data.

While these regulations were intended to force good behaviors in order to improve the overall risk posture of global organizations, these compliance mandates created parallel projects for many organizations focused on proving compliance and protecting themselves. Fortunately, by implementing a governance- based approach to identity governance, you can help secure your organization’s sensitive data while simultaneously supporting compliance with these laws, saving time and resources that can then focus on moving your business forward.

KPMG enhanced our IAM implementation methodology through investments in building an extensive catalog of intellectual property, enablers, and accelerators. This helps us design platforms that meet our clients’ business needs today and are ready for the future, designed to accelerate long-term return on investment.