Skip to main content

      Cyberattacks are one of the greatest threats to business today. Regardless of their industry, companies face the risk of data loss, business disruption, and financial losses. The scale and sophistication of incidents are growing, and any security breach can cost a company its reputation and customer trust. KPMG supports organizations in building resilience to cyber threats by combining global experience with local understanding of market needs.



      What is cybersecurity and why is it so important?

      Cybersecurity is comprehensive protection of data, IT systems, and business processes against unauthorized access, disruptions, and attacks. It is not only technology—firewalls, encryption, or antivirus systems—but also procedures, policies, and user awareness.

      In the age of advancing digitalization and remote work, every element of infrastructure—from applications to mobile devices and the cloud—can be a target for cybercriminals. Add to this the vulnerability of employees to manipulation, and effective information protection becomes an extremely difficult issue. It is no wonder that cybercrime is now the largest and fastest-growing area of activity for international criminal groups.

      The lack of adequate security measures poses not only a risk of financial loss, but also legal and reputational risks. Today, an effective cybersecurity strategy is a prerequisite for customer trust, operational stability, and competitive advantage.



      Cybersecurity challenges for companies

      • Increasingly sophisticated hacking and social engineering attacks.
      • The complexity of regulations (GDPR, NIS2, DORA) and the need to comply with them.
      • Skills gap – lack of specialists and knowledge within the organization.
      • Difficulties in monitoring and responding to incidents in real time.
      • Dependence on technology providers and the need to secure the supply chain.
      • Pressure to maintain business continuity even in the event of an attack.

      What will you gain by using KPMG's cybersecurity services? 


      • Peace of mind

        Your organization complies with regulatory requirements, has proof of due diligence, and minimizes the risk of penalties.

      • Resilience

        Systems, applications, and processes are effectively protected against attacks.

      • Higher team competence

        Employees are better able to recognize threats and respond to attempted attacks.


      • Trust

        The security of customer and partner data builds your company's reputation.

      • Readiness

        You gain proven response plans and 24/7 expert support.

      • Cost savings

        You avoid the costs of downtime, data leaks, and financial losses.


      Our support in the area of cybersecurity

      The scope of our work is usually a combination of the following services in three main areas:

      Application

      • Application penetration tests (web, mobile, thick client)
      • Application source code reviews
      • ERP system security assessments
      • Evaluation of the system design from a security perspective
         

      Infrastructure

      • Analysis of security architecture
      • Internal and external vulnerability tests as well as penetration tests
      • Evaluation of security configuration of infrastructure elements
      • Analysis of device security (IoT/IIoT)
      • Physical security tests
         

      People

      • Analysis of the maturity of processes and organization security
      • Compliance reviews of the organization and processes with applicable regulations
      • Verification of employees’ vulnerability to social engineering attacks
      • Verification of the effectiveness of security monitoring and incident response functions

      We ensure cost-effective development of organizations, processes, and technical measures that enable effective improvement of security levels:

      Transformation and optimization of cybersecurity

      • Building a cybersecurity strategy
      • Implementing employee cybersecurity awareness programs
      • Developing a security architecture
      • Implementing and optimizing cybersecurity management systems
      • Security management in relations with third parties
      • Organization of SOC (Security Operations Center) teams
      • Business continuity management
      • Embedding security into software development lifecycle
         

      Support in the selection and implementation of security systems

      • Data Loss Prevention and Data Activity Monitoring (DLP, DAM)
      • Identity Management and Privileged Identity Management (IDM, PIM)
      • Advanced Threat Protection (ATP)
      • Security Information and Event Management (SIEM)
      • Cloud solutions security
      • Web Application Firewalls (WAF)
      • Mobile Device Management (MDM)
      • Public key infrastructures (PKI)

      We provide comprehensive support to companies before, during, and after a cyberattack:

      Preparation

      • KPMG helps limit the damage caused by security breaches by preparing organizations to effectively detect and respond to incidents.
      • During the preparatory phase, key systems, confidential information, and important individuals within the organization are identified. An analysis of the risks and impact of various types of cyberattacks on the company is conducted.
      • KPMG offers comprehensive support in testing incident detection and response plans, including tailored tabletop and CTF exercises, as well as assistance in process optimization, tool implementation, strategic partner selection, and staff training.
         

      Response

      • KPMG is a reliable partner in cybersecurity incidents. We provide data security, file and log analysis, and incident management to effectively help our clients deal with threats.
      • KPMG offers 24/7 emergency incident response services. Before starting projects, client onboarding is provided to learn about the infrastructure and security systems, ensuring effective response to future incidents.
      • Global clients choose KPMG for its critical response time and professional assistance. KPMG's qualified specialists are available within just 4 hours or less, and we provide local support within 24-48 hours in most countries.
         

      Post-breach activities

      • Following a cyber incident, it is important to determine whether the causes of the incident have been correctly identified and mitigation measures have been properly implemented. In the event of a personal data breach, there may be legal obligations to report the incident to the regulator.
      • KPMG helps clients understand the root causes of incidents, assess the effectiveness of mitigation measures, and supports them in communicating with the regulator. KPMG recommends additional mitigation measures and expert support to resolve identified issues.
      • KPMG is ready to provide clients with temporary support to strengthen monitoring, detection, and response to threats as part of its Post Breach Monitoring service, taking into account the risk of attackers maintaining continuous access to the infrastructure.

      With the growing popularity of cloud solutions and the globalization of systems, processes, and supply chains, combined with the proliferation of social media and mobile devices, more and more customer data is being collected, stored, disclosed, and transferred around the world. It is extremely important that this data is used in the most appropriate way.

      Given the changing nature of organizations as a result of mergers and acquisitions, organizational restructuring, new system implementations, and a complex and evolving regulatory environment, data protection is emerging as one of the most difficult and demanding challenges facing organizations today.

      What will you gain by implementing service-based data protection processes in your organization?

      KPMG's data protection services help you manage regulatory compliance and enable you to use personal data to build value and increase revenue while meeting the expectations of customers, employees, and suppliers.

      Our support:

      • Risk assessment – providing an independent assessment of your current risk profile and comparing it with your target state.
      • Design – working with the client to develop a personal data protection compliance program to meet legal requirements.
      • Strategy – working together to develop a pragmatic personal data protection strategy and gain senior management buy-in.
      • Monitoring – supporting the maintenance of a personal data control environment.
      • Operations – providing ongoing support and advice on operating the control environment.
      • Implementation – supporting the implementation of robust and sustainable processes, policies, and controls to mitigate risk.


      About us

      To meet the contemporary challenges faced by businesses, KPMG has established a regional competence center in Poland, employing experts with in-depth technical knowledge and extensive experience in implementing hundreds of cybersecurity projects in Poland and around the world.

      The KPMG Cybersecurity team provides a wide range of services, taking a comprehensive approach to information protection by securing infrastructure and applications and taking care of the human factor, i.e., proper organization, processes, and employee knowledge in the field of information protection.


      • We are the global leader in cybersecurity advisory services (according to a survey by Forrester WaveTM: Information Security Consulting Services, Q3 2017).
      • Our Polish experts have completed hundreds of cybersecurity projects for Polish and foreign companies across a range of industries.
      • During projects we have carried out, we have identified dozens of zero-day vulnerabilities.
      • Our independence from the manufacturers of security solutions enables us to provide our clients with optimal advice.
      • We understand business processes, and thus our recommendations are tailored to our clients’ true needs and generate real added value.
      • Our presence within KPMG’s global network of cybersecurity teams offers a wealth of knowledge, tools and innovative solutions.
      • Our global network also ensures continuity of cooperation and the ability to serve the client in numerous countries simultaneously.
      • We actively participate in industry organizations (e.g. on the management board of OWASP Poland).
      • Our knowledge is sought after by leading educational organizations—for example, we support the SANS Institute as a mentor for application security.
      • We are flexible and adjust to the dynamically evolving needs of clients.

      • Offensive Security Certified Expert (OSCE)
      • Offensive Security Certified Professional (OSCP)
      • Certified Ethical Hacker Practical (CEH)
      • Licensed Penetration Tester (LPT)
      • GIAC Cloud Penetration Tester (GCPN)
      • eLearnSecurity Certified Professional Penetration Tester (eCPPTv2)
      • Web application Penetration Tester eXtreme (eWPTX)
      • GIAC Certified Web Application Penetration Tester (GWAPT)
      • Mobile Application Penetration Tester (eMAPT)
      • GIAC Certified Windows Security Administrator (GCWN)
      • GIAC Mobile Device Security Analyst (GMOB)
      • GIAC Certified UNIX Security Administrator (GCUX)
      • GIAC Response and Industrial Defense (GRID)
      • GIAC Global Industrial Cyber Security Professional (GICSP)
      • Certified SCADA Security Architect (CSSA)
      • ISA/IEC 62443 Cybersecurity Fundamentals Specialist (CFS)
      • ISA/IEC 62443 Cybersecurity Risk Assesment Specialist (CRAS)
      • EC-Council Certified Incident Handler (ECIH)
      • CSSA (Certified SCADA Security Architect)
      • Certified Information Systems Security Professional (CISSP)
      • Certified Information Security Manager (CISM)
      • Certified Information Systems Auditor (CISA)
      • ISO 27001 Information Security Management System Auditor/Lead Auditor
      • Certified ISO27001 Internal Auditor
      • Certified ISO22301 Lead Auditor
      • Certified Information Privacy Professional Europe (CIPP/E)
      • OneTrust Certified Privacy Professional
      • OneTrust - Privacy Rights Automation -Expert
      • ServiceNow - GRC IRM Fundamentals
      • Approved Compliance Officer (ACO)
      • Microsoft Certified: Cybersecurity Architect Expert (SC-100)
      • Microsoft Certified: Azure Solutions Architect Expert (AZ-300, AZ-301)
      • AWS Certified Cloud Practitioner
      • AttackIQ Proffessional
      • Forrester ZeroTrust Certified (ZTX)

      Contact us


      Learn more about how KPMG's knowledge and technology can help you and your business.


      Our experts

      Michał Kurek

      Partner, Advisory, Head of Cybersecurity in Poland and CEE

      KPMG in Poland