Industries

Helping clients meet their business challenges begins with an in-depth understanding of the industries in which they work. That’s why KPMG LLP established its industry-driven structure. In fact, KPMG LLP was the first of the Big Four firms to organize itself along the same industry lines as clients.

How We Work

We bring together passionate problem-solvers, innovative technologies, and full-service capabilities to create opportunity with every insight.

Learn more

Careers & Culture

What is culture? Culture is how we do things around here. It is the combination of a predominant mindset, actions (both big and small) that we all commit to every day, and the underlying processes, programs and systems supporting how work gets done.

Learn more

Identifying risk in your application portfolio

Optimize your application portfolio management process

Identifying Risk in Your Application Portfolio

With the advent of digital transformation, it is not astonishing, that refining application security posture is of utmost priority for businesses. As organizations increasingly rely on applications to enable their evolving business needs, keeping track of the long list of applications and their distinct purposes may be difficult to monitor. It can be even more arduous to keep up with the volume of security work that is involved.

While technology is undoubtedly fundamental to an organization's growth strategy, managing digital risks is critical as you grow your application portfolio. Today it is no longer sufficient for risk professionals to monitor or mitigate risks, but rather to streamline risk processes.  An integrated application ecosystem is key to synchronizing data in real-time and enabling effective security controls.

Application security doesn’t end with the software’s configurations. It extends into the office, the training programs, and into your business processes. While risk evaluation, controls effectiveness, and segregation and separation of duties (SODs) will play crucial roles in enhancing security in an organization’s application portfolio, protecting your enterprise data in this new hybrid and a multi-layered cloud environment is a shared responsibility between you and your application providers.

It’s a complete ecosystem in which all parts must work in concert to be effective. It starts with a target operating model (TOM), a blueprint designed to align your strategic objectives with the capabilities and processes required to achieve them. From there, of course, it’s all about execution—implementing, enforcing, and auditing the proper controls, monitoring for ongoing risks, and responding to threats.

close
Contributors
Image of Brian Jensen

Brian Jensen

Managing Director, GRC Technology

Image of Christian Leva

Christian Leva

Managing Director, GRC

close
Media contacts

Discover related insights and services

Thank you!

Thank you for contacting KPMG. We will respond to you as soon as possible.

Contact KPMG

Use this form to submit general inquiries to KPMG. We will respond to you as soon as possible.

By submitting, you agree that KPMG LLP may process any personal information you provide pursuant to KPMG LLP's Privacy Statement.

An error occurred. Please contact customer support.

Job seekers

Visit our careers section or search our jobs database.

Submit RFP

Use the RFP submission form to detail the services KPMG can help assist you with.

Office locations

International hotline

You can confidentially report concerns to the KPMG International hotline

Press contacts

Do you need to speak with our Press Office? Here's how to get in touch.

Headline