Industries

Helping clients meet their business challenges begins with an in-depth understanding of the industries in which they work. That’s why KPMG LLP established its industry-driven structure. In fact, KPMG LLP was the first of the Big Four firms to organize itself along the same industry lines as clients.

How We Work

We bring together passionate problem-solvers, innovative technologies, and full-service capabilities to create opportunity with every insight.

Learn more

Careers & Culture

What is culture? Culture is how we do things around here. It is the combination of a predominant mindset, actions (both big and small) that we all commit to every day, and the underlying processes, programs and systems supporting how work gets done.

Learn more

Protect against deepfakes: five steps to take now

Can you identify a deepfake?

They are highly convincing counterfeits — whether video, audio, imagery, or voice — created using advanced AI techniques like Generative Adversarial Networks (GANs). These tools manipulate existing content to produce realistic yet entirely fabricated material. As deepfakes increasingly infiltrate workplaces and boardrooms, they pose significant risks, including the potential to disrupt and destabilize businesses worldwide.

Discover our essential steps to help you identify and protect against these sophisticated forgeries.

See the steps

Here are five tips leaders need to know to protect against deepfakes

1

Develop a robust cybersecurity culture:
Encourage employees to create their own cybersecurity hygiene and function as human firewalls throughout all of their business activities—including work-from-home arrangements.

2

Replace implicit trust with continuous validation:
Implement a zero-trust model, multifactor authentication, behavioral biometrics, single sign-on, password management, and privileged access management.

3

Improve organizational risk intelligence: 
Identify key risk indicators and quantify the financial impact of security risks and threats posed by manipulated content

4

Adopt a secure-by-design approach:
Mitigate the human variable by embedding security throughout product lifecycles—from design to delivery—to connect cybersecurity strategy to the entirety of the business.

5

Invest in prediction, detection, and response: 
Prioritize new technology that enables new and innovative approaches to cybersecurity problem-solving.

Insights to help you inspire stakeholder trust

Now that you’ve gathered the information above, check out our comprehensive approach to risk management.

Meet the team

Image of Matthew P. Miller
Matthew P. Miller
Principal, Advisory, Cyber Security Services, KPMG US

Thank you!

Thank you for contacting KPMG. We will respond to you as soon as possible.

Contact KPMG

Use this form to submit general inquiries to KPMG. We will respond to you as soon as possible.

By submitting, you agree that KPMG LLP may process any personal information you provide pursuant to KPMG LLP's Privacy Statement.

An error occurred. Please contact customer support.

Job seekers

Visit our careers section or search our jobs database.

Submit RFP

Use the RFP submission form to detail the services KPMG can help assist you with.

Office locations

International hotline

You can confidentially report concerns to the KPMG International hotline

Press contacts

Do you need to speak with our Press Office? Here's how to get in touch.

Headline