Industries

Helping clients meet their business challenges begins with an in-depth understanding of the industries in which they work. That’s why KPMG LLP established its industry-driven structure. In fact, KPMG LLP was the first of the Big Four firms to organize itself along the same industry lines as clients.

How We Work

We bring together passionate problem-solvers, innovative technologies, and full-service capabilities to create opportunity with every insight.

Learn more

Careers & Culture

What is culture? Culture is how we do things around here. It is the combination of a predominant mindset, actions (both big and small) that we all commit to every day, and the underlying processes, programs and systems supporting how work gets done.

Learn more

Achieving cost efficiencies in Identity and Access Management

A strategic approach to managing IAM, with automation and right-sizing of your organization, can reduce operational costs.

CISOs are seeking opportunities to contain the costs of their cyber security programs. This follows a period of significant investment in cyber security, during which organizations rapidly matured their cyber security capabilities to maintain pace with the evolving threat landscape. The transitioning of funding, from investment budgets into operational budgets, has resulted in greater scrutiny on program operational effectiveness and efficiency.

The urgency of cost takeout has recently been exacerbated by the COVID-19 global lockdowns. Many businesses have experienced a significant drop in sales, and are now struggling to manage their cost base. Businesses must streamline their operations and cyber security programs cannot expect to be shielded from this—despite the rise in fresh threat vectors associated with virtual working and the emergence of some opportunistic adversaries.

A core component of all cyber security programs is Identity and Access Management (IAM). Over the past few years, significant investments have been made in this space—resulting in regulatory pressure, incidents involving inappropriate access rights, and CISOs effectively articulating the commercial benefits of a leading IAM capability. This investment has taken various forms but typically involves buildout of tooling and processes. In many instances, this expansion was done piecemeal (an inevitability associated with annual budgetary processes). Wherever there is fragmentation, unnecessary complexities, or underutilized resources in the IAM capability, there is opportunity to create efficiencies.

Discover more

Achieving cost efficiencies in Identity and Access Management

Download PDF

Meet the team

Image of Jim Wilhelm
Jim Wilhelm
Principal, Cyber Security, KPMG US

Explore related insights

Thank you!

Thank you for contacting KPMG. We will respond to you as soon as possible.

Contact KPMG

Use this form to submit general inquiries to KPMG. We will respond to you as soon as possible.

By submitting, you agree that KPMG LLP may process any personal information you provide pursuant to KPMG LLP's Privacy Statement.

An error occurred. Please contact customer support.

Job seekers

Visit our careers section or search our jobs database.

Submit RFP

Use the RFP submission form to detail the services KPMG can help assist you with.

Office locations

International hotline

You can confidentially report concerns to the KPMG International hotline

Press contacts

Do you need to speak with our Press Office? Here's how to get in touch.

Headline