Helping clients meet their business challenges begins with an in-depth understanding of the industries in which they work. That’s why KPMG LLP established its industry-driven structure. In fact, KPMG LLP was the first of the Big Four firms to organize itself along the same industry lines as clients.

How We Work

We bring together passionate problem-solvers, innovative technologies, and full-service capabilities to create opportunity with every insight.

Learn more

Careers & Culture

What is culture? Culture is how we do things around here. It is the combination of a predominant mindset, actions (both big and small) that we all commit to every day, and the underlying processes, programs and systems supporting how work gets done.

Learn more

Moving towards compliance with identity governance for files

Protecting an organization’s most sensitive information

Protecting an organization’s most sensitive information—intellectual property, financial documents, personal information on both employees and customers, etc.—is an important responsibility for information technology (IT) and security departments. Amid the growing presence of cyber crimes and theft, industry and government regulations, including the Health Insurance Portability and Accountability Act, the Payment Card Industry Data Security Standard, the Sarbanes-Oxley Act, and the European General Data Protection Regulation, were put into place to help protect this data.

While these regulations were intended to force good behaviors in order to improve the overall risk posture of global organizations, these compliance mandates created parallel projects for many organizations focused on proving compliance and protecting themselves. Fortunately, by implementing a governance- based approach to identity governance, you can help secure your organization’s sensitive data while simultaneously supporting compliance with these laws, saving time and resources that can then focus on moving your business forward.

KPMG enhanced our IAM implementation methodology through investments in building an extensive catalog of intellectual property, enablers, and accelerators. This helps us design platforms that meet our clients’ business needs today and are ready for the future, designed to accelerate long-term return on investment.

Dive into our thinking:

Moving towards compliance with identity governance for files

Download PDF

Meet our team

Image of Jim Wilhelm
Jim Wilhelm
Principal, Cyber Security, KPMG US

Explore more

Thank you!

Thank you for contacting KPMG. We will respond to you as soon as possible.

Contact KPMG

Use this form to submit general inquiries to KPMG. We will respond to you as soon as possible.

By submitting, you agree that KPMG LLP may process any personal information you provide pursuant to KPMG LLP's Privacy Statement.

An error occurred. Please contact customer support.

Job seekers

Visit our careers section or search our jobs database.

Submit RFP

Use the RFP submission form to detail the services KPMG can help assist you with.

Office locations

International hotline

You can confidentially report concerns to the KPMG International hotline

Press contacts

Do you need to speak with our Press Office? Here's how to get in touch.