Helping clients meet their business challenges begins with an in-depth understanding of the industries in which they work. That’s why KPMG LLP established its industry-driven structure. In fact, KPMG LLP was the first of the Big Four firms to organize itself along the same industry lines as clients.

How We Work

We bring together passionate problem-solvers, innovative technologies, and full-service capabilities to create opportunity with every insight.

Learn more

Careers & Culture

What is culture? Culture is how we do things around here. It is the combination of a predominant mindset, actions (both big and small) that we all commit to every day, and the underlying processes, programs and systems supporting how work gets done.

Learn more

Transform Identity Security | Powered Cyber, SailPoint enabled

When accelerating digital transformation, businesses must be nimble in their ability to adapt to change.

With the acceleration of digital transformation, businesses must be nimble in their ability to adapt to change. And with the paradigm shift of the last year, a digital strategy must be at the forefront of any organization. Adopting a digital strategy streamlines processes, improves productivity, and ultimately drives greater efficiency.

Digital transformation may include increased adoption and reliance on cloud applications and platforms, opening customer access to applications and data as well as enhanced access for an increasingly remote workforce. From an identity perspective, the traditional perimeter starts disappearing and starts to open up your organization to specific vulnerabilities—which is why managing and governing access to systems, applications and resources is essential to every business.

Identity Security (also known as Identity and Access Management or IAM) needs to be at the forefront of your organization’s cybersecurity strategy. Identity Security safeguards against risk by properly provisioning access, protecting your business at scale and ensuring regulatory compliance.

Transform Identity Security with Powered

At KPMG, we understand the challenges with increased data complexity, lack of process standardization and ineffective governance deployed for identity and access management programs. Our Powered Methodology can help organizations transform the identity function to better enable functional digital transformation and be more effective in delivering improvements in access risk reduction, more effective controls and better compliance outcomes.

Powered Cyber enabled by SailPoint combines the SailPoint Identity Platform with KPMG Powered Enterprise methodology to accelerate the delivery of identity cloud access management programs and services.

Powered Enterprise is an outcome-driven functional transformation solution tailored to the modern Cyber organization that enables businesses to prioritize and deliver IAM capabilities in a way that secures their critical assets. A transformed identity program centers itself around alignment with business objectives and an ability to integrate and be adopted within the organization. This means a predefined set leading practice use cases that establish a baseline set of processes.

According to a 2021 KPMG survey, 69 percent of CEO’s agreed that “strong cybersecurity is critical to engender trust with our key stakeholders.” CEO’s are starting to see cybersecurity as a differentiator—a competitive advantage—a way to build customer trust. However, if they want to engender their customers’ trust, they need to be able to implement and maintain an effective IAM program that restricts access to sensitive data and applications to authorized users.

KPMG Powered Cyber enabled by SailPoint transforms the way organizations approach identity and access management. It’s a functional transformation solution built around SailPoint Identity platform.

At the crux of Powered Cyber enabled by SailPoint is a prebuilt target operating model (TOM) to accelerate the delivery of identity and access management programs and services.

SailPoint Identity Security for the cloud enterprise provides among the largest view of all access across your organization, automatically scaling and protecting with AI enhanced visibility, detection, and remediation—enabling you to dynamically adapt access controls as your organization evolves. The SailPoint Identity Platform allows you to deliver, manage and secure access to every application, system, data and cloud platform across your hybrid environment.

A Target Operating Model Built on our experience

The goal of the KPMG Target Operating Model is to drive a dynamic functional transformation enabled by industry leading technology. The KPMG Target Operating Model is based on a deep understanding of how transformation works within, and across, an enterprise.

The model is made up of six layers which contain several ‘assets’ which are predefined and are designed to support the transformation journey. Each asset can be thought of as a collection of well-established solution accelerators comprised of predefined or prebuilt processes, workflows, definitions, integrations, reports, dashboards and even training programs.

  1. Functional Processes: Defining the Process Taxonomy, Start with the End in Mind
    KPMG Powered Cyber enabled by SailPoint provides organizations with a baseline of 32 identity governance processes based on leading practices that dictate how to implement an effective identity and access management program. These functional processes include onboarding user access to new hires, as well as managing transfers and termination processes (joiner, mover, leaver). They also serve as the foundation for a zero trust approach to cybersecurity and inform the other five layers of the model.

  2. People, Roles and Responsibilities
    Once the organization formalizes their identity approach and process taxonomy, the roles and responsibilities that will support, operate and manage the process must be defined.

    Who will ensure the solution is implemented properly and that it’s meeting the needs of the organization? People, roles and responsibilities must be outlined within the model and mapped to specific processes, and those processes must also map to the people. KPMG has a set of predefined roles and responsibilities mapped to identity functions and the processes validated in previous layer. These roles can be modified to meet a client’s specific organization needs, and have been proven to establish clear ownership and accountability necessary for a successful transformation program.

  3. Service Delivery Model
    The service delivery model is an organizational structure that organizes people, roles and responsibilities into various teams, and defines the structure of how those teams operate together. The people flow into the service delivery model—which in turn defines roles and responsibilities. Identity and access management programs are often complex in that they span across multiple executives and stakeholders. This layer defines how the role and responsibilities are effectively aligned across the organization in order to establish an effective program with clear ownership and accountability.

  4. Technology
    The technology layer of the model also aligns to the functional processes with a pre-built configuration of SailPoint Identity Security. The KPMG “gold build” configuration for SailPoint Identity Security maps detailed configuration steps to each of the functional processes and use cases to further accelerate deployment and provide rapid value.

  5. Performance Insights and Data
    Performance insights and data are predefined metrics centered around key performance and risk indicators that measure the success and value of the program. In this particular case, how well is SailPoint meeting its business needs? Are all users who are terminated from the organization deprovisioned within a defined time period outlined in the service level agreement?

    Powered Cyber enabled by SailPoint has a set of pre- defined metrics that map to the leading processes. The potential benefit is an effective approach to how an organization reports on the value of the program—how well it’s reducing risk, improving operational efficiency, and how well it’s meeting compliance objectives.

  6. Governance
    The last layer of the operating model is governance. You have defined processes, a team that manages those processes, technology that supports and enforces it, as well as KPIs and risk indicators that measure the success.

    The governance layer is concerned with how well the solution is being governed. How can you tie the operating model together and ensure there is effective communication, the policies and controls are defined and mapped properly, compliance is adhered to, executives are receiving proper reporting, and that key stakeholders are being informed properly? Often an implementation is focused on the technical deployment and misses out on how to properly maintain the solution. The governance layer clearly defines how to maintain existing controls while adapt to changing business needs and compliance requirements.

The Key Differentiator

What makes the Target Operational Model a differentiator and unique to a traditional technology implementation is that Powered Cyber enabled by SailPoint leverages a predefined business vision and validated model for success. KPMG brings 32 functional but tailorable process with embedded leading practices that have been effective and of significant value. In addition, KPMG has a gold build configuration of SailPoint IdentityNow that maps to the Powered Cyber enabled by SailPoint process resulting in accelerated solution deployment timeframes.

KPMG Powered Cyber enabled by SailPoint transforms the way you run your business by embracing change with new technologies, building agile functions that evolve as you grow, and driving success with the latest leading practices.

Powered Cyber enabled by SailPoint takes identity governance to the next level by providing scalable outcomes in reduced time resulting in increased efficiencies, reduced costs, an enhanced customer experience and a quantifiable reduction in cybersecurity risks.

To learn more about the KPMG partnership with SailPoint, visit SailPoint (

Meet our team

Image of Jim Wilhelm
Jim Wilhelm
Principal, Cyber Security, KPMG US

Explore more

Thank you!

Thank you for contacting KPMG. We will respond to you as soon as possible.

Contact KPMG

Use this form to submit general inquiries to KPMG. We will respond to you as soon as possible.

By submitting, you agree that KPMG LLP may process any personal information you provide pursuant to KPMG LLP's Privacy Statement.

An error occurred. Please contact customer support.

Job seekers

Visit our careers section or search our jobs database.

Submit RFP

Use the RFP submission form to detail the services KPMG can help assist you with.

Office locations

International hotline

You can confidentially report concerns to the KPMG International hotline

Press contacts

Do you need to speak with our Press Office? Here's how to get in touch.