Don't Be Left Out in the Cold: Keep Your Adobe® ColdFusion® Covered
This article looks at ColdFusion's exploit history and underscores the importance of applying updates and security patches.
Advisory Institute Mon, 19 May 2014 00:00:00 GMT
Directors Quarterly: July 2014
Directors Quarterly from KPMG's Audit Committee Institute for July 2014.
Audit Committee Institute Mon, 30 Jun 2014 00:00:00 GMT
Compliance Risk Management Survey: Point of View
This article offers highlights from KPMG's CRM Survey -- results grouped by type of bank and KPMG analysis of areas of strength as well as areas for further enhancement.
Advisory Institute Thu, 24 Jul 2014 00:00:00 GMT
The new normal of consumer behavior and how to respond
How can companies engage most effectively with consumers?
Advisory Institute Tue, 29 Jul 2014 00:00:00 GMT
The Derivatives Industry and Third-Party Services: Assurance Considerations
Insight into the wide-ranging processes, controls and assurance needs facing the derivatives industry in this new landscape of reform.
Advisory Institute Fri, 18 Jul 2014 00:00:00 GMT
Taking Financial Planning and Analysis Transformation to the Next Level
Tap new value by redesigning the organization and service delivery model.
Advisory Institute Thu, 21 Aug 2014 00:00:00 GMT
Bribery & Corruption: Managing the Risks of Cross-Border M&A
Don't underestimate the legal and regulatory risks of buying a company overseas, particularly in the matter of bribery and corruption.
Advisory Institute Mon, 18 Aug 2014 00:00:00 GMT
Using Predictive Coding to Find Privileged Content
Privileged content is the most common type of protected information identified during e-discovery, and most costly, and the risks from inadvertent disclosure can be critical.
Advisory Institute Fri, 29 Aug 2014 00:00:00 GMT
Corruption at the Computer's Core: Reducing the Risk of BIOS-attacking Malware
Any component of a computer system is subject to attack in the digital age, but the BIOS is an especially impactful target because once it has been compromised, BIOS malware can render a PC useless.
Advisory Institute Thu, 25 Sep 2014 00:00:00 GMT
Navigating Big Data's Privacy and Security Challenges
Discover in this whitepaper five key big data security and privacy challenges and seven areas of focus in KPMG's approach to help minimize risks and maximize control over big data.
Advisory Institute Wed, 10 Sep 2014 00:00:00 GMT
From Burden to Competitive Advantage: Regulatory Change and Transformation in Financial Services
Explore three important steps for financial services firms to take to achieve a successful regulatory transformation.
Advisory Institute Tue, 28 Oct 2014 00:00:00 GMT
The Difference Maker
Consider the critical contributions an independent program management office (PMO) can make in your large scale business transformation projects.
Advisory Institute Mon, 15 Sep 2014 00:00:00 GMT
IT value management: No more crash and burn
Applying the principles of Technology Business Management (TBM) to the IT value management dialogue can result in a performance-based culture for IT within the broader business.
Advisory Institute Wed, 30 Nov 2016 00:00:00 GMT
Assess the Business Impact of Technology Obsolescence
Many organizations are better at developing and acquiring applications than they are at retiring them. As a result, they end up managing a large, expensive to maintain portfolio of legacy applications.
Advisory Institute Wed, 08 Oct 2014 00:00:00 GMT
Mobile Must Transform Customer Experience, Not Merely Simplify Communication
As companies strive to be more customer-centric, embracing mobile communications will be an important strategy.
Advisory Institute Tue, 14 Oct 2014 00:00:00 GMT