Search Results for:

Sort by: Relevance Date
16 - 30 of 5206 Results

Don't Be Left Out in the Cold: Keep Your Adobe® ColdFusion® Covered

This article looks at ColdFusion's exploit history and underscores the importance of applying updates and security patches.
Advisory Institute Mon, 19 May 2014 00:00:00 GMT

Directors Quarterly: July 2014

Directors Quarterly from KPMG's Audit Committee Institute for July 2014.
Audit Committee Institute Mon, 30 Jun 2014 00:00:00 GMT

Compliance Risk Management Survey: Point of View

This article offers highlights from KPMG's CRM Survey -- results grouped by type of bank and KPMG analysis of areas of strength as well as areas for further enhancement.
Advisory Institute Thu, 24 Jul 2014 00:00:00 GMT

The Derivatives Industry and Third-Party Services: Assurance Considerations

Insight into the wide-ranging processes, controls and assurance needs facing the derivatives industry in this new landscape of reform.
Advisory Institute Fri, 18 Jul 2014 00:00:00 GMT

Bribery & Corruption: Managing the Risks of Cross-Border M&A

Don't underestimate the legal and regulatory risks of buying a company overseas, particularly in the matter of bribery and corruption.
Advisory Institute Mon, 18 Aug 2014 00:00:00 GMT

The new normal of consumer behavior and how to respond

How can companies engage most effectively with consumers?
Advisory Institute Tue, 29 Jul 2014 00:00:00 GMT

Taking Financial Planning and Analysis Transformation to the Next Level

Tap new value by redesigning the organization and service delivery model.
Advisory Institute Thu, 21 Aug 2014 00:00:00 GMT

Corruption at the Computer's Core: Reducing the Risk of BIOS-attacking Malware

Any component of a computer system is subject to attack in the digital age, but the BIOS is an especially impactful target because once it has been compromised, BIOS malware can render a PC useless.
Advisory Institute Thu, 25 Sep 2014 00:00:00 GMT

Using Predictive Coding to Find Privileged Content

Privileged content is the most common type of protected information identified during e-discovery, and most costly, and the risks from inadvertent disclosure can be critical.
Advisory Institute Fri, 29 Aug 2014 00:00:00 GMT

Navigating Big Data's Privacy and Security Challenges

Discover in this whitepaper five key big data security and privacy challenges and seven areas of focus in KPMG's approach to help minimize risks and maximize control over big data.
Advisory Institute Wed, 10 Sep 2014 00:00:00 GMT

The Difference Maker

Consider the critical contributions an independent program management office (PMO) can make in your large scale business transformation projects.
Advisory Institute Mon, 15 Sep 2014 00:00:00 GMT

Assess the Business Impact of Technology Obsolescence

Many organizations are better at developing and acquiring applications than they are at retiring them. As a result, they end up managing a large, expensive to maintain portfolio of legacy applications.
Advisory Institute Wed, 08 Oct 2014 00:00:00 GMT

Mobile Must Transform Customer Experience, Not Merely Simplify Communication

As companies strive to be more customer-centric, embracing mobile communications will be an important strategy.
Advisory Institute Tue, 14 Oct 2014 00:00:00 GMT

IT value management: No more crash and burn

Applying the principles of Technology Business Management (TBM) to the IT value management dialogue can result in a performance-based culture for IT within the broader business.
Advisory Institute Wed, 30 Nov 2016 00:00:00 GMT

KPMG Capital Advisory Q3 2014 Credit Markets Update

Get insight into credit market activity July - September 2014, including a general overview, trends, pricing, and structures from KPMG Corporate Finance LLC.
Advisory Institute Mon, 13 Oct 2014 00:00:00 GMT
16 - 30 of 5206 Results: