The Information Protection And Business Resilience Practice Of KPMG In The United Kingdom

Improved Essays
The Information Protection and Business Resilience practice of KPMG in the United Kingdom is currently the largest Information Security/Cybersecurity practice of all the “Big 4” in the country and is in the process of growing further, targeting a team size of 500 by Dec 20161. IPBR does not currently offer any services related to software assurance, the only notable exception being penetration testing, a service which applies to both applications as well as infrastructures.
This document will attempt to make a case for the establishment of a Software Assurance service line within IPBR, enumerate the potential services that the service line will offer, list the relevant competencies IPBR will need to develop, recommend a go‐to‐market strategy,
…show more content…
Although penetration testing is an
1 https://portal.ema.kworld.kpmg.com/Adv/SG02/go_itarc_lib/01/GlobalLeadershipPackMar14.pptx
Page 2 of 7 indispensable service that falls under the umbrella of software assurance, it is only one of the activities promoting software assurance. Penetration testing is a reactive service that has a number of limitations:  Can only reveal a subset of existing software defects (due to its time‐bound nature and the finite test cases that can be realistically tried during the course of the engagement)
 Will not reveal latent defects that a small configuration or code change can bring to the surface  Can only assess the security of the finished product, i.e. all development activity must be concluded before the software can be subjected; any defect identified will need to return the product to the phase the defect was introduced and continue the development process from there  Absence of evidence of defects during testing does not constitute conclusive proof of absence of defects
2.1.2.CESG CPA Test Lab
…show more content…
4.1.2.Competition3
In contrast to the overpopulated penetration testing market, the software assurance market is considerably less populated. In the UK software assurance services is provided by a small number of large vendors and system integrators (e.g. IBM, McAfee, CGI, etc.) and small information security consulting firms (e.g. Portcullis, Security Alliance, Pentest Limited, etc.). The perceived leader in the field is Cigital, one of the strong international names, with local presence in the UK.
4.1.3.Target Services
The entire range of Software Assurance service line services can be presented to clients who are interested in software assurance; some clients will have their own software development capabilities while others, who are purchasing critical applications, might retain IPBR to perform software assurance engagements to their software vendors as part of a system acquisition due diligence.
4.1.4.Target Customers
Again, due to the ubiquity of software, all IPBR clients are potential software assurance service customers. It is suggested that, initially, clients with which IPBR has a long‐standing and strong relationship be targeted first as the sales cycle shall be shorter and easier; these clients will

Related Documents

  • Decent Essays

    One of the primary responsibilities assigned to Ms. Pabbaraju will be to translate business requirements and functional specifications into program designs and code modules. Ms. Pabbaraju will design and develop new interfaces, modify existing interfaces, and configure existing Sterling interfaces and processes. This will ensure that Lowe’s systems have accurate and up-to-date customer order, payment processing, and inventory management information. Additionally, Ms. Pabbaraju will work closely with other business and IT partners within Lowe’s and external vendors to support Systems Integration Testing (SIT) and User Acceptance Testing (UAT) to ensure stable applications and quality software solutions. Ms. Pabbaraju wil be responsible for…

    • 252 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    7. Application Access Control Access to programming, framework utilities and project source libraries might be controlled and confined to those approved clients who have a sensible industry need frameworks or database administrators. Approval to utilize an application might rely on upon the accessibility of a permit from the supplier. Give security from unapproved access by any utility, OS software, and malicious programming that is equipped for bypassing framework or application controls.…

    • 118 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The business that I will use for my paper’s subject matter is a cabinet making company. Currently the company uses several business information systems. The corporation uses Peachtree accounting software, Microsoft Office for document publishing, an internally written MRP (material request planning), and Infinity QS systems for quality enhancement. All of these programs are currently running on the internal intranet but the systems do not communicate without cyborg intervention.…

    • 721 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 5

    • 1218 Words
    • 5 Pages

    In reviewing the current project and the deliverables intended, I make the following recommendations to address the issue of scope creep that the ABC Department has experienced on its current computer system upgrade project. Forthwith, a review of the initial impressions of the project scope, with input from all respective parties to include the CEO, Controller, Department Heads, and Amazing Software. By discussing and compiling everyone’s feedback into a cohesive outline of a Project Charter, once developed and edited, to then create a new Project Scope Document. Some recommended points of discussion are: 1. What is the purpose of the new computer system?…

    • 1218 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Hrm 531 Week 4 Paper

    • 570 Words
    • 3 Pages

    In 1996, the manufacture vice president Lucas Moore recommended that the company should purchase the Effective Management Systems, Inc. (EMS) the Time Critical Manufacturing package will operate on several of their systems. The initial startup cost of $220,000 up front and yearly maintenance contracts is available for $55,000 per year. Effective Management Systems, Inc. will provide a limited amount of personalized modifications to the software, and the company will pay $60 an hour for labor. Mr. Lucas pointed out that even though the company MIS department was designing their own system, it would take two years to acquire the system at a cost of $400,00 not taking into account that the parts and other components are not included in the price presented to them (Brown, DeHayes, Hoffer, Martin, & Perkins, 2012). Moore does not have a lot of experience in the manufacturing and was not employed at the company when they tried software implementation earlier, which did not meet the expectation the company expected company.…

    • 570 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 2 Case Analysis

    • 2280 Words
    • 10 Pages

    Question 1 a. The approach I would take to determine if it is more cost effective to produce firmware (HW/SW) units to determine economic feasibility for producing the units in-house sourcing or outsourcing by using cost-benefit analysis checklist that includes: • Consider all strategies for development. • Each alternative should have costs and benefits and identify when realization of cost and benefits will be ensued. • The analysis will include future growth to allow for scalability.…

    • 2280 Words
    • 10 Pages
    Great Essays
  • Decent Essays

    Is3350 Unit 1

    • 190 Words
    • 1 Pages

    1. Critically evaluate information gathered from multiple sources, reconcile conflicts, decompose high-level information into details, abstract up from low-level information to a general understanding, and distinguish user requests from the underlying true needs using tools such as Entity relationship diagram, Flow charts, workflow modelling. 2. Investigate and analyze business processes, organization & services. 3.…

    • 190 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Task 9 For this task I must compare the usefulness of maintaining a database with MySQL compared with if I were to use the query language (QBE). For this task I will need to evaluate the advantages for both the languages, as well as the disadvantages, to find a conclusion which is evenly presented for both of the languages. Advantages and Disadvantages Although the two languages interlink in many different ways they have many different features that must be noticed by the user before the use of either, these two tables show the brief comparisons that should be made before using either of the two languages. MySQL Advantages Disadvantages Point How it affects the user Point How it affects the user…

    • 1173 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    CIO Large health care organizations are in need of a CIO (chief information officer) to help to stay up to date on latest updates and making sure that everything is working properly. In the current organization of my employment I know we have one because it is a large facility and everything is done through electronic systems. CIO makes sure that IT support is performing their duties are they are assigned to and provide much needed help.…

    • 204 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    They cannot make a request without the capacity to increase individual contacts with the customer, and its offer may end satisfying the part as a method for expecting value-based clients for BAS (Book & Ship)…

    • 746 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Appendix B – BROS Information PURPOSE: The following provides information on the “BES Reliability Operating Services” (BROS) noted in this procedure and the CIP-002 standard. USAGE: BROS was introduced in the Guidance and Technical Basis section of the CIP-002 standard, and are based on the NERC Reliability Functional Model. The purpose of the BROS is to assist Responsible Entities (i.e. FPL) in the identification services essential to the reliable operation of the BES asset, and the Cyber Assets associated with those essential services.…

    • 1107 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Infosys Consulting in 2006: Leading the Next Generation of Business and Information Technology Consulting Dhinesh E -139278037 Holistic View The case is set in early 2006. An overview about the Information Technology (IT) services landscape is provided for this period.…

    • 1591 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Market Dojo Case Study

    • 1109 Words
    • 4 Pages

    MD’s software tool can as well maximize streams of revenue potential by venturing into immature markets of forward auction, their new credit system also helps them develop cash flows, their diversification in designing various market campaigns and developing add-ons for their software have all been assets too as well as purchase and adoption of software tool by purchasing consultancies and interims.…

    • 1109 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    2.2. PESTLE ANALYSIS 2.2.1. POLITICAL FACTORS Life insurance industry is affected by many political factors. In political sphere, hike in FDI limit up to 49 percent but, the Parliamentary Standing Committee on Finance has rejected foreign direct investment (FDI) to 49 per cent, in the Insurance Laws Bill (Amendment) 2008 (News, 2011).…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Hr Audit Paper

    • 1056 Words
    • 5 Pages

    HR Audit Strategic Management of Human Capital Jasmine Flores [Date Submitted] HR Audit Introduction Any organization faces an essential requirement to follow a certain number of rules, regulations, practices and other detailed procedures for staying on the path of success. For an organization to be successful, some of the most significant aspects which can assist it in relation to this include different instances of HR metrics. By following and monitoring significant HR metrics, a company can deal with issues effectively and raise the standards of its operations and outcomes in an informed manner.…

    • 1056 Words
    • 5 Pages
    Improved Essays