Explore eight key cyber security considerations - supported by practical recommendations for people, processes, data and technology, and regulations - with a focus on transforming risk into opportunity.
The role of the Chief Information Security Officer (CISO) is that of a proactive business partner – integral to mitigating risk, driving business growth and building resilience.
This year’s Cyber security considerations report shares practical recommendations for cyber and risk leaders as they seek to accelerate recovery times and reduce the impact of incidents on employees, customers and partners in 2024 and beyond.
From strengthening the cyber security and ESG connection to developing new approaches to digital identity and deepfakes, the report provides organisations and leaders with a comprehensive blueprint for forward-thinking security plans that enable business rather than expose it.
Download the report
Discover how you can transform risk into opportunity

Explore eight key cyber security trends
All stakeholders – customers, employees and suppliers – expect businesses to operate in socially responsible ways. Organisations can provide greater transparency by strengthening the connection between security and privacy and environmental, social and governance (ESG) factors.
With cyber security now part of every function, organisations can embed a security mindset across culture and processes to drive operational excellence.
In an increasingly borderless marketplace, organisations should consider calibrating their regulatory reporting to meet local cyber security and privacy requirements and be prepared for geopolitical changes and sanctions.
Traditional third-party and supply chain security models do not reflect today’s interfaces and processes with complex software-as-a-service dependencies. Organisations should consider strategic partnerships for the continuous monitoring of suppliers’ evolving risk profiles.
Organisations should consider establishing risk management and governance frameworks that address the security, privacy and ethical implications of implementing artificial intelligence (AI) solutions.
With cyberattacks and triage events growing, automation can manage the volumes and speed required to collect, correlate and escalate the signals that require a response.
As digital identity in cyber security evolves, identity and access management (IAM) models should be reconceptualised for interoperability within federated environments. With deepfakes becoming more common, complacency is not an option.
Although external threats can’t be controlled, organisations can control their preparedness by building resilience that aligns seamlessly with cyber security, emphasising protection, detection, rapid response and recovery.
KPMG's cyber security solutions
With innovative cyber security capabilities and solutions, continuous monitoring, and technical expertise, KPMG can help you protect and build your business.
KPMG's specialist cyber team
Danny Flint
Partner, Cyber Security - Digital trust and Identity & Access Management Lead
KPMG Australia
- Item 1
- Item 2
- item 4
- Item 3