Greg Bell

Opinions expressed by ICN authors are their own.

Greg Bell is a principal in the Atlanta office of KPMG’s Advisory Services Practice and serves as KPMG’s Service leader for Information Protection (Security, Privacy and Continuity) practice. With more than 25 years’ experience he is versed in various areas of Information Management and Information Security with particular specialization in the fields of IT risk management and business enablement.

Greg is a trusted business advisor helping leading companies protect their critical business information by helping to align their most important business processes with supporting technologies and foundational risk management elements. He has a strong background in complex business processes, distributed enterprise systems, and information risk management techniques. He has extensive knowledge and experience managing complex projects implementing, administrating and securing complex client-server and heterogeneous network technologies.

The opinions expressed in this blog are those of Greg Bell and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Making cybersecurity a priority in mergers and acquisitions: integration

Making cybersecurity a priority in mergers and acquisitions: due diligence

Making cybersecurity a priority in mergers and acquisitions: due diligence

In mergers and acquisitions (M&A), buyers must perform due diligence with a rigorous cybersecurity assessment, to make sure the companies get the value they are paying for. Before pursuing a divestiture or sale, sellers also should...

Guarding against fraud in the age of social sharing

Guarding against fraud in the age of social sharing

CIOs need to be cognizant of how their executives utilize social media and wearables as bad actors are using the information learned from these channels to create sophisticated fraud schemes.

Keeping out bad actors: Why healthcare CIOs need to be more concerned about securing customer data

Keeping out bad actors: Why healthcare CIOs need to be more concerned about securing customer data

There is a set of data almost all people maintain and is 10 times more valuable to hackers on the Dark Web than credit card numbers: Your healthcare record.

Load More