Greg.Bell

Contributor

Greg Bell is a principal in the Atlanta office of KPMG’s Advisory Services Practice and serves as KPMG’s Service leader for Information Protection (Security, Privacy and Continuity) practice. With more than 25 years’ experience he is versed in various areas of Information Management and Information Security with particular specialization in the fields of IT risk management and business enablement.

Greg is a trusted business advisor helping leading companies protect their critical business information by helping to align their most important business processes with supporting technologies and foundational risk management elements. He has a strong background in complex business processes, distributed enterprise systems, and information risk management techniques. He has extensive knowledge and experience managing complex projects implementing, administrating and securing complex client-server and heterogeneous network technologies.

The opinions expressed in this blog are those of Greg Bell and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Articles by Greg.Bell

Making cybersecurity a priority in mergers and acquisitions: integration
The CIO Advisor

Making cybersecurity a priority in mergers and acquisitions: integration

In mergers and acquisitions (M&A), companies need to reconcile all of their separate components as part of their 100-day plan for integration: not only different enterprise resource planning (ERP), human resources (HR) and other systems, but also the way security is managed in a cohesive way between the two legacy companies, including governance, processes, resources and systems. To keep data safe, a buyer’s first task is almost invariably the normalization of divergent security systems.
August 15, 2016
Making cybersecurity a priority in mergers and acquisitions: due diligence
The CIO Advisor

Making cybersecurity a priority in mergers and acquisitions: due diligence

In mergers and acquisitions (M&A), buyers must perform due diligence with a rigorous cybersecurity assessment, to make sure the companies get the value they are paying for. Before pursuing a divestiture or sale, sellers also should examine cybersecurity practices to help reduce time and costs, avoid surprises and sweeten deals.
August 8, 2016
Guarding against fraud in the age of social sharing
The CIO Advisor

Guarding against fraud in the age of social sharing

CIOs need to be cognizant of how their executives utilize social media and wearables as bad actors are using the information learned from these channels to create sophisticated fraud schemes.
February 18, 2016