Over 20 years of experience delivering transformative results.
Kuma is a global privacy and security consulting company. We pride ourselves on bringing progressive best practices for optimal success to every client, staffing each project with senior-level resources, and delivering influential thought leadership through strong industry relationships and quality partnerships.
Kuma has successfully delivered projects across numerous markets, including federal, state and local, commercial, and international sectors offering a wide range of services grounded in the governmental security and privacy standards of our client’s jurisdiction.
Our Services test
Strategy and Program Development
An Important First Step in Transitioning Your Organization to a World Class Privacy and Security Model
Kuma has the credentials and expertise to help you develop a best of breed privacy and security program and make a deliberate commitment to security and privacy excellence.
Privacy, Security and Identity
Better Decisions Means Better Outcomes
Kuma will work with you to conduct privacy risk assessments for your organization, programs, and technological solutions and provide insight into privacy implications for individuals and the organization, offering the opportunity to make risk-informed decisions.
Incident Response Management
Don’t Wait Until Data Gets into the Wrong Hands to Act
Kuma offers unparalleled expertise to guide an organization through a methodical organizational plan for the prevention of, planning for, and readiness to react to an unauthorized acquisition of data that compromises the security, confidentiality or integrity of personal information collected, processed, stored, transferred or disposed of by the organization.
Training and Awareness
A Major Determinant of Success for Your Security and Privacy Program
Developing a sound security and privacy program is a crucial step in establishing a culture of privacy and mitigating harmful and costly risks. Without company-wide training and awareness, you run the risk of low levels of stakeholder adoption and insufficient understanding of its importance. We’ve taken our personalized approach to security and privacy risk management and applied it to trainings, offering easy-to-implement training packages for your team. Fully customized to your needs and the issues of your industry, our training provides lasting education and a better value for your money than regular e-learning. Visit the Training page to sign up.
Forging the Path to a Secure Environment: Key Steps for Scaling Organizations
As a small business or a startup, approaching security within your burgeoning company can seem overwhelming. On the journey to this point, you’ve probably come to know what security controls should be in place in some areas, you might know what security controls would be best practices, and you actually know that along the way, you kept a list of where your company is vulnerable. With that information at the ready, the questions are now: Where do I start? How intensely should I be addressing these issues? How do I create a timetable that will balance my resources with my risk?
What is IAL2? Digesting the Alphabet Soup of Identity in Healthcare
With the annual Civitas Conference fast approaching, and compliance always on the minds of many of the attendees, now is an appropriate time to discuss the alphabet soup of identity terms thrown around the healthcare industry. Rest assured, I am not going to cover HIPAA since this audience knows HIPAA has two “A’s” and not two “P’s.”
Starting Strong: How to Best Embark on Your Cybersecurity Journey
Most companies struggle when trying to identify a way to begin their cyber security efforts. Do we start with a tool? Or do we increase security expertise across the team? Finding the right way to begin our journey towards security can be intimidating at first, but once broken down into smaller steps, we begin to see that it’s far more approachable than we thought.