It is no longer news that we are in the digital age; advancement in digital technology is enabling business innovations and agility across the world.
It is no longer news that we are in the digital age
It is no longer news that we are in the digital age; advancement in digital technology is enabling business innovations and agility across the world. The business ecosystem is rapidly evolving in response to the convergence of digital. However, the digital evolution has introduced a new dimension to enterprise risk: The Cyber Risk. However, cyber risk is not conventional, neither are the threat actors.
Many businesses often find that it is not the technology that led to a security incident. It is the fact that employees were not trained or made aware of the need to protect their company’s data and how to do it. High profile cases of data loss and increasing cyber attacks are making it more important than ever to get the basics right.
Many organisations often race to implement new technologies in an effort to solve a basic business problem but leave their people out of the loop. Once people understand the importance of controls and have the power to act, they can transform from being a risk to the first line of defence. KPMG's Cyber Academy has been created as a leading-edge centre for bespoke cyber earning. The academy offers a blended framework of e-learning, virtual classrooms and workshop-based face-to-face training.
The challenge for organisations is that cyber threats are increasingly complex, cross-border in nature, fast moving and difficult to keep pace with. Moreover, most issues playing out in public often don’t reflect what people see day to day.
We can help you define the security role profiles for your organisation as well as build cyber competence across various levels. We can do this by reviewing your processes to direct and guide people on what cyber competency development.
|C-Suite||A phased approach to give board members and top management a clear insight to understand cyber risk and what it means for their organisation. To support boards and top management in answering key questions and defining the organisation’s future stance in dealing with emerging threats.|
|Cyber Specialists||Next are your information security professionals. Cyber defence, vulnerability managers, pen testers, risk, controls and compliance teams. The training is specialised and targeted to expertise in these roles.|
|IT Professionals||Following the specialists are key IT roles. People who have a huge impact on security but are not necessarily career security professionals. Training is varied and needs to be embedded at a specialised level.|
|End Users||Finally, we have those who use the systems but are not accountable for security. Training is focused on influencing behaviour and increasing awareness around the value of, and threats to an individual’s and organisation’s information.|