Phishing attacks exploit the weakest link in the chain – employees of the organisation. No matter how advanced your cyber security rules and regulations are, there is no perfect way to ensure that the rules are followed. To enhance the development of modern, digitally transformed organisations, KPMG provides know-how on what to expect from phishing attacks and how to build countermeasures and a cyber resilient organisation.
1 day of classroom training
Secure development: from hackers to developers is a one-day in-depth course using the CTF-like platform OWASP Dojo, which helps developers gain a deeper understanding of how hackers break their code. The course focuses on best practices in secure development to raise awareness of development vulnerabilities which may result in potential security gaps.
4 hours of classroom training + 4 hours of practical work
The basics of open-source intelligence (OSINT) is a one-day in-depth course into the world of OSINT. The course shows how hackers use publicly available information to plan and carry out cyber-attacks.
4 hours of classroom training + 4 hours of practical work
KPMG’s web application security masterclass provides an inside view of a pen-tester’s mindset. Learn how to break into your system in order to know how to improve its security. KPMG’s cyber experts showcase what they have learned in private and public sector organisations.
4 days of classroom training and practical work
The workshop is highly practical and scenario-based. Ideal for cyber security professionals who want to understand how to exploit vulnerabilities in an IT system step by step. We will look at case studies and discuss motivations and mindset, attack vectors, countermeasures, best practices, tools and methodologies.
12 hours of classroom training + 4 hours of practical work
Provide a safe and sustainable business environment for your company! We will help you build a resilient and reliable digital world, even in the face of changing threats.
HR assessment focuses on mapping the skills and increasing the competencies of the weakest link in cyber security: the users, the employees.
Threat assessment is a tactical and technical service that allows a company to get a quick overview of external threats.
Maturity assessment helps plan IT investments and design further steps to mitigate vulnerabilities and ensure better security.