CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World

Similar documents
Cyber Security. It s not just about technology. May 2017

The GDPR Are you ready?

Testers vs Writers: Pen tests Quality in Assurance Projects. 10 November Defcamp7

A new approach to Cyber Security

Security Hygiene. Be in a defensible position. Be cyber resilient. November 8 th, 2017

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Physical security advisory services Securing your organisation s future

BHConsulting. Your trusted cybersecurity partner

Cyber security and awareness for non-financial services. 24/25 May 2017

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

2016 KPMG AS, a Norwegian limited liability company and a member firm of the KPMG network of independent member firms affiliated with KPMG

Cybersecurity Protecting your crown jewels

Securing Your Digital Transformation

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

BHConsulting. Your trusted cybersecurity partner

TRUE SECURITY-AS-A-SERVICE

How to avoid storms in the cloud. The Australian experience and global trends

EU General Data Protection Regulation (GDPR) Achieving compliance

locuz.com SOC Services

Cybersecurity Auditing in an Unsecure World

CYBER RESILIENCE & INCIDENT RESPONSE

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Big data privacy in Australia

CYBER INSURANCE: MANAGING THE RISK

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

Cyber Risk Services Going beyond limits

Leadership. 25 years leading in cyber. 165,000 trained since ,000+ students annually

Risk Advisory Academy Training Brochure

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB

Cyber Resilience - Protecting your Business 1

Cybersecurity Session IIA Conference 2018

IT Consulting and Implementation Services

How Secure is Blockchain? June 6 th, 2017

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

SFC strengthens internet trading regulatory controls

CYBER SECURITY TRAINING

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles

A Global Look at IT Audit Best Practices

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

What Directors and C-Suite professionals need to know kpmg.ca/insuranceconference2017

THE CYBER SECURITY PLAYBOOKECTOR SHOULD KNOW BEFPRE, DURING & AFTER WHAT EVERY DIRECTOR SHOULD KNOW BEFORE, DURING AND AFTER AN ATTACK

Information Technology

Clarity on Cyber Security. Media conference 29 May 2018

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

January 25, Digital Governments. From KPMG s Harvey Nash survey to a future of opportunities

Incident Response. Tony Drewitt Head of Consultancy IT Governance Ltd

Governing cyber security risk: It s time to take it seriously Seven principles for Boards and Investors

Cybersecurity Fortification Initiative (CFI) infrastructure whitepaper

E-guide Getting your CISSP Certification

Helping you understand the impact of GDPR.

Survey - Governance, Risk and Compliance

Ahead of the next curve

Cyber Risks in the Boardroom Conference

Better together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com

Implementation Strategy for Cybersecurity Workshop ITU 2016

Never a dull moment. Media Conference «Clarity on Cyber Security» 24 May 2016

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Changing the Game: An HPR Approach to Cyber CRM007

Certified Information Security Manager (CISM) Course Overview

The Impact of Cybersecurity, Data Privacy and Social Media

Cyber Security Congress 2017

Cyber Security: It s all about TRUST

Must Have Items for Your Cybersecurity or IT Budget in 2018

SWIFT Customer Security Programme

Sage Data Security Services Directory

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

Trustworthy & Innovative Advice Confidis Advisory Services Private Limited. All rights reserved.

BRING EXPERT TRAINING TO YOUR WORKPLACE.

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

Protecting your data. EY s approach to data privacy and information security

Strengthening Capacity in Cyber Talent sans.org/cybertalent

Cyber Security. Building and assuring defence in depth

Certified information Systems Security Professional(CISSP) Bootcamp

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Strengthening your fraud and cyber-crime protection controls. March 2017

Cybersecurity: Pre-Breach Preparedness and Post-Breach Duties

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

Digital Health Cyber Security Centre

Cyber Resilience. Think18. Felicity March IBM Corporation

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

Cyber Resilience: Developing a Shared Culture. Sponsor Guide

Data Sheet The PCI DSS

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions

Symantec Security Monitoring Services

Sense of Security. Compliance, Protection and Business Confidence

Computer Information Science xxx

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

INTELLIGENCE DRIVEN GRC FOR SECURITY

Continuous protection to reduce risk and maintain production availability

NY State s Cybersecurity Legislation Requirements for Risk Management, Security of Applications, and the Appointed CISO

Bradford J. Willke. 19 September 2007

Transcription:

CYBER CAMPUS THE CYBER SCHOOL FOR THE REAL WORLD. KPMG BUSINESS SCHOOL The Business School for the Real World

In the real world, cyber security applies to all: large firms and small companies, tech experts, secretaries & CEOs. That s why we ve created ASIA S FIRST KPMG CYBER CAMPUS to provide professional cyber training for all.

1

KNOW WHAT MATTERS IN CYBER SECURITY with one of Asia s most comprehensive range of cyber courses. PROTECT Develop your cyber security protection 2 Preparation begins with governance and proper organization Learn to install and implement fundamental measures on people, processes and technology Identify cyber risks, understand cyber insurance, master personal data protection and learn about the latest cyber security trends PREVENT Develop your cyber security awareness Prevention starts with proper protection and solid detection Learn to monitor and investigate incidents by correlating information from various data sources Master data protection, loss prevention, network security, cloud computing, BYOD, computer forensic, vulnerability assessment and penetration testing PREVAIL Develop your cyber security resilience Recovery starts with a strong response right after an incident Learn to detect threats, act on them and respond in real time Master breach reporting, incident response, crisis management, business continuity and system resiliency

3

MASTER EVERYTHING CYBER CYBER RISK CYBER FORENSIC CYBER WAR GAMING Technology and Cyber Risk Management Vendor and Outsourcing Risk Management Software Asset Management and Software Licensing Data Protection and Loss Prevention Cryptography and Key Management Incident and Crisis Management: Key Lessons and Tools for Business Leaders Internet Investigation Computer Forensic Personal Screening and The Insider Threat Forensic Log Analysis Malware Analysis Advanced Windows Forensic Introduction to Red-Teaming Red Teaming Blue/Purple Teaming Red vs. Blue Team Training Boardroom Incident Response 4

CYBER RISK Learn to manage and cover your risk. Our trainers are all cyber security experts and part of KPMG s more than 100-strong cyber security team in Singapore, the biggest group in ASEAN. CYBER FORENSIC Equip yourself with investigative skills. Our courses tap on KPMG s extensive hands on experience in carrying out thousands of forensic investigations worldwide. CYBER WAR GAMING Train in real time against cyber attacks. Our cyber range generates cyber attacks in real time against a simulation of your network so you can test your IT systems and train your people. 5

TRAIN IN OUR CYBER DOJO A state-of-the-art facility designed specifically for high-end simulation such as blue vs. red war gaming. BLUE ROOM RED ROOM 6

WHY TRAIN WITH US COURSES FOR ALL LEVELS From awareness training for CEOs to very advanced programs for IT geeks, we have a course for anyone who needs to understand or master anything cyber. CUSTOMIZED TRAINING Our dedicated cyber team can tailor training programs and their delivery based on your company s unique needs. EXPERT TRAINERS Our trainers are all cyber security experts and practitioners who are in the trenches day-in, day-out, working for our clients. LATEST TECHNOLOGY Our cyber range brings together the latest hardware, software and threats database to ensure that all our training is up to date and directly applicable in the real world. DEDICATED FACILITIES KPMG Business School has set up a state-of-the-art campus facility specially dedicated to cyber training. VENDOR NEUTRAL You can be assured that we will objectively advise you on the best cyber practices, tools and services based on your needs. 7

BECOME CYBER CONFIDENT with our Cyber Experts from KPMG DARYL PEREIRA Partner Head of Cyber Security Management Consulting Daryl has over 20 years of experience in global and regional leadership IT roles, and currently leads a team in cyber security, cyber incident response, IT risk management & regulatory compliance, business resilience and IT transformation. EDDIE TOH Partner Forensic Risk Consulting Forensic technology lead for KPMG ASPAC leading a team of more than 60 forensic technology professionals. More than 12 years of forensic technology experience in KPMG and eight years with the Singapore Police Force. 8 RAJNISH KAPUR Director Cyber Security Management Consulting Rajnish has over 16 years of experience in helping organisations manage information security with a focus on governance, risk & vulnerability management. He has successfully led global and regional security projects for major clients in various sectors. CHUA ZONG FU Director Forensic Risk Consulting Zong Fu has over 10 years of experience in cyber security investigations, incident response, forensic and malware reverse engineering, and is one of the first few personnel in Singapore to receive the prestigious GIAC Security Expert certification.

ANDREW KOH Partner Head of Digital Trust Management Consulting With more than 20 years of combined accounting, audit and advisory experience, Andrew specialises in IT assurance & security, internal audit, project assurance, IT attestation and data analytics. LEE SER YEN Director Cyber Security Management Consulting Ser Yen has more than 15 years of experience in IT security solution architecture and design. He has led the development of information security products and solutions that have successfully met stringent government and defence requirements. WENDY LIM Director Cyber Security Management Consulting Service line lead for the Technology Risk Management and Outsourcing team, Wendy has more than 11 years experience in IT governance, IT & operational risk management and IT assurance. TERENCE WEE Director, KPMG Business School Solutions architect and project lead to create and implement KPMG s multi- million dollar cyber range, Terence has more than 10 years experience successfully leading critical IT system implementations.

KNOW WHAT MATTERS IN CYBER SECURITY WITH KPMG BUSINESS SCHOOL Lim Kim Hwee Director, KPMG Business School Email: kimhweelim@kpmg.com.sg KPMG Services Pte. Ltd. 16 Raffles Quay, #22-00, Hong Leong Building, Singapore 048581 Tel: +65 6213 3388 For more information, please contact us at: businessschool@kpmg.com.sg or visit kpmg.com.sg/businessschool 2018 KPMG Services Pte. Ltd. (Registration No: 200003956G), a Singapore incorporated company and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ( KPMG International ), a Swiss entity. All rights reserved. Printed in Singapore. The information contained herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavour to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation. The KPMG name and logo are registered trademarks or trademarks of KPMG International. KPMG BUSINESS SCHOOL The Business School for the Real World