Increased security is the obvious reason why all businesses, big or small, should have employees of all levels learn the importance of protecting themselves and the company from "human exploits" and cyber-attacks. Many compliance regulations such as ISO, HIPAA, PCI, SOX, GDPR, and even some local regulations require cybersecurity training for all employees.
The course aims to raise awareness about information security, good information security practices, and related policy in order to help prevent unintentional compromises of sensitive information and computing systems.
By the end of this course, attendees will:
1/2 day
Classroom / Virtual
Data privacy and data protection have become front-and-center issues around the world, as individuals demand more control of their personal information, and organisations face greater information security threats and risks. And with more people working remotely, it’s more critical than ever to ensure that employees understand the rules and guidelines for using and protecting data and avoiding costly data breaches. Information security focuses on keeping all kinds of nonpublic information and systems safe. The consequences for data breaches, mishandling personal information and violating data privacy laws are serious and can involve fines, damage to an organisation’s reputation and loss of customer trust.
The course aims to teach:
By the end of the course, attendees will:
1 day
Classroom / Virtual
The success of an audit project is usually measured by its primary output: the internal audit report. Hence, it is essential that the report is easy to read, compelling and authoritative. If the report influences a reader to think differently or take action, it has met its purpose.
This programme will help internal auditors learn what goes into an effective audit observation and how to organise reports that meet professional standards, elicit management action, and communicate crucial messages to auditee, senior and executive management and board-level readers. Participants will learn to produce reports that have impact and add value to the decision making within their organisation.
By the end of this course, participants will be able to:
Agenda
1 day
Classroom / Virtual
Today’s business world is constantly changing - it is unpredictable, volatile, and seems to become more complex every day. By its very nature, it is fraught with risk. Enterprise Risk Management is a comprehensive, systematic approach for helping the organisation to identify, measure, prioritise and respond to the risks challenging its most critical objectives and related projects, initiatives and day-to-day operating practices.
This workshop is designed to help participants to:
By the end of this course, participants will:
Agenda
1/2 day
Classroom / Virtual
All internal audit professionals need to understand the background, standards, frameworks and leading practices in Internal Audit. This is fundamental to the success of any internal audit professional.
The course covers the fundamentals and building blocks for the internal audit profession including key definitions, professional background and code of ethical conduct, international internal audit standards and leading risk and control frameworks such as COSO.
By the end of this course, participants will:
2 days
Classroom / Virtual
Knowledge of and compliance with data security standards can bring major benefits to your business, while failure to comply can have serious and long-term negative consequences. This course outlines the challenges surrounding payment card security and explains what the PCI Standards do to mitigate these issues.
The course will teach:
By the end of the course, attendees will be able to:
1/2 day
Classroom / Virtual
An ISAE 3402/3000 (SOC 1/2) audit report provides detailed information and assurance about a service organisation’s internal controls based on their compliance with the ISAE (International Standard on Assurance Engagements) standards.
SOC 1 audits, which relate to organisations’ ICFR (internal control over financial reporting), are conducted against the assurance standards ISAE 3402.
SOC 2 audits, which are essential in regulatory oversight, vendor management programmes, internal governance and risk management, are conducted against the assurance standards ISAE 3000. It focuses on security, availability, processing integrity, confidentiality and/or privacy controls.
The course aims to provide:
By the end of the course, attendees will be able to:
Agenda
1 day
Classroom / Virtual
Risk assessments are one of the most important parts of an organisation’s ISO 27001 compliance project. ISO 27001 requires organisations to demonstrate evidence of information security risk management, risk actions taken and how relevant controls have been applied.
The course will:
By the end of the course, attendees will understand:
1/2 day
Classroom / Virtual
This training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognised audit principles, procedures and techniques.
This course will:
By the end of this course, attendees will be able to:
1 day
Classroom / Virtual
This course will provide guidance on best practice for information security management to help you select, implement, and manage controls, policies, processes, procedures, and organisational structures’ roles and responsibilities.
The course will:
By the end of the course, attendees will:
1 day
Classroom / Virtual
Process mining and intelligence allows organisations to gather insights into their processes and controls to detect inefficiencies, overrides or non-compliance. The solution adopts a data analytics foundation to allow users to simulate their transactions for a duration to identify where variants occurred. Hence it allows users to identify root causes, determine where existing efficiencies can be utilised as well as improve their internal control environment or transform their business processes to optimise their efficiencies and controls.
This course aims to teach controls optimisation through data and process mining technology.
By the end of this course, attendees will understand how process mining can be utilised to support a client’s compliance, process improvement and audit reviews.
1/2 day
Classroom / Virtual
Unforeseen risks lead to many businesses including SMEs being badly affected, depending on which industry they are in. In ensuring business sustainability, productivity and employee’s employability, SMEs and their employees must consider action plans & initiatives which include managing the business finances effectively.
The course aims to provide SMEs better understanding of how to read and interpret financial terms presented and disclosed in a set of financial statements as well as how to analyse some of the common key financial performance ratios to be able to make informed business decisions. The course also covers cashflow management, investment appraisal and monitoring budgets.
By the end of this course, attendees will:
1/2 day
Classroom / Virtual
Today, effective internal auditing requires thorough planning coupled with nimble responsiveness to quickly changing risks. To add value and improve an organisation’s effectiveness, internal audit priorities should align with the organisation’s objectives and should address the risks with the greatest potential to affect the organisation’s ability to achieve those objectives.
This course provides participants with the knowledge to develop a risk-based internal audit plan. During this course, you will participate in interactive activities and real-life scenarios. Be prepared to walk away with concepts and tools to develop a value-added risk-based audit plan.
This course is also designed for senior internal audit practitioners who want to build on their knowledge and increase their value to the organisation by developing effective risk-based audit plans that address emerging risks.
By the end of this course, attendees will:
1 day
Classroom / Virtual
Security on the web is becoming an increasingly important topic for organisations to grasp. Recent years have seen the emergence of the hacktivist movement, the increasing sophistication of online career criminals and now the very real threat posed by nation states compromising personal and corporate security. The Open Web Application Security Project gives us the OWASP Top 10 to help guide the secure development of online applications and defend against these threats.
The course aims to:
By the end of the course, attendees will be able to:
3 days
Classroom (including hands-on labs)
To make better business decisions, C-Suite professionals and top managers need to raise their awareness of strategy.
This course aims to:
Outcome
By the end of this course, attendees will have:
Theories of Strategy:
2 days
Hybrid
In an increasingly interconnected world, it’s imperative for companies to rethink contingency planning. This programme will help participants understand the principle elements of great Business Continuity Management (“BCM”) and equip participants with skills and knowledge for Business Continuity Planning (“BCP”).
You will learn business planning methodologies, recovery strategies and how to apply the Business Continuity Management Framework to improve Business Continuity Planning.
Real-life case studies will be featured to give you a better understanding of the critical importance of Business Continuity Planning.
By the end of this course, participants will be able to:
1/2 day
Classroom / Virtual
Every organisation wants to move from being an industry player to an industry leader. The course enables the senior management of organisations to respond fundamentally to the key question on what it takes to surge ahead of their competition
Key Objective is to sensitise and orient senior management of companies on what the secret ingredient that enables this “surge” to happen is. How it happens, when it happens, and — keeping in mind that we don’t yet know what the full fallout from the coronavirus global health emergency will be — how organisations can position themselves for a surge
By the end of this course, attendees will:
1/2 day
Hybrid
A more integrated and connected business environment means more businesses outsource many of their activities and functions to third party However, the rise in security threats means all parties must provide a high degree of security and assurance over the controls, including third party providers.
Hence it is important that organisations should be aware of their responsibilities and obligations regarding third parties and the solutions available to handle them.
The course aims to:
By the end of this course, attendees will:
1/2 day
Classroom / Virtual
Keen to learn more about PwC's Academy? Click the button below to explore.