Technology Based Fraud Awareness Show KPMG .pdf
Original filename: Technology-Based Fraud Awareness Show KPMG.pdf
Title: Slide 1
This PDF 1.5 document has been generated by MicrosoftÂ® PowerPointÂ® 2013, and has been sent on pdf-archive.com on 16/05/2017 at 17:48, from IP address 213.194.x.x.
The current document download page has been viewed 253 times.
File size: 597 KB (2 pages).
Privacy: public file
Download original PDF file
Technology-Based Fraud Awareness Show KPMG.pdf (PDF, 597 KB)
Share on social networks
Link to this file download page
What do you get?
Not another boring
course but a highly
engaging training to
improve the awareness
level of your employees
towards technologybased external fraud risks.
With use of impactful reallife case studies and
optional simulations we
vulnerability in order to
show how easily it can go
We provide effective tips
and guidance to mitigate
the risk of external
Useful tips and guidance
to identify new types of
The show enables you
to train groups up to
100 participants per
event making the
required investment per
employee very cost
Technology-based Fraud Awareness Training
T: +31(0)70 338 2138
T: +31(0)20 656 8610
T: +31(0)20 656 7032
De in dit document vervatte informatie is van algemene aard en is niet toegespitst op de specifieke omstandigheden van een bepaalde persoon of entiteit.Wij streven
ernaar juiste en tijdige informatie te verstrekken. Wij kunnen echter geen garantie geven dat dergelijke informatie op de datum waarop zij wordt ontvangen nog juist is of
in de toekomst blijft. Daarom adviseren wij u op grond van deze informatie geen beslissingen te nemen behoudens op grond van advies van deskundigen na een
grondig onderzoek van de desbetreffende situatie.
© 2017 KPMG Advisory N.V., ingeschreven bij het handelsregister in Nederland onder nummer 33263682, is lid van het KPMG-netwerk van zelfstandige
ondernemingen die verbonden zijn aan KPMG International Cooperative (‘KPMG International’), een Zwitserse entiteit. Alle rechten voorbehouden.
The Fraud Show
Technology-based fraud has increased exponentially due to our augmented reliance
on information technology. Social engineers are becoming more professional and
convincing as a result of which they are able to steal millions relatively easily, with
or without your (employees) help. Many organisations are aware of this emerging
and growing threat but aren't necessarily doing much about it. However, a solution is
at hand, based on real-life cases: Technology based Fraud Awareness Training.
A significant amount of time and money
Fraudsters have therefore come to
In the training course we explain the
has been invested in making systems
realize that targeting employees, who
risks of social engineering arising from
secure in order to mitigate the risk of
are involved in key processes within
personal exposure of your employees
fraud. However, the effective security of
organisations, can offer them great
on the internet and provide them with
any system is primarily influenced by
effective tips and guidance to manage
the human component, which is
these risks. This is all done based on
therefore considered to be the weakest
Too many organisations have
link. Fraudsters are aware of this and
unfortunately already experienced this
abuse it increasingly through social
type of technology-based fraud and
This is not another boring PowerPoint
have come to realize adequate
training course but an interactive
engineering is the CEO fraud, where a
measures are required. We have
gameshow that will include everyone.
fraudster convincingly poses as the
assisted organisations in investigating
Consistent feedback from participants is
CEO of a certain organisation and
the incident itself and also educating
that this course is a real eye-opener,
their employees to prevent similar
controls to make large unlawful
situations from occuring again.
the fraud show
The fraudshow is modelled around
A safe targeted social engineering attack
In an auditorium or theatre-sized room, a
various trending topics in the external
is performed on the client. The
game show format is set up, specifically
technology-based fraud domain. First of
organization will not be at risk at any
designed for this purpose. Music, video
all we brainstorm together with our
point. This attack will not focus on
and sound effects will be combined to
clients on the required content. We
technological flaws but on human
create a fast-paced interactive
include real-life case studies with respect
susceptibility to social engineering, such
environment. Participants will be grouped
to technology-based fraud, social
in teams to compete with each other
engineering and cybercrime. We
― How well do employees handle
combine our knowledge and experience,
engineering. A good example of social
overrides the organisations' internal
memorable and useful.
in order to reach a tailormade set of case
studies, red flags, rules of conduct and
crafty social engineering attempt?
results of the simulated social engineering
― How many employees connect our
fake USB stick to their work
machines and what happens when
Participants from the audience will be
chosen at random to provide insights or
Typically the fraudshow will include:
― Disconcerting real-life cases and
― Do employees click on a link in a
sophisticated phishing email? What
share their opinion in support of the
facts that participants will not easily
is the impact of clicking? Do they
report it when they do recognize it
The finale of the show will include
as a phishing email?
participation from the entire audience.
within the organization. Actual
statistics on exposure to social
this course is a real eye-opener…”
around the tailored content and the
best practices, which are then used in a
― Recent incidents that occurred
“This is not another boring PowerPoint training but an interactive gameshow…
through a set of challanging questions
USB sticks, phishing emails or a
― How do employees deal with calls
engineering attacks, fraud losses
and possible insufficient controls.
― Real-life corporate intelligence
gathering with respect to key
Resulting ultimately in one winner.
and requests from third parties?
To cover all required departments and
This simulation provides useful insights
employees at risk, we perform multiple
into the organisation's resilience with
customised shows. After each show, we
respect to potential threats.
evaluate the impact and level of
employees, which will increase
awareness together and discuss if any
awareness of the potential impact.
changes are required.
Link to this page
Use the permanent link to the download page to share your document on Facebook, Twitter, LinkedIn, or directly with a contact by e-Mail, Messenger, Whatsapp, Line..
Use the short link to share your document on Twitter or by text message (SMS)
Copy the following HTML code to share your document on a Website or Blog