This site uses cookies to store information on your computer. Some are essential to make our site work; others help us improve the user experience. By using the site, you consent to the placement of these cookies. Read our privacy policy to learn more.


About this topic

Based on the CGMA Competency Framework, these resources allow you to focus on technical, business, people, leadership, and digital skills. All areas are underpinned by the need for ethics, integrity and professionalism. Log in and start learning today.

Manage your CPD record here.

Assess your skills

Take a self-assessment to evaluate your skills and find related learning activities.

Get started

A Deep Dive into Cyber Risk Assessments

What accountants need to know about cyber security.

Audio Cybersecurity Foundational

Smishing: what you need to know

The latest cyberscams to watch out for, and how you and your company can disrupt them right back.

Audio Cybersecurity Foundational

Why Your Business WANTS To Be Hacked

Audio Cybersecurity Foundational

Cybersecurity and Promoting Risk Awareness

Practical, sensible, and crucial: we share the building blocks of better security across your organisation.

Audio Cybersecurity Foundational

Building a Security Mindset

Start building a security culture.

Audio Cybersecurity Foundational

Best practices to improve cybersecurity

This article discusses how to prepare for, manage, and recover from a cyberattack.

Article Cybersecurity Intermediate

7 Benefits of Cybersecurity Penetration Testing

This blog post shares seven benefits of this type of vulnerability assessment.

Article Governance Foundational

How to be street smart when budgeting for security

This article provides 5 tips which will help organizations fit security spending into their budgets in a balanced way.

Article Information systems environment Foundational

Phishing Scams Target Tax Professionals

As cybercriminals become more sophisticated tax practitioners should take a number of steps to protect themselves and their clients. This article explains what to do.

Article Practice management & professional standards Foundational

3 Steps to Mitigate and Respond to a Security Breach in the Cloud

This blog post presents three steps to take to address cloud computing security.

Article Information security & privacy Intermediate

5 Low- or No-Cost Ways for CPAs to Help Slam the Door on Cybercriminals

Cybersecurity is costly, and budgets are always limited This blog post discusses five simple steps CPAs can take to help protect data without breaking the bank.

Article Information security & privacy Intermediate

Technology risk: It’s more than cybersecurity

This column discusses the “silent killers” of technology risk that organizations must master to protect their business.

Article IT risk & assurance services Intermediate