<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=705389681562533&amp;ev=PageView&amp;noscript=1">
whatsappChat

Technology Consulting Service

RSM Cyber2SME

Strengthen Cyber Resilience with RSM Cyber2SMETM


Resilient. Secured. Managed.

 
Building a resilient organisation requires more than just technology, it requires informed employees, tested response capabilities, and proactive risk management. 
 

The RSM Cyber2SME™ programme in partnership with IMDA, is designed to help organisations proactively close critical cybersecurity gaps through practical, hands-on initiatives including phishing simulation exercises, targeted employee cybersecurity awareness training, and incident response tabletop exercises.

These complimentary focused cyber resilience activities enable organisations to uncover hidden vulnerabilities, boost employee readiness, and strengthen the organisation’s overall cyber defence posture and recovery capability.

 

Digital_transformation_innovation

Enjoy these Complimentary Cyber2SME Services

Registration via IMDA's SMEs Go Digital platform. Terms apply. 

 
Laptop_phone_Icon_Blue

Phishing Simulation Exercise

Conduct one tailored phishing simulation exercise complimentary for up to 30 employees per company UEN and per email domain, inclusive of a 30-minute e-advisory and comprehensive performance report.

 
Light bulb_Brain_Icon_Blue

Cybersecurity, AI & Data Risk Awareness Training

2 hour cybersecurity awareness webinar training complimentary for up to 5 employees per company UEN, inclusive of a cybersecurity quiz and a certificate of participation. Entitled to ONE CPE training point.

Talking_Chat_Icon_Blue

Incident Response Tabletop Exercise

Complimentary half-day workshop for up to 5 employees per company UEN. Bundled with Managed Detection Response (MDR) solution for 5 users.

 
  • Phishing Simulation Exercise
  • Cybersecurity, AI & Data Risk Awareness Training
  • Incident Response Tabletop Exercise

Phishing Simulation Exercise

Simulate real-world attacks and train against social engineering attacks 

Conduct a low-risk, high-impact phishing drill that allows employees to identify and learn from mistakes in a controlled environment,  without real-world consequences such as data breaches or financial loss. This exercise also enables businesses to deliver targeted employee training and strengthen overall resilience against phishing attacks. 

 

  • Tailored, High Impact Assessment

    Design phishing scenarios, aligned with your industry's specific risks, to assess how well both management and employees can respond to phishing attempts.

     

  • Build Real-World Resilience

    Phishing simulation that mirrors the latest phishing tactics targeting businesses in your industry to uncover hidden vulnerabilities.

     

  • Actionable Insights and Expert Guidance

    Receive a detailed performance report with user click-through data, plus a 30-minute e-advisory session with our practitioners to reduce risk and improve your cyber baselines.

Cybersecurity, AI & Data Risk Awareness Training

Build a cyber-aware, AI-ready and data-responsible workforce 

Equip your employees with practical knowledge to identify, prevent, and respond to evolving cyber and data risks while promoting a culture of security awareness and compliance across your organisation. 
 
DO YOU KNOW? Annual employee training is recommended under the Personal Data Protection Act as a proactive measure to reduce data breaches. It may also reduce and compliance penalties if a breach occurs.

 

  • Prevent Costly Breaches & Disruptions

    Help employees identify and respond to evolving cyber threats, reducing the risk of data breaches and incidents caused by human ignorance and error.

     

  • Strengthen Data Protection and Compliance

    Support compliance with PDPA and internal policies while promoting secure data handling and responsible use of AI.

     

  • Security-First and Future-Ready Workforce

    Foster a culture of cybersecurity awareness and accountability by strengthen your first line of defence against emerging digital risks.

Incident Response Tabletop Exercise (TTX)

Build Confidence and Strengthen Business Continuity

This half-day, in-person workshop is a guided and scenario-based exercise where key stakeholders and response teams walk through simulated cyber incidents to assess and strengthen existing response plans, communication workflows, decision-making, and overall operational readiness.

While most organisations have incident response plans, they are often untested under real conditions, increasing the risk of operational or reputational impact during an actual crisis. 

 

**Bundled with Managed Detection Response (MDR) Solution - Subscription fee waived for 6 months for up to 5 users (worth up to $250). Implementation cost waived,  if installed MDR within the same month of attending tabletop exercise.

 

  • Build Real-World Preparedness 

    Test organisational readiness while identifying weaknesses in response plans, escalation paths, communication workflows, and recovery procedures

  • Strengthen Coordination & Compliance 

    Enhance collaboration across management, IT, cybersecurity, legal, HR, and communications teams while supporting regulatory compliance and governance

  • Build Resilience & Confidence 

    Hands-on experience managing cyber incidents in a controlled, low-risk environment improves business continuity and recovery readiness


 

RSM, Your Cyber Resilience Advisor 

RSM has been actively strengthening cybersecurity resilience among SMEs through advisory, education and managed security services.

RSM is also a Cyber Security Agency of Singapore (CSA) appointed CISO-as-a-Service (CISOaaS) consultant, giving SMEs access to dedicated cybersecurity resources to help them meet the Singapore standards, including achieving Cyber Essentials and Cyber Trust Mark certifications.

Cyber2SMETM  FAQ

1a. What is a phishing simulation and why is it important?

 

A phishing simulation is a controlled exercise where employees receive realistic mock phishing emails to test how they respond. It helps organisations identify vulnerabilities, raise awareness, and strengthen their human firewall, turning employees into an active first line of defence.

 

1b. What does the phishing simulation exercise include?

 

This complimentary phishing simulation exercise featuring a tailored, industry-specific scenario designed to assess your employee readiness and uncover hidden vulnerabilities. It includes 

  • A one-time phishing simulation exercise per UEN
  • Covers up to 30 employees per company for one email domain
  • One tailored phishing scenario aligned to your industry
  • 30-minute e-advisory session with performance report

 

2a. What is Cybersecurity, AI & Data Risk Awareness Training and why is it important?

 

This is a practical webinar, by RSM consultants, to equip your employees with the knowledge on cybersecurity, safe AI use, and data protection. It covers current threat trends, PDPA updates, and real-world scenarios, helping your employees to recognise, avoid, and respond to cyber risks effectively. Every participant is required to complete a quiz to validate the learning objectives and shall receive a certificate of attendance.

 

 

2b. What the Cybersecurity, AI & Data Risk Awareness Training cover?

 
  • Cyber Threat Landscape Awareness

    Employees gain an understanding of the latest cybersecurity threats impacting businesses today, including phishing, ransomware, social engineering, credential theft, malware, and insider threats. The training highlights how attackers exploit human behaviour and common workplace vulnerabilities.

 

  • AI Risk Awareness and Responsible Use
    With the growing use of generative AI and AI-powered tools in the workplace, employees learn how to safely and responsibly use AI technologies while understanding associated AI risks. Uncover practical guidelines for the secure adoption of AI within business environments.

 

  • PDPA and Data Protection Essentials 

    The training provides updates on key Personal Data Protection Act (PDPA) requirements and data protection responsibilities, helping employees understand the key obligations and business implications. Employees also learn how to reduce the risk of accidental data exposure and strengthen day-to-day data handling practices.

     

  • Emerging Technology and Business Risks 

    The programme covers evolving risks associated with modern technologies, cloud adoption, remote work environments, and digital collaboration platforms, helping employees stay informed about emerging attack vectors and security challenges.

     

  • Cyber Hygiene Best Practices 

    Participants are guided through practical cybersecurity habits, fundamental internal controls and IT governance measures that strengthen organisational resilience.

     

 

3a. What is Incident Response Tabletop Exercise and why is it important?

 

This is an in-person workshop featuring a guided data breach simulation where key stakeholders work through a “real-life” cyber incident to test their response plans, decision-making, communication and coordination. This helps uncover gaps before a real attack, improves response speed and communication, and strengthens overall preparedness, disaster recovery planning, and business continuity.

 

3b. What cyberattack scenarios are covered in the TTX exercise and who should participate?

 

Participants will be guided through any combination of the below cyberattack scenarios:

    • Ransomware attacks
    • Phishing and business email compromise
    • Data breaches and data leakage
    • Insider threats
    • System outages and operational disruptions
    • Third-party or supply chain incidents

 

The exercise is designed for management teams, IT personnel, cybersecurity teams, and key business stakeholders involved in incident response and decision-making.

During the session, participants will assess how the organisation detects, responds to, escalates, communicates, and recovers from a cyber incident based on existing policies, procedures, and business continuity plans.

 

3c. What if I cannot attend the upcoming TTX session date?

 

No problem. While our sessions are fixed, we conduct multiple runs of our TTX exercise. If you are unable to attend the upcoming session, you may join the next available run at a later date.

Should you be unable to attend due to work exigencies, do inform us at least 2 working days of your replacement. As each company UEN is entitled to 5 complimentary seats, we encourage you to plan your schedules carefully to fully utilise this entitlement after registration.

 

 

4. Are the RSM Cyber2SME activities really complimentary?

 

Yes. All three RSM Cyber2SMETM activities are fully complimentary for eligible SMEs under IMDA’s SMEs Go Digital programme, with no hidden fees for the supported number of employees under each activity.

As part of Singapore’s nationwide initiative to strengthen cybersecurity standards and improve cyber resilience among SMEs, IMDA has partnered with RSM to provide the following at no cost to eligible businesses:

  • Phishing Simulation Exercises
  • Cybersecurity, AI and Data Risk Awareness Training
  • Incident Response Tabletop Exercises

These activities are designed to help SMEs build stronger cyber awareness, improve preparedness against cyber threats, and enhance overall business resilience.

 

5. What are the key eligibility criteria for SMEs Go Digital programmes?

 

Key Eligibility Criteria for SMEs Go Digital programmes:

  • Business Registration: Must be registered and operating in Singapore.

  • Local Shareholding: At least 30% local equity held by Singaporeans and/or Singapore PRs 

  • Company Size: Group annual sales turnover < S$100 million OR group employment size < 200 employees.

     

 

 

How can we help?

Got questions regarding our RSM Cyber2SME programme? Complete this form and we will be in touch.