Securing our people
In this page
Security awareness training
Security awareness is not a one-time event but an ongoing process and the Culture Amp security training programs are designed to foster a proactive security mindset and ensure that security principles are integrated into daily activities and decision-making processes of all of our campers. From 2025, we offer a hybrid delivery approach to ensure that cybersecurity awareness training is proportional and relevant to all Campers. This approach also suits different learning styles and schedules.
Training is provided via multiple delivery methods including online and in-person refresher sessions, slack posts, videos, competitions, events and Security team appearances at existing regular forums. Content is developed in-house and tailored for some cohorts of Campers to suit their different roles. Content is also continuously improved through feedback and to reflect changes in the Culture Amp context and the threat environment. Annual refreshers are targeted to Campers in the quarter of their Camperversary. Where applicable formal certification based security training is also offered to Campers.
Background checks
Culture Amp takes the security of our customers' data seriously and uses background checks and vetting to minimise the risks associated with data breaches, fraud, and other internal security threats. Culture Amp uses a specialist, accredited external provider to facilitate these checks across all international regions. All employees undergo a criminal history and sanctions check, and further role-dependent checks including validation of education and certification history, credit checks, or professional license/credential validation. Vetting is performed prior to an employee's start date, at fixed intervals in their employment, and when promoted to senior leadership roles.
More from Culture Amp Security
Security overview
We prioritize security through a transparent, culture-focused program.
Securing our internal environment
The foundation of our approach to security is keeping our own internal environments secure.
Keeping data secure
We secure customer data and ensures availability and customer control.
Security operations
Our scope in monitoring security and responding to threats and incidents.