In an increasingly interconnected market, it becomes essential to rethink business and production processes in a completely different way, taking into account that the opportunities of digital and the internet are accompanied by threats and vulnerabilities that can lead to even disruptive effects on budgets and privacy.
Businesses and the country system need a structured and systematic approach to information security and privacy governance.
The problem, in fact, is not only technological, but also lies in the behaviour of the individual who, sometimes unconsciously, may adopt incorrect practices that increase the risk of cyber attacks.
These attacks certainly have impacts on data processing, personal data protection and current Italian and European legislation.
Il Master ha l’obiettivo di illustrare nel dettaglio lo stato dell’arte della Cybersecurity e di fornire strumenti e strategie per la sicurezza informatica in azienda e nella pratica di ogni giorno
All actors such as companies, IT consultants, DPOs and Privacy Specialists who need to have a high level of knowledge on the subject of cybersecurity and how it impacts on business processes
Durata: 24-40 ore, a seconda del livello di dettaglio e delle competenze pregresse.
Modalità di erogazione:
- Lezioni frontali (in presenza o online).
- Materiali didattici e sessioni di autoapprendimento.
- Prove pratiche e laboratori.
- Test di valutazione intermedi e finali.
IL CORSO VIENE EROGATO IN PRESENZA O ON LINE
GDPR: il regolamento europeo in materia di protezione dei dati personali
- General Provisions
- Fundamentals of lawfulness of treatment
- Information and access to personal data
- Rights of the data subject:
- rectification and cancellation
- opposition and automated decision-making concerning natural persons
- limitation of processing
- Data controller, data processor, 'processor'.
- Records of treatment activities
- Risk-based approach to processing and accountability measures of controllers and managers:
- security of processing
- data breach
- data protection impact assessment and prior consultation
- data protection officer
- codes of conduct and certification
- International Data Transfers
- General aspects of CyberSecurity
- Integrity
- Confidentiality
- Availability
- Cybercrime in Italy and the World.
- Cyberwarfare: famous cases.
- The risks and economic damage caused to companies.
- The risks of Shadow IT.
- Risk assessment and how to design computer security.
- How to respond to security incidents:
- Business Continuity (ISO 22301)
- Disaster Recovery Plan (DRP).
- Use and limitations of security systems.
- Vulnerability Assessment and Penetration Test.
- Cybersecurity and data breaches
- Measures of the Privacy Guarantor
- Tests and case studies
- Cognitive test based on the optimal scheme of skills Privacy
- Open-ended case study