Data and service security in the digital transformation

Data and service security in the digital transformation

This module addresses issues relating to the risks associated with the digitalisation of processes, with particular reference to data and service security. After discussing the main changes brought about by digital transformation, we will look at all the associated cybersecurity risks. For each of these, we will outline the key best practices and related technologies currently available to mitigate the impact. 

Would you like to attend the course live with the tutor? Download the course timetable and get in touch

Would you like to take the course via e-learning, available 24/7? Register on the platform

Topics

  • Overview of digital transformation and its impact on business processes and services
  • Key concepts in cybersecurity: threats, vulnerabilities and protection objectives
    •The role of cybersecurity in digitalisation processes
    •Main types of attacks: phishing, ransomware, etc.
    •Technologies for protecting sensitive data: encryption, access management and control •Regulatory compliance: The GDPR and other relevant regulations
    •Best practices for privacy protection in digital environments
    •System security technologies: firewalls, VPNs, network segmentation, etc.
    •Security models for cloud computing and the IoT
    •Incident response planning
    •Business continuity and disaster recovery
    •Crisis management and internal and external communication during an incident

Target

  • Companies and public administrations
  • In general, all the staff involved in the digital transformation processes
  • Specifically relevant to staff in managerial roles
  • Relevant to recent graduates from non-technical disciplines who wish to gain an understanding of general cybersecurity topics before entering the workforce

Course structure

Module 1 - DIGITAL TRANSFORMATION
10 hours
  • Overview on digital transformation, impact on corporate processes and services
Module 2 - INTRODUCTION TO RISK MANAGEMENT IN CYBERSECURITY
8 hours
  • Definitions and key concepts
  • Analysis of the impact on corporate processes and services
  • Mitigation strategies: prevention, protection, detection and response.
Module 3 - REGULATORY COMPLIANCE
10 hours

•GDPR and other relevant regulations
•Best practices for privacy protection in digital environments
•Technologies p

Module 4 - TYPES OF ATTACKS AND KEY RESPONSES
4 hours
  • Main types of attacks: phishing, ransomware, etc.
  • System security technologies: firewalls, VPNs, network segmentation, etc.
  • Incident response planning
  • Business continuity and disaster recovery
  • Crisis management and internal and external communication during an incident

 

Module 5 - CLOUD AND IoT
5 hours

Security models for cloud computing and the IoT 

 

WORKSHOP
16 hours

Simulation of an attack (e.g. phishing) and response planning to enable participants to recognise signs of a breach, respond to the incident, and implement containment and recovery measures

Data and service security in the digital transformation

Index

Request more information

Fill in all sections of the form and click CONFIRM.

You may also be interested in…