Digital sovereignty: beyond tensions of data protection and cybersecurity

Digital sovereignty: beyond tensions of data protection and cybersecurity

This module aims at exploring the key areas of tension between data governance and regulation (covering both personal and non-personal data) and cybersecurity. The module is divided into three parts. The first outlines the technical aspects of digital sovereignty.

The second part will examine the links between data protection law and cybersecurity, particularly with regard to the challenges involved in managing and reporting data breaches and cybersecurity incidents. The third part addresses issues relating to compliance management under the NIS2 regulations (Legislative Decree 138/2024) and Act 90/2024. 

Would you like to attend the course live with the tutor? Download the course timetable and get in touch

Would you like to take the course via e-learning, available 24/7? Register on the platform

Topics

Digital sovereignty (data sovereignty and trust models; confidentiality and compliance of computations)
Analysis of data breach case studies
Regulations governing data breach notifications and cybersecurity notifications
NIS 2 compliance management
An overview of DORA compliance

Target

  • Public sector organisations required to comply with NIS 2 or DORA.
  • domestic companies not subject to the Scope 3 regulations but to NIS 2 or DORA
  • Master’s and PhD students
  • public sector staff, company staff and professionals who are already interested in cybersecurity and work in the field of data protection

Course structure

Modulo 1 - DIGITAL SOVEREIGNTY
8 hours

•Digital sovereignty
•Data sovereignty and trust models
•Confidentiality and compliance of computations

Modulo 2 - DATA BREACH
20 hours
  • Analysis of case studies relating to data breaches
  • Regulations governing data breach notifications and cybersecurity notifications

 

Modulo 3 - ELEMENTI DI COMPLIANCE
12 hours
  • NIS 2 compliance management
  • An overview of DORA compliance
WORKSHOP
16 hours

Description and analysis of specific case studies, supported by targeted exercises

Digital sovereignty: beyond tensions of data protection and cybersecurity

Index

Request more information

Fill in all sections of the form and click CONFIRM.

You may also be interested in…