About this course
This two mornings training focuses on the policy aspects of cybersecurity, covering cybersecurity standards in the EU, how to adopt them and put them into practice. Module 1 focuses on the legal and policy dimension of cybersecurity in Europe and offers you an in-depth overview of the fundamental concepts in cybersecurity, in order to understand relevant EU directives, guidelines, regulations. At the end of the course, you will receive a Certificate. The course has been designed to match the European E-Competence Framework.
Over the past decades, Internet and Information and Communication Technologies (ICTs) have had a profound impact on our daily lives, becoming an integral part of our institutional and social fabric. The supply of critical services across many sectors, including emergency and security services, health, water and food, energy and electricity, banking and finance, commerce, transportation, communications and education is now heavily reliant on ICTs. Our reliance on internet and digital technologies makes us more vulnerable to new threats, including cybersecurity attacks. These threats put the provision of critical services, as well as the EU’s economies, at risk and ultimately compromise the security and fundamental rights of EU citizens.
Breaches of information security are a major threat to the functioning of our society, jeopardizing public services, businesses and the economy. Under the EU regulatory framework (e.g. GDPR, NIS, Cybersecurity Act) our cyber security risks need to be evaluated and security controls need to be implemented in the Information Systems of our infrastructures, where all procedures, personal data, people and objects are stored and exchanged in a secure manner. To plan and implement efficient security policies and to comply with the EU regulations, public authorities, organisations and professionals need to raise their cybersecurity awareness and fully develop the necessary skills. Professionals need to be aware of the various cybersecurity standards (e.g. ISO27001, ISO 27005, ISO 28000, ISO15408) and procedures that can help them to become compliant with the EU regulations and protect their daily work, organisation and sector.
This training focuses on the policy aspects of cybersecurity, covering cybersecurity standards in the EU, how to adopt them and how to put them into practice. This unique program brings together the experience of cybersecurity, security, EU policy and public administration experts to provide a practical understanding of the challenges related to designing and implementing cyber-proof policies within organisations and sectors. The training is designed specifically for non-IT professionals, with the objective of providing participants with the knowledge and skillset necessary to deal confidently with cybersecurity measures within their sectors and organisations.
What is our approach to online teaching and learning?
The delivery of our online training programmes is planned following the input of our online pedagogy specialists, to provide you with a high quality and effective educational experience. In this online training, we adopt a comprehensive approach, combining an in-depth overview of the legislative and policy-considerations to be taken into account when formulating cyber-resilient measures, and practical training. We will provide practical guidelines and use case studies, good practices and hands-on simulation exercises to allow you understand, design, adopt and implement good cybersecurity measures, in your work, organisation and sector. After this training, you will be able to use all the materials and practical exercises for your work. Whether you are a policymaker, interested in incorporating cyber resilience in your policies, or a professional who wants to make his/her work and organisation safer, this training is designed for you.
Participants attending this module will master the following concepts and skills:
- Cybersecurity: fundamental concepts and knowledge;
- Legal and policy aspects of cybersecurity in the EU: EU directives, guidelines, regulations, initiatives
- Assessing cybersecurity risks: identifying threats, vulnerabilities and impact, in various critical sectors e.g. including emergency, health, water and food, energy and electricity, banking and finance, commerce, transportation, communications and education
- Cybersecurity management and governance: bodies involved, processes and policies to manage cyber risks;
This module is part of a four mornings training. The training is divided into modules to offer you flexibility in adapting it to your needs. If you prefer to attend the second module, you can click on Module 2 or you can attend the full four mornings training.
How will it help you?
All classes will be held live and include an interactive component to allow you practice with the trainer and with fellow participants. In addition, you have access to four extra Master Classes with exercises. All exercises are optional; however, we strongly encourage you to practice in order to gain practical skills. The programme is divided into two self-standing and interconnected modules. You will be able to join only module I or both modules I and II.
Who will benefit most?
Recent reports warn us about cybersecurity skills gaps, among non-IT experts across all sectors in the EU, including public officials, lawyers, administrative staff, healthcare professionals, database managers. The course is relevant for public officials, legal practitioners, database managers, professionals in the private sector.
Once you register, we will ask you for details about your own professional sector. We have over 20 case studies and will select the case studies on the basis of your individual needs.
For this online course we make use of Zoom
Ms Juliette Mollicone-Boussuge
Tel: +352 426 230 304
EIPA offers a discount to all civil servants working for one of EIPA’s supporting countries, and civil servants working for an EU institution, body or agency.
Who are the supporting countries?
Civil servants coming from the following EIPA supporting countries are entitled to get the reduced fee: Austria, Belgium, Bulgaria, Cyprus, Czech Republic, Denmark, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Lithuania, Luxembourg, Malta, the Netherlands, Norway, Poland, Portugal, Spain, Sweden.
For all other participants, the regular fee applies.
Prior payment is a condition for participation.
For administrative reasons you will be charged € 50 for cancellations received within 7 days before the activity begins. There is no charge for qualified substitute participants.
EIPA reserves the right to cancel the activity up to 1 week before the starting date. In that case, registration fees received will be fully reimbursed.
We can tailor this specific programme to your exact needs. This could include but is not limited to specific topics or dates. If you are interested in this, please contact Ms Clara Cotroneo at email@example.com
I have a question
|Module 1 – Part 1: The issue of cybersecurity: European challenges and standards|
|08.45||Welcome and introduction to the online seminar
Clara Cotroneo, Lecturer, EIPA Luxembourg
|Cybersecurity in the EU: an introduction
|9.40||Q&A session and break|
|09.45||Fundamental concepts and the EU Cybersecurity environment
Basic definitions and concepts; EU Cybersecurity stakeholders (e.g. ENISA, CSIRT-network, NIS Cooperation Group, EU cybersecurity agencies)
Dr Nineta Polemi, Associate Professor, University of Piraeus, Dpt. of Informatics, Piraeus (GR)
|10.30||Q&A session and break|
|10.45||Cyber Threat Intelligence and Standards
Dr Nineta Polemi
|11.30||Q&A session and break|
|11.45||People the weakest cybersecurity and privacy link
The relations between human activity, cybersecurity and privacy will be explored. Examples of breaches related to human actions will be presented: In particular intentional and not intentional cybersecurity threats and attacks and their impacts to the organisations
Dr Haris Mouratidis, Director, Centre for Secure, Intelligent and Usable Systems, University of Brighton, Brighton (UK)
|12.30||Q&A session and break|
|12:45||Personal Hygiene for Cybersecurity and Privacy
What type of measures a simple user can undertake? Examples from Bring your own device (BoD) will be provided together with a short introduction on some guidelines for personal informational security and privacy
Dr Haris Mouratidis
|13.30||Q&A session and break|
|13:40||End of first part of Module I|
|Note: Before the next session (Tuesday morning) all participants will complete a multiple-choice quiz to check their understanding (optional)|
|Module 1 – Part 2: Security Management and People|
|09.00||Introduction to Security Management
Dr Nineta Polemi
|9:45||Q&A session and break|
|10:00||Digital Transformation and Cybersecurity: the current challenges to keep in mind for the public sector
|10:45||Q&A session and break|
|11:00||Cybersecurity and privacy policies in the EU’s digital decade
|11:45||Q&A session and break|
|12:00||How Cybersecurity is managed at the European Commission
Ken Ducatel, Director DG DIGIT, Directorate for IT Security, European Commission, Brussels (BE)
|12:45||Q&A session and break|
|13:00||I am a Data Protection officer: which are my responsibilities?
Florina Pop, Lecturer, EIPA Maastricht
|13.45||Q&A session and end of Module I|
Extra lectures available online to participants
At the end of the week, you will have access to extra online Master Classes. These lectures are optional and accompanied by optional readings and quizzes. You will be able to access and watch these lectures any time during the course.
|Master Class 1||Digital Transformation and Cybersecurity: the current challenges to keep in mind|
|Master Class 2||Handling confidential and sensitive data|