Cybersecurity Policies and Practices in the EU – for non-IT Experts (Module 2)

European-Cyber-Security-Month-logo

Project number: 20518012

- Online Course -

Request brochure

Date & pricing

03/11/2020 - 05/11/2020
Register before: 19/10/2020

€ 400,00 per attendee

€ 360,00 for EIPA members*

Cybersecurity Policies and Practices in the EU – for non-IT Experts (Module 2)

From:  360,00

Module 2 will offer you a practical training (no IT expertise required) on how to design and implement cybersecurity policies and practices to protect your daily work, organization and sector.

About this course

This two mornings training focuses on the policy aspects of cybersecurity, covering cybersecurity standards in the EU, how to adopt them and put them into practice. Module 2 will offer you a practical training (no IT expertise required) on how to design and implement cybersecurity policies and practices to protect your daily work, organization and sector. At the end of the course, you will receive a Certificate of Attendance (CoA).

Over the past decades, Internet and Information and Communication Technologies (ICTs) have had a profound impact on our daily lives, becoming an integral part of our institutional and social fabric. The supply of critical services across many sectors, including emergency and security services, health, water and food, energy and electricity, banking and finance, commerce, transportation, communications and education is now heavily reliant on ICTs. Our reliance on internet and digital technologies makes us more vulnerable to new threats, including cybersecurity attacks. These threats put the provision of critical services, as well as the EU’s economies, at risk and ultimately compromise the security and fundamental rights of EU citizens.

Breaches of information security are a major threat to the functioning of our society, jeopardizing public services, businesses and the economy. Under the EU regulatory framework (e.g. GDPR, NIS, Cybersecurity Act) our cyber security risks need to be evaluated and security controls need to be implemented in the Information Systems of our infrastructures, where all procedures, personal data, people and objects are stored and exchanged in a secure manner. To plan and implement efficient security policies and to comply with the EU regulations, public authorities, organizations and professionals need to raise their cybersecurity awareness and fully develop the necessary skills. Professionals need to be aware of the various cybersecurity standards (e.g. ISO27001, ISO 27005, ISO 28000, ISO15408) and procedures that can help them to become compliant with the EU regulations and protect their daily work, organization and sector.

This training focuses on the policy aspects of cybersecurity, covering cybersecurity standards in the EU, how to adopt them and how to put them into practice. This unique program brings together the experience of cybersecurity, security, EU policy and public administration experts to provide a practical understanding of the challenges related to designing and implementing cyber-proof policies within organizations and sectors. The training is designed specifically for non-IT professionals, with the objective of providing participants with the knowledge and skillset necessary to deal confidently with cybersecurity measures within their sectors and organizations.

What is our approach to online teaching and learning?

The delivery of our online training programmes is planned following the input of our online pedagogy specialists, to provide you with a high quality and effective educational experience. In this online training, we adopt a comprehensive approach, combining an in-depth overview of the legislative and policy-considerations to be taken into account when formulating cyber-resilient measures, and practical training. We will provide practical guidelines and use case studies, good practices and hands-on simulation exercises to allow you understand, design, adopt and implement good cybersecurity measures, in your work, organization and sector. After this training, you will be able to use all the materials and practical exercises for your work. Whether you are a policymaker, interested in incorporating cyber resilience in your policies, or a professional who wants to make his/her work and organization safer, this training is designed for you.

This module is part of a four mornings training. The training is divided into modules to offer you flexibility in adapting it to your needs. If you prefer to attend the first module, you can click on Module 1, or you can attend the full four mornings training.

Who will benefit most?

Recent reports warn us about cybersecurity skills gaps, among non-IT experts across all sectors in the EU, including public officials, lawyers, administrative staff, healthcare professionals, database managers. The course is relevant for public officials, legal practitioners, database managers, professionals in the private sector.

Once you register, we will ask you for details about your own professional sector. We have over 20 case studies and will select the case studies on the basis of your individual needs.

What you will learn in this module

Participants attending this module will master the following concepts and skills:

  • Cybersecurity: fundamental concepts and knowledge;
  • Cybersecurity management and governance: bodies involved, processes and policies to manage cyber risks;
  • Crisis communication, business continuity and disaster recovery planning;
  • Prevention: the components of comprehensive cybersecurity policies
  • Formulating policies to strengthen cybersecurity resilience: how do I design policy measures to make my sector/organization cyber resilient?

What else will you learn from joining this module?

All the sessions of this course are live streamed, through secure connection, to facilitate real-time interaction with our experts and other participants. In addition, by joining this course, you will have access to:

  • Four Master Classes on cybersecurity
  • Membership to an international network of professionals, for peer-learning and exchanging best practices. Please note that joining the network is optional
  • Certificate of Attendance

Note for participants: This training can be complemented with a follow-up activity, tailored to specific your specific sector and needs. If you are a policy officer, or civil servant working in a specific sectoral or geographical area, please get in touch to know your options. If you are interested in this training, but the dates do not match with your commitments, do please let us know and we will keep in touch with updates on future editions.

Clara Cotroneo

Clara Cotroneo

EU Internal and External Security / EU Public Sector Management

Haris Mouratidis

Haris Mouratidis

Centre for Secure, Intelligent and Usable Systems (CSIUS) at the University of Brighton
Professor of Software Systems Engineering and founding Director

Practical information

Online Course
This is an online course

Programme Organiser
Ms Juliette Mollicone-Boussuge
Tel: +352 426 230 304
j.boussuge@eipa.eu

Fee
The fee includes documentation and refreshments. Lunches, a reception or dinner are included if mentioned in the programme. Accommodation and travel costs are at the expense of the participants or their administration.

Discounts
EIPA offers a 10% discount to all civil servants working for one of EIPA’s supporting countries, and civil servants working for an EU institution, body or agency.

Who are the supporting countries?
Civil servants coming from the following EIPA supporting countries are entitled to get the reduced fee: Austria, Belgium, Bulgaria, Cyprus, Czech Republic, Denmark, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Lithuania, Luxembourg, Malta, the Netherlands, Norway, Poland, Portugal, Spain, Sweden, United Kingdom.

For all other participants, the regular fee applies.

Payment
Prior payment is a condition for participation.

Cancellation policy
For administrative reasons you will be charged €150 for cancellations received within 15 days before the activity begins. There is no charge for qualified substitute participants.

EIPA reserves the right to cancel the activity up to 2 weeks before the starting date. In that case, registration fees received will be fully reimbursed. EIPA accepts no responsibility for any costs incurred (travel, accommodation, etc.).

I have a question

Course > I have a Question

The programme

Module 2 – Part 1: Cybersecurity in practice
09.00 People the weakest cybersecurity and privacy link
The relations between human activity, cybersecurity and privacy will be explored. Examples of breaches related to human actions will be presented: In particular intentional and not intentional cybersecurity threats and attacks and their impacts to the organizations
The session includes a practical exercise for all participants.
Dr Haris Mouratidis, Director, Centre for Secure, Intelligent and Usable Systems, University of Brighton, Brighton (UK)
10.30 Break and virtual networking
10.45 Personal Hygiene for Cybersecurity and Privacy
What type of measures a simple user can undertake? Examples from Bring your own device (BoD) will be provided together with a short introduction on some guidelines for personal informational security and privacy.
Haris Mouratidis
12.00 Guided in-class exercise on Personal cybersecurity and privacy hygiene
Focus on personal experiences and present at the end
Small groups of participants
12.45 Q & A session
13.00 How do I create cyber security policies and procedures for my sector/organization? The starter tool kit
Clara Cotroneo
13.45 End of the day
Module 2 – Part 2: Cybersecurity in practice
09.00 Cyber Security Incident Handling
Incidents can disrupt an organization, businesses and supply chains; business continuity plans and disaster recovery plans will ensure that organizations can respond and continue their operations.
Examples from governmental disruptions.
Haris Mouratidis
10.30 Break
10.45 Guided Exercise on Business Continuity and disaster recovery plans
Haris Mouratidis
11.30 Mini in-class project
It will cover the overall understanding of the seminar (the trainees will have the next 60 minutes to return their responses)
12.45 Feedback and discussions
13.00 Final networking and set-up community of practice
End of the online seminar

 

Extra lectures available online to participants

At the end of the this module, you will have access to two extra Master Classes. These lectures are pre-recorded and accompanied by optional readings and quizzes. You will be able to access and watch these lectures any time during the course.

Master Class 3 I am a Data Protection officer: which are my responsibilities?
Master Class 4 Cybersecurity planning guide