Implementing EU Cybersecurity Regulation
Learn to face future challenges in cyberspace
The DSI cybersecurity management program prepares experienced functional-level executives for at the intersection of regulation and cybersecurity management to reduce cyber risk. Our interdisciplinary instructors will explain the linkages from the EU Cybersecurity Policy and regulation, focusing on the EU Cybersecurity Strategy, Cybersecurity Act and NIS Directive and existing regulations, such as the General Data Protection Regulation (GDPR) and similar regulation in other important markets (e.g. United States).
Managers, policymakers and other high level decision makers will learn the difference between risk management and compliance-based approaches, and offer the framework for building a cyber risk management at an enterprise level. The program includes required cyber security policy, procedures, technology and human resource training aspects and offers a basic understanding of cyber incident handling and post-incident recovery, as well as an overview of the evolving cyber threat landscape and trends in attack vectors.
Managers, policymakers and other high level decision makers will learn the difference between risk management and compliance-based approaches, and offer the framework for building a cyber risk management at an enterprise level. The program includes required cyber security policy, procedures, technology and human resource training aspects and offers a basic understanding of cyber incident handling and post-incident recovery, as well as an overview of the evolving cyber threat landscape and trends in attack vectors.
Profile
- You are a manager or policymaker responsible for cybersecurity management, IT-Compliance or standards and regulation
Highlights
- An intensive 3-day program
- Become an expert in in understanding, implementing, and reviewing EU cybersecurity regulation in a business and policy context
Benefits
- Recognize and overcome information security incidents
- Understand EU legislation and how the private sector can influence decision-making processes
- Learn the definition and necessity of Critical Information Infrastructure Protection (CIIP)
- Learn how to comply with GDPR regulations
- Understand the purpose of the Control Framework and its components (people, process, technology)
Topics
- Requirements stemming from EU Cybersecurity policy and regulation
- Linkages between new EU cyber regulation and existing regulations, such as the General Data Protection Regulation (GDPR) and similar regulation in other important markets (e.g. United States)
- Differences between risk management and compliance-based approaches
- Framework for building a cyber risk management at an enterprise level
- Basic understanding on cyber incident handling and post-incident recovery
- Overview of the evolving cyber threat landscape and trends in attack vectors