We are in a period of unprecedented technological change - disruptive technologies such as Internet of Things (IoT), mobile, and big data are already changing how businesses operate, strategize and communicate. As more organizations digitize their processes with these technologies, they are realizing that operating reliable digital services and safeguarding sensitive data are essential to establishing trust with customers and maintaining business continuity.
Any organisation that relies on computer networks, digital information, and the Internet is vulnerable to cyber-attacks. Sabotage, hacking, even uncontrolled use of social media: all these can lead to financial loss, disruption of operations, and, inevitably, reputational damage. The threats are real, and they are changing all the time. Managing these threats is not the sole responsibility of the IT department, it is business leaders’ job to understand and oversee organisations’ response to cyber/digital threats and attacks.
With an ever-increasing number of security breaches and privacy incidents under the spotlight, consumers’ awareness about privacy is also becoming significantly higher. Consumers are starting to act based on how well they believe their privacy is protected by the organizations collecting and processing their personal information. Thus, customer trust is becoming the most important asset of companies doing digital business. The challenge is not only the security incidents or customer expectations, but also the changing regulations. As an example, the new General Data Protection Regulation (GDPR) is effective since May 2018, imposing stricter rules to companies handling personal data. Organizations that fail to provide secure means of data collection and analysis will be facing high fines. Compliance with any data protection regulation affects every department and require input from CMOs, CEOs, and boards, in addition to cyber security teams.
Considering the above-mentioned trends, the objective of this course is to introduce the participants to the fifth dimension of warfare: the cyber arena. This course will help participants build awareness about cyber threats they are likely to experience, the data security & protection compliance challenges they will face, the operational as well as ethical dilemmas they will need to address, and, crucially, what actions to take in case of cyber incident.
Faculty: Prof. Öykü Isik
Course Date & Time
Thursdays, 2 pm-5:30 p.m. with a 30-minute break at 3:30 (Switzerland time)