Cybersecurity is everyone’s responsibility.
What are the current trends in threats, risks and vulnerabilities? How do threat actors exploit vulnerabilities to carry out ransomware attacks? Participate to understand cyberspace as an operating environment and how to deal with threats, risks and vulnerabilities.
Cyberspace: The hardware and software used to create, process, store, retrieve and disseminate information in different types of interconnected networks that build a vast global network, built and used by people, has transformed all aspects of human life. It enables information flows at speeds that have never existed before; it creates value through e-commerce; it streamlines the processes that generate value for companies, and it makes it possible to command and control crisis management capabilities or to conduct joint operations. However, threat actors identify and exploit vulnerabilities to carry out cyberattacks targeting organizations in academia and the public and private sectors. The motive can be to steal intellectual property (knowledge), espionage, destruction or for cyber criminal reasons. Many cases supporting this notion exist: WannaCry, NotPetya, and REvil. Therefore, with an understanding of cyberspace as an operating environment, participants will understand the threats, risks, vulnerabilities and what to do about them.
Learning objectives of this path
Our unique learning approach means you’ll participate in interactive virtual workshops while enjoying self-paced and social learning opportunities.
During this learning journey, you explore new resources and engage with your peers via an interactive online platform, enjoy discussion forums with participants and experts, and enjoy opportunities for deeper and more meaningful online conversations during group work. This means that at the end of this trip, participants will be able to:
- Describe and analyze cyberspace as an operational environment (infrastructure, defense measures),
- Identify and analyze threats, vulnerabilities, risks and events, and apply this knowledge to inform defensive cybersecurity measures at the organizational level,
- Assess potential organizational level mitigation measures for an enhanced cybersecurity posture and assess its impact on cybersecurity policy (organizational level, national level),
- Examine the role of cybersecurity in the context of international security.
By combining scenario exercises, expert presentations and dialogue between course participants, the course promotes an active learning approach to the fundamentals of cybersecurity.
- September 5: Introduction to cybersecurity in the context of international security
- September 5 to September 16: Self-paced learning. Participants are expected to read the materials in advance and complete the assignments for the week of the course.
Connect the dots:
- September 19 to September 23 from 09:00 a.m. to 1:30 p.m. CET (except Thursday September 22: 11:50 a.m. to 4:20 p.m.): participants will explore cybersecurity in the context of international security through Keynote sessions, interactive sessions with keynote speakers and participants , case studies and brainstorming sessions. Topics that will be covered include:
- Strategic Information Operations / Cyberspace Operations
- Threats and operations in cyberspace
- International law and operations in cyberspace
- Cybersecurity at the organizational level
- Politics and International Affairs
- October 3: take-out meals, closing session and presentation of the certificate
WHO SHOULD ATTEND
This course is aimed at people working for an organization or occupying a position of manager or who may soon be responsible for cybersecurity.
Regular participants come from a variety of professional backgrounds, including:
- Government officials (including cyber policy officials, diplomats, military officers, intelligence analysts);
- Staff of international organizations;
- Private sector actors.
COSTS 2500 CHF – all course fees included
Apply before July 4 to receive a 15% discount. Graduates receive a 20% discount. Discounts are not cumulative.