“ADVANCED CYBERSECURITY AND GLOBAL CYBERSECURITY STRATEGY” COURSE WEEK 3: Cybersecurity in the cloud

This afternoon Brian Honan will lecture on cybersecurity in the cloud in our “Advanced Cybersecurity and Global Cybersecurity Strategy” course within the Advanced Master in Privacy, Cybersecurity, Data Management and Leadership LLM at the European Centre on Privacy and Cybersecurity (ECPC)!Cloud computing services are becoming increasingly essential in our economy and society. However, for cloud customers, this practically ...

IT’S TUTORIAL TIME! WEEK 6: A CYBERSECURITY READING OF THE GDPR

Thursday is problem-based learning tutorial day in the “EU and Global Cybersecurity Fundamentals” course! Following Monday’s lecture in which the students of the Advanced Master in Privacy, Cybersecurity and Data Management have been provided with a cybersecurity reading of the GDPR,  today’s tutorial will require them to discuss and prepare a presentation on the difference between two key concepts with respect to data protection and cybersecurity: anonymized ...

IT’S TUTORIAL TIME! WEEK 5: INTRUSION DETECTION, FIREWALLS, INTRUSION PREVENTION SYSTEMS AND THREAT INTELLIGENCE

It's Thursday and that means that it is tutorial time in the “EU and Global Cybersecurity Fundamentals” course! This afternoon students will discuss the deployment of intrusion detection/prevention systems, firewalls, and threat intelligence, giving group presentations, first from the perspective of an attacker and then as a member of the organization, in a session led by Fernando ...

“The next great financial crisis could come from a cyber attack”: 5 critical cybersecurity measures you should put in place today

The 2021 Report on the SolarWinds Cyber Espionage Attack and Institutions’ Response published by the New York State Department of Financial Services (“Report”) commences with a stark warning: “The next great financial crisis could come from a cyber attack.” “The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a ...

“Public health AND Privacy” and not “Public health OR Privacy”: A collection of Guidance on COVID-19

Below is an attempt (without the presumption of completeness) to map all the official resources providing guidance on the correct processing of personal data in the context of COVID-19 and Cybersecurity-related information on working remotely in the context of the COVID-19 pandemic. I genuinely hope this will help in the effort of achieving "Public health AND Privacy"! Stay safe and ...

Happy Safer Internet Day: A call for data security by design

Today, Safer Internet Day, represents a good opportunity to remind organizations of the importance of embedding data protection and security into the design of processes, products and services. This consideration is, in fact, embodied in the first principle of five which I have identified as the foundation of Socially Responsible Data Protection and which are ...

Mia intervista su Open sulla proposta di Marattin della registrazione con documento d’identità per accedere ai social network

Oggi sono stato intervistato da Open, la testata online di Enrico Mentana, sul tema della registrazione tramite carta d’identità per accedere ai social network. Il mio parere segue quello di Luigi Marattin, economista e deputato di Italia Viva, l’autore della proposta che sta sollevando un grande dibattito in questi giorni in Italia.  Marattin ha puntato l’attenzione ...