This training course will allow you to implement in your personal (in your day to day life) and/or professional (in your company) life digital skills and good cybersecurity practices. It is intended for professionals who want to further their knowledge, understand the mechanisms of approximation and/or convergence in the cybersecurity and data privacy fields, and understand the stake of a company’s digital transition and its impact on the employees.
1. Identify and analyse cybersecurity issues with the aim of ensuring intelligence and economic security.
2. Take into account all security aspects in an organisation.
3. Identify threats linked to the use of digital spaces and social media, a company’s private platforms and public platforms.
4. Adopt good cybersecurity practices for both companies and individuals.
5. Protect a company’s intangible property by using digital tools and inherent services.
6. Establish a management protocol for IT incidents: from detection to crisis management.
Specific conditions and prerequisites
1. A company’s digital transition
The digital transition of companies is explained through examples: vertical integration, profiling and digital marketing, digital communication, websites, the blurred lines between professional and personal life.
2. The (new) uses
• The right to disconnect,
• Using one’s right regarding the GDPR. Dereferencing on the internet
3. Digital skills
• Password policy and password managers
• Data back-up policy
• The convergence of equipment: computers, smartphones and tablets
• Messaging services and the reservation of a domain
• Connectivities: wired vs. wireless; VPNs and secure web access
• “Public” clouds vs. “private” clouds (NAS)
• Profiling on the internet
• Search engines and privacy
• Digital identity
4. Good practices and cybersecurity
• Physical, logical and organisational security
○ Basic algorithmic and mathematical principles
○ Mechanisms with public keys (asymmetrical) and symmetrical
○ Decryption protocol
○ Quantum cryptography
• Authentication and access management
• Managing incidents
5. Security by Design
• Security from the designing of products, services, softwares
• Data protection by design and by default
6. Certifications ISO 2700x, HDS, SOC1, SOC2, CFIUS
• Social engineering, DoS
8. Participants • Bodies responsible for ensuring the security of sensitive information (ANSSI)
• Data protection agencies (CNIL, ISO)
· Human resources and marketing managers.