Due to the growing volume and sophistication of cyber attacks, companies need to take measures to protect sensitive information, data, networks and systems they own.
The Master in Digital Technology Management with a Cyber Security address prepares future managers to manage the mechanisms that regulate information security on which the integrity and protection of a company depend.
The Master in Digital Technology Management with Cyber Security address helps to understand the vulnerabilities to which computer systems are subjected and provides the technical skills on cryptographic protocols, networks, Cloud and IoT Security, necessary to recognize the possible cyber threats and develop the appropriate countermeasures .
The educational path also focuses on the methodological and legal aspects of IT risk management through a systematic approach. The objective of the Master is to provide the appropriate tools to effectively build the protection of sensitive data of a company and implement adequate prevention of attacks against networks and systems.
This Master – together with the other two Artificial Intelligence and Internet of Things addresses – meets the needs of those who wish to be operational in the field of Digital Transformation.
The Master, held in English, is structured in two cycles of study and one final of internship, for a total of 12 months. The first session of classroom lessons, dedicated to the basics of management applied to Digital Technology, is addressed together with the students of the other two addresses of the Master.
Increasingly, the need to safeguard companies’ technology assets can only be met by specialized managers. Contact the master Program Manager to be one of them.
THE MASTER IS AN INVESTMENT. THE HONOR LOAN IS THE WAY TO FUND IT.
With the Patronage of the Cybersecurity National Lab
In collaboration with
Director of Studies
" Cyber security is today one of the most relevant and challenging issue for any organization, including SMEs, due to the increasing reliance on computer systems and communications. Managers are more and more confronted with the need to understand the possible vulnerabilities and threats - and their technical and economic implications - in order to define appropriate countermeasures. This master provides the knowledge which is required for such a task, covering a rather wide spectrum of topics, ranging from basic competences on cryptographic protocols and access control, to more advanced aspects such as network, cloud and IoT security. Specific courses will focus on legal and normative aspects, as well as on methodologies for the management of risk, which are essential skills for any manager dealing with IT security. "
AVERAGE WORK EXPERIENCE
The Master in Digital Technology Management is a full-time program structured in 1,500 hours of learning activities over 12 months of study, divided into: 400 hours of lecturing, an estimated 600 hours of independent study, and 500 hours of internship.
The structure of the Master is divided into two terms:
The first term students will face the fundamentals of management, applied to digital technology, while the second term will deal with track specific practical aspects.
The two terms are followed by an internship period of 500 hours. This internship can be carried out at various companies and agencies in Italy or abroad. Students will have the chance to put into practice the theory and techniques learned during the two academic terms and have the opportunity to directly learn from professionals of their specific sector.
At the end of the internship you will be required to hand in a ‘Final Report’, which you will present to the Director of Studies showcasing your activities and analyzing the theories and lessons learned during the academic part.
Students who are interested can also choose to take an extracurricular course of Italian.
Classroom participation is about 30 hours per week structured in order to allow time to work in groups, while not neglecting individual students focus and management of interpersonal relationships.
Cryptography provides important building blocks for ensuring the privacy, authenticity, and integrity of the increasingly sensitive information involved in modern networked systems. Nowadays, core cryptographic tools, including encryption, message authentication codes, digital signature, .. are used behind millions of daily on-line transactions and various web and cloud services.
This course provides an introduction to core cryptography mechanisms and security protocols. It focuses on how basic cryptographic algorithms, authentication protocols and security infrastructures work and how to use them.
The course also explores main cryptographic mechanisms and protocols within real-life applications, such as e-mail, on-line banking, digital signature systems with legal implications.
In this course, we discuss on one hand how cybercriminals actually operate, and on the other hand the legal framework that underpins the regulatory and privacy aspects that managers have to be aware of.
In the first part, we will start discussing the technical attack vectors (XSS, SQL Injections, XSRF, drive-by download) and how these vectors are embodied in complex attacks (malware, spyware, ransomware, botnets) Then, we will see how these attacks are used in the cybercrime economy (spam, phishing, infections and money laundering), and we will touch on the economic aspects of cyber criminality, and on the markets of cybercrime as a service. Finally, we will discuss attacks sophistication, state-sponsored attacks and the emergence of a grey-market. We will make use of case-studies (e.g., Hacking Team, Stuxnet, Flame, etc).
In the second part, we will discuss the national, European and international legal framework on privacy and the protection of personal data. Particular attention will be devoted to the EU General Data Protection Regulation – which will become applicable as of May 2018 - and on the EU-US-Privacy Shield, in consideration of the relevance of the transfer of personal data to the United States. The rules will be examined in the light of roles and responsibilities of Digital Technology Managers, who have to make crucial technical and organizational choices on security and data protection, such as in the selection of cloud service providers.
Then we will touch on other legal aspects of interest for the managers of IT- and IT-based companies, such as Intellectual Property Rights, IT contracts, administrative and criminal responsibility for cybercrimes.
The goal of the course is to give the participants an exhaustive overview of ICT hardware, software and services currently used within companies, as well as to illustrate some trend directions and next-generation technologies which might be adopted in business.
Starting from traditional tools like ERP and DBMS, the course introduces the area of information systems, presenting up-to-date techniques and software enabling the data storage, retrieval and knowledge extraction.
Then, it investigates the business opportunities, potential and applications within companies of emerging areas like mobile applications, cloud technologies and the Internet of Things.
The hallmark of last year’s attack on the Ukrainian power grid was the extensive reconnaissance, performed by attackers on their target’s control networks, used to maximize system disruption. Situational awareness, incident response and recovery all depend on an accurate understanding of control system inventories, including normal process behavior. The Ukrainian attack has led our community to a key question; do we know our industrial control networks as well as our adversaries?
Despite the emergence of technologies that monitor data flows of industrial control networks, energy operators consistently cite inadequate real time views to control system the topology, devices, and behavior as a fundamental obstacle to securing their operations. Historically, gathering and maintaining this information has proven incredibly labor intensive and disruptive to economic operations for energy operators.
The course will explore emerging technology and process-centric analytics that can facilitate more automated, passive methods of inventory collection, network monitoring and the definition of normal behavior of industrial control systems. These emergent technologies can enable operators to baseline normal operational process behavior and measure network loading. The course will explore the operational and safety benefits of automated inventory technologies such as improved visibility to misconfigurations and early detection of device failures. While improving operability, these technologies also hold the promise of expedited detection of adversaries’ reconnaissance activities and improved recovery times
This course focuses on the study of processes required to create value for a final consumer, through the contribution of a network of companies (generally labelled as “supply chain”). Basic as well as more advanced elements of supply chain structure and management, purchasing processes and supplier management will be analysed. Special focus will be devoted to concepts and applications of “digital supply chains.
The main aim of our teaching staff is to first lay down a solid grounding of theory and then to build on this foundation by introducing more practical aspects. This method will result in you confidently entering the work environment of this industry, ready to deal with any scenario you will face.
The courses are structured to give the maximum freedom to learn to the students and allow the professors to teach and assess the students in the best way possible. Assessments can take the form of individual/group presentations, projects, oral and written exams as well as, of course, class participation.
The teaching sessions are organized to help students grasp these concepts and techniques through the use of lectures and seminars; group projects and company visits; guest speakers and case studies; videos and presentations; as well as individual assignments and assisted private studying. The teaching program is completed by masters lectures given by professionals coming from specific sectors, different universities or politics. Students will have this way the possibility to directly interact with experts through the analysis of case history.
The integration with companies is a priority and an ever-present feature of all programs of the Bologna Business School, hence for the Master in Digital Technology Management too.
The School is fully committed to creating employability, by way of a systematic career service action, constantly focused on matching at best the students’ professional projects with the needs companies have.
The internship is an exceptional springboard, suffice it to say that six months after the end of the full-time masters at Bologna Business School on average 91% of students work in a company.
The BBS Career Service assists and supports students since the very beginning, along a training and professional development path. This is accomplished by organizing a series of workshops, with the aim of providing the fundamental tools and resources to be appropriately prepared for the labor market.
To achieve this goal, students are involved in several workshops, among which we may list:
In addition to this, thanks to the collaboration with professional career counselors, students receive a customized service, in order to understand their strengths and to build a professional development plan, which will turn out to be helpful when looking for an internship. Here follow some of the activities:
Trough the Master in Digital Technology Management – Cyber Security it is possible, once having completed in the companies the years of experience required, to become a Chief Information Security Officer (CISO).
Jovana Perovic – Montenegro
MDTM (A.Y. 2017/2018)
"Enrolling at BBS was one of the best decisions of my life. With the wide range of professionals we had as professor, not only I got an opportunity to study what I am passionate about, but I had an opportunity to discover new fields I never thought I would want to explore.
The Master helped my personal and professional growth. This experience introduced me to cultural diversity, network of companies and opened the door of a global company to me. I am honored to be part of the BBS family."
Cynthia Wanza – Kenya
Eliwell by Schneider Electric
MDTM (A.Y. 2017/2018)
"Doing my masters was necessary in order for me to advance in my career. I chose BBS because it has a short intensive time period and also because of the opportunity to perform an internship after classes. Through the self and team projects, I was able to apply my academic knowledge and greatly enhance my soft skills. In this way, BBS prepared me for my career move at one of the top technological companies!"
The goal of the Career Service is also to allow students to connect with national and international companies. Over the years, Bologna Business School has managed to establish a wide-ranging network and a sound partnership with leading companies in Italy, thanks to a personalized approach, based on each company’s needs. The collaboration features the following activities:
If you need more information regarding the composition of the class such as age, geographic origin and students’ background, you can download the class profile, clicking here: class profile DigitalTec
Our partners are the foremost supporters of our students, with the provision of scholarships, internships and professional opportunities.
Bologna Business School’s partner companies for the Master in Digital Technology Management are:
ACCENTURE AGM SOLUTIONS BANCA INTESA SANPAOLO BIP BORSA ITALIANA (LONDON STOCK EXCHANGE GROUP) BTO CRIF DATALOGIC DEEPCYBER DIENNEA DOXEE ELECTROLUX HELIXA KANTAR CONSULTING MAX MARA FASHION GROUP NTT DATA ONIT PHILIP MORRIS INTERNATIONAL SCHNEIDER ELECTRIC SCM GROUP SPINDOX TUTELA DIGITALE UNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION YOOX NET-A-PORTER GROUP
The tuition fees for the Master is 14,800 euro (VAT free) to be paid in three installments:
The fee includes participation in the Master, all the study material available through the online platform, and access to the services and facilities of Bologna Business School such as: personal account for the Alma wi-fi, use of the PCs in the Computer Lab, access to the study areas, access to the internal gym, special rates for the School restaurant. Furthermore, the fee gives participants the right to take advantage of the supporting activities of the School, such as the language courses and the master lectures by invitation.
Free parking is also available within BBS Campus.
Additionally, with the Student Card of the University of Bologna, students have access to all of the university facilities, including over 100 libraries, digital resources and study halls (including databases and online subscriptions); the three city center canteens and all university student related discount offers. More information is available on the site of the University of Bologna: http://www.unibo.it/en/services-and-opportunities/index.html
Participants are eligible to apply for Honor Loan with subsidised rate up to the complete coverage of the application fee.
For more information please mail to firstname.lastname@example.org
At Bologna Business School we understand the importance of financial aid in supporting our students to achieve their educational goals. We are aware that an advanced, high quality training path can be a significant commitment, at the same time we also truly believe that investing in one’s future always pays back.
Bologna Business School is pleased to offer partial scholarships to the most meriting students. All of these scholarships are merit-based and will be awarded to the top-ranked candidates in the selection process. The students who come out on top in the selections will be students who not only come from strong academic or practical backgrounds but also those who display the strongest motivation to take part in this program.
There are scholarships of 6,000 euros and scholarships of 4,000 euros. All applicants will be considered for a scholarship – no specific application is required. They are awarded over the course of every round of selection and if you have performed well enough to merit one of them, you will be informed at the moment of admission.
The scholarships act as tuition waivers, so that they result in a deduction of the total amount of the tuition fees due.
The Italian National Security Institute (INPS) supports students attending I and II level Master’s Degrees with a public announcement and related scholarships of a maximum of 10.000€.
The scholarships are for sons and daughters of both INPS members and deceased INPS members.
You can check the requirements to apply to the scholarships on the INPS portal and apply by sending your application no later than Wednesday, October 30 2019 at 12 PM.
For the registration it is necessary:
Admission to the program is subject to the positive assessment of your individual interview and English test, if it’s not the candidate’s native language.
This Master’s is open to all applicants with a bachelor’s degree obtained before the enrolment deadline of each round.
Documents to send to email@example.com:
The selection process will be held at Bologna Business School. The selections for the first round will take place in July, 2019
while the selections for the second round will take place in October, 2019.
In line with the number of available places, admission to the program is granted according to the position on the list of qualified candidates, drawn up on the basis of the total score awarded at the end of the admissions process.
Detailed information on the requirements and application process are available in the “Official Call for Applications” downloadable below.
Faculty members at Bologna Business School work together offering outstanding teaching standards. An international and interdisciplinary approach is guaranteed by a joint team of distinguished national core professors, adjunct, visiting professors, guest speakers and top managers.