Due to the growing volume and sophistication of cyber attacks, companies need to take measures to protect sensitive information, data, networks and systems they own.
The Master in Digital Technology Management with a Cyber Security address prepares future managers to manage the mechanisms that regulate information security on which the integrity and protection of a company depend.
The Master in Digital Technology Management with Cyber Security address helps to understand the vulnerabilities to which computer systems are subjected and provides the technical skills on cryptographic protocols, networks, Cloud and IoT Security, necessary to recognize the possible cyber threats and develop the appropriate countermeasures .
The educational path also focuses on the methodological and legal aspects of IT risk management through a systematic approach. The objective of the Master is to provide the appropriate tools to effectively build the protection of sensitive data of a company and implement adequate prevention of attacks against networks and systems.
This Master – together with the other two Artificial Intelligence and Internet of Things addresses – meets the needs of those who wish to be operational in the field of Digital Transformation.
The Master, held in English, is structured in two cycles of study and one final of internship, for a total of 12 months. The first session of classroom lessons, dedicated to the basics of management applied to Digital Technology, is addressed together with the students of the other two addresses of the Master.
Thanks to the innovative technologies of BBS you can follow the master online as well.
Increasingly, the need to safeguard companies’ technology assets can only be met by specialized managers. Contact the master Program Manager to be one of them.
THE MASTER IS AN INVESTMENT. THE HONOR LOAN IS THE WAY TO FUND IT.
With the Patronage of the Cybersecurity National Lab
In collaboration with
Director of Studies
" Cyber security is today one of the most relevant and challenging issue for any organization, including SMEs, due to the increasing reliance on computer systems and communications. Managers are more and more confronted with the need to understand the possible vulnerabilities and threats - and their technical and economic implications - in order to define appropriate countermeasures. This master provides the knowledge which is required for such a task, covering a rather wide spectrum of topics, ranging from basic competences on cryptographic protocols and access control, to more advanced aspects such as network, cloud and IoT security. Specific courses will focus on legal and normative aspects, as well as on methodologies for the management of risk, which are essential skills for any manager dealing with IT security. "
AVERAGE WORK EXPERIENCE
The Master in Digital Technology Management is a full-time program structured in 1,500 hours of learning activities over 12 months of study, divided into: 400 hours of lecturing, an estimated 600 hours of independent study, and 500 hours of internship.
The structure of the Master is divided into two terms:
The first term students will face the fundamentals of management, applied to digital technology, while the second term will deal with track specific practical aspects.
The two terms are followed by an internship period of 500 hours. This internship can be carried out at various companies and agencies in Italy or abroad. Students will have the chance to put into practice the theory and techniques learned during the two academic terms and have the opportunity to directly learn from professionals of their specific sector.
At the end of the internship you will be required to hand in a ‘Final Report’, which you will present to the Director of Studies showcasing your activities and analyzing the theories and lessons learned during the academic part.
Students who are interested can also choose to take an extracurricular course of Italian.
Classroom participation is about 30 hours per week structured in order to allow time to work in groups, while not neglecting individual students focus and management of interpersonal relationships.
This course provides students with a deep understanding of the following topics: the reference model. The analytics for understanding the pattern and the business dynamics of an enterprise. Business process analytics, market, custodian and supply chain analytics; analytics of competitors. Financial cost and revenues analytics. The use of business analytics in the design of systems for measuring the company’s performance.Visani Franco
The digital revolution has led to an explosion in the amount of available data and information (Big Data), the ability to analyze and correlate this information is becoming a fundamental element to an enterprise’s competitiveness and a new source of economic value and innovation. Big Data, however, is unable to be managed properly by using traditional instruments of Information Technologies because of their size, their heterogeneity and their many peculiarities. For this reason, new architectures, methodologies and tools are being created for data scientists to transform this data into value for the company and to support the decision-making process. This course will analyze the various types of data available, technical access to information, methods to handle them and the architectures and tools to store and process them.Ravaldi Federico
The course will explore and analyze typical problems associated with operations management and address them through quantitative modeling in support of decision making. The issues will be handled by combining a business-oriented approach with quantitative methods on a statistical and econometric basis. The main contents are related to: management of production capacity, inventory management and control, service operations, selection and monitoring of suppliers, process optimization and simulation. The main objectives of the course relate to the ability to model complex business situations and to analyze them through technical and quantitative tools designed to monitor and improve business performance, teams and individuals.Mollona Edoardo
The new priorities of marketing management: the marketing metrics and dashboard indicators of marketing. From the value for the customer to the value of the customer: customer value, satisfaction, loyalty and customer equity. Analysis, measurement and management. Customer Relationship Management: acting on acquisition, retention and development. Big Data and Customer Insight Management. Customer insights and Big Data for improving marketing decisions and management. Marketing Modeling and Marketing Analytics.Ancarani Fabio
It’s undeniable that mankind strive to build unbreakable systems, even if human history has demonstrated so far that this is nothing more than a myth. The real world is mainly made of fragile systems, so that reality is much different from the expectations.
The goal of this course is to provide a basic knowledge concerning the main concepts and principles of computer security (e.g. risk, tools for risk assessment and evaluation, attacks and their typical structure, resources, functional systems requirements, human component). In this way, the course will provide the basic tools for the design and implementation of reasonably secure systems. During this process, either methodological, technological and behavioral (i.e. operation security) aspects will be considered.
After the course, the students should be able to critically evaluate the security of a (computer) system considering both the system as a whole and its main separated components (e.g. authentication and authorization mechanisms and procedures). They will also be able to find the main vulnerabilities of such a system and to identify the more appropriate countermeasures to allow the mitigation of vulnerabilities and reduce the risk to an acceptable level.
The goals described above will be obtained not only by teaching some of the main theoretical aspects of computer security but also by describing and discussing many real world examples in detail.
The approach and the tools learned during this course are prerequisites for the following “Cryptographic Protocols” and “Computer, Network and Cloud Security” courses.D’Angelo Gabriele
Since the first mechanical automations of the 17th century, one of the great dreams of the humanity has been the construction of machines exhibiting human behaviors and intelligence. Artificial intelligence (AI) is a discipline whose goal is to realize this dream by using the most different techniques, from symbolic computation based on logic to sub-symbolic models inspired by the structure of the brain, such as neural networks.
The last few years have witnessed a sensational exploit of AI applications in many different fields – with a relevant growth of investments – inducing many experts to believe that the dream will come true in a short time.
This is inducing many companies to reconsider their business strategies and, more generally, requires a deep rethinking of several crucial aspects of our society.
The course will provide an introductory overview of the various existing AI techniques, focusing on their industrial applications, discussing future opportunities and challenges, touching also on some social, economic and ethic implications.Gabbrielli Maurizio
By following the evolution that has led to the raise of the IoT, the course discusses its main drivers, including scientific, technical, social, and business ones. Ranging from the user to the enterprise viewpoint, the course aims at providing a general overview of the IoT landscape, as well as some insights into future technical perspectives and business opportunitiesOmicini Andrea
In this course, we discuss on one hand how cybercriminals actually operate, and on the other hand the legal framework that underpins the regulatory and privacy aspects that managers have to be aware of.
In the first part, we will start discussing the technical attack vectors (XSS, SQL Injections, XSRF, drive-by download) and how these vectors are embodied in complex attacks (malware, spyware, ransomware, botnets) Then, we will see how these attacks are used in the cybercrime economy (spam, phishing, infections and money laundering), and we will touch on the economic aspects of cyber criminality, and on the markets of cybercrime as a service. Finally, we will discuss attacks sophistication, state-sponsored attacks and the emergence of a grey-market. We will make use of case-studies (e.g., Hacking Team, Stuxnet, Flame, etc).
In the second part, we will discuss the national, European and international legal framework on privacy and the protection of personal data. Particular attention will be devoted to the EU General Data Protection Regulation – which will become applicable as of May 2018 – and on the EU-US-Privacy Shield, in consideration of the relevance of the transfer of personal data to the United States. The rules will be examined in the light of roles and responsibilities of Digital Technology Managers, who have to make crucial technical and organizational choices on security and data protection, such as in the selection of cloud service providers.
Then we will touch on other legal aspects of interest for the managers of IT- and IT-based companies, such as Intellectual Property Rights, IT contracts, administrative and criminal responsibility for cybercrimes.
The hallmark of last year’s attack on the Ukrainian power grid was the extensive reconnaissance, performed by attackers on their target’s control networks, used to maximize system disruption. Situational awareness, incident response and recovery all depend on an accurate understanding of control system inventories, including normal process behavior. The Ukrainian attack has led our community to a key question; do we know our industrial control networks as well as our adversaries?
Despite the emergence of technologies that monitor data flows of industrial control networks, energy operators consistently cite inadequate real time views to control system the topology, devices, and behavior as a fundamental obstacle to securing their operations. Historically, gathering and maintaining this information has proven incredibly labor intensive and disruptive to economic operations for energy operators.
The course will explore emerging technology and process-centric analytics that can facilitate more automated, passive methods of inventory collection, network monitoring and the definition of normal behavior of industrial control systems. These emergent technologies can enable operators to baseline normal operational process behavior and measure network loading. The course will explore the operational and safety benefits of automated inventory technologies such as improved visibility to misconfigurations and early detection of device failures. While improving operability, these technologies also hold the promise of expedited detection of adversaries’ reconnaissance activities and improved recovery timesMontrasi Edoardo
Systems security is a prerequisite to achieve information security to the fullest extent. This module deals with the two broad “classical” themes of host security and network security, and their specific characterization in the context of cloud computing.
The steps to secure a host, whether connected to a network or not, will be illustrated starting from physical security and access control, and proceeding to analyze the most common methods used by attackers to break the configured barriers, as well as the tools that, as a last but fundamental resort, allow to detect a successful break-in.
Network security will mainly be investigated in terms of tools that add protection layers to host security (since the protection of network traffic between applications is one of the subjects of the Cryptography module). Firewalls and VPNs are the two main subjects discussed in this part of the module.
The same concepts will be expanded with a specific focus on cloud systems, where the concentration of business activities on remote platforms, the total delegation of infrastructural management and the high degree of resource sharing exacerbate the issues of availability, trust, and authentication/authorization.Prandini Marco
The course provides a global overview about the problem of mapping the cybernetic risks and their management, showing the current regulations and the situation in Italy. The course will focus on the following topics:
1) Introduction to the Cybersecurity problem: Aims and extent of the problem; Incident examples; Corporate Risks; Motivation of the Attackers; Inability to find global solutions.
2) Cybersecurity and Cyberspace: Definitions; CIA properties and attacks against them.
3) Malware and Cyberattacks: Definitions; Case studies and known Malware;
4) Cyberwar: Evolution of the attackers; From the worm to the Advanced Persistent Threat. Numbers and Countries behind the cyberwar.
5) Privacy in communications: End-to-end encoded channels; Encoded e-mails; Visible services not for intelligence purposes.
6) Cyber Risk Management: Definitions; Top-down and bottom-up risk approach. ISO 27001, NIST sp800-53 and other standards; Cybersecurity frameworks; National Framework for Cybersecurity and Essential PMI Management; Italian national regulations.Colajanni Michele
The activity is aimed at proposing innovative business processes focused on digital technologies and new business models.
The course provides the application of the skills students improved during the classes by developing a practical project based on a real company case.
Companies involvement will be one of the pillars of this course. Companies will assign the project guidelines to the students, building them around the class profile, and will supervise the development of their projects, giving help if needed.Boscato Cristiano
The course is focused on understanding of the opportunities arisen from digital transformation, in terms of innovative business models for companies and new value for users. Specifically, the course will deepen technology forecasting and technology roadmapping methodologies, applied to emerging digital trends, focusing on Fintech, IoT and Artificial Intelligence.
Over the last decade sustainability, corporate social responsibility and stakeholder management practices have become paramount for companies as well as for society. Although most companies have developed sustainability programs over the years, as they’re cutting carbon emissions, reducing waste, and otherwise enhancing operational efficiency, we are witnessing a mishmash of sustainability tactics that does not add up to a sustainable strategy. To endure, a sustainable strategy has to cope with the competing – and apparently divergent – interests of all stakeholders: investors, employees, customers, governments, NGOs, and society. The purpose of this course is to initiate a debate around the role and functioning of modern corporations as business ethics and sustainability challenges, opportunities and solutions emerge.Mura Matteo
The main aim of our teaching staff is to first lay down a solid grounding of theory and then to build on this foundation by introducing more practical aspects. This method will result in you confidently entering the work environment of this industry, ready to deal with any scenario you will face.
The courses are structured to give the maximum freedom to learn to the students and allow the professors to teach and assess the students in the best way possible. Assessments can take the form of individual/group presentations, projects, oral and written exams as well as, of course, class participation.
The teaching sessions are organized to help students grasp these concepts and techniques through the use of lectures and seminars; group projects and company visits; guest speakers and case studies; videos and presentations; as well as individual assignments and assisted private studying. The teaching program is completed by masters lectures given by professionals coming from specific sectors, different universities or politics. Students will have this way the possibility to directly interact with experts through the analysis of case history.
The integration with companies is a priority and an ever-present feature of all programs of the Bologna Business School, hence for the Master in Digital Technology Management too.
The School is fully committed to creating employability, by way of a systematic career service action, constantly focused on matching at best the students’ professional projects with the needs companies have.
The internship is an exceptional springboard, suffice it to say that six months after the end of the full-time masters at Bologna Business School on average 91% of students work in a company.
The BBS Career Service assists and supports students since the very beginning, along a training and professional development path. This is accomplished by organizing a series of workshops, with the aim of providing the fundamental tools and resources to be appropriately prepared for the labor market.
To achieve this goal, students are involved in several workshops, among which we may list:
In addition to this, thanks to the collaboration with professional career counselors, students receive a customized service, in order to understand their strengths and to build a professional development plan, which will turn out to be helpful when looking for an internship. Here follow some of the activities:
Trough the Master in Digital Technology Management – Cyber Security it is possible, once having completed in the companies the years of experience required, to become a Chief Information Security Officer (CISO).
Jovana Perovic – Montenegro
MDTM (A.Y. 2017/2018)
"Enrolling at BBS was one of the best decisions of my life. With the wide range of professionals we had as professor, not only I got an opportunity to study what I am passionate about, but I had an opportunity to discover new fields I never thought I would want to explore. The Master helped my personal and professional growth. This experience introduced me to cultural diversity, network of companies and opened the door of a global company to me. I am honored to be part of the BBS family."
Cynthia Wanza – Kenya
Eliwell by Schneider Electric
MDTM (A.Y. 2017/2018)
"Doing my masters was necessary in order for me to advance in my career. I chose BBS because it has a short intensive time period and also because of the opportunity to perform an internship after classes. Through the self and team projects, I was able to apply my academic knowledge and greatly enhance my soft skills. In this way, BBS prepared me for my career move at one of the top technological companies!"
The goal of the Career Service is also to allow students to connect with national and international companies. Over the years, Bologna Business School has managed to establish a wide-ranging network and a sound partnership with leading companies in Italy, thanks to a personalized approach, based on each company’s needs. The collaboration features the following activities:
If you need more information regarding the composition of the class such as age, geographic origin and students’ background, you can download the class profile, clicking here: class profile DigitalTec
Our partners are the foremost supporters of our students, with the provision of scholarships, internships and professional opportunities.
Bologna Business School’s partner companies for the Master in Digital Technology Management are:
ACCENTURE AGM SOLUTIONS BANCA INTESA SANPAOLO BIP BORSA ITALIANA (LONDON STOCK EXCHANGE GROUP) BTO CRIF DATALOGIC DEEPCYBER DIENNEA DOXEE ELECTROLUX HELIXA KANTAR CONSULTING MAX MARA FASHION GROUP NTT DATA ONIT PHILIP MORRIS INTERNATIONAL SCHNEIDER ELECTRIC SCM GROUP SPINDOX TUTELA DIGITALE UNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION YOOX NET-A-PORTER GROUP
The tuition fees for the Master is 14,800 euro (VAT free) to be paid in three installments:
The fee includes participation in the Master, all the study material available through the online platform, and access to the services and facilities of Bologna Business School such as: personal account for the Alma wi-fi, use of the PCs in the Computer Lab, access to the study areas, access to the internal gym, special rates for the School restaurant. Furthermore, the fee gives participants the right to take advantage of the supporting activities of the School, such as the language courses and the master lectures by invitation.
Free parking is also available within BBS Campus.
Additionally, with the Student Card of the University of Bologna, students have access to all of the university facilities, including over 100 libraries, digital resources and study halls (including databases and online subscriptions); the three city center canteens and all university student related discount offers. More information is available on the site of the University of Bologna: http://www.unibo.it/en/services-and-opportunities/index.html
Participants are eligible to apply for Honor Loan with subsidised rate up to the complete coverage of the application fee.
For more information please mail to email@example.com
At Bologna Business School we understand the importance of financial aid in supporting our students to achieve their educational goals. We are aware that an advanced, high quality training path can be a significant commitment, at the same time we also truly believe that investing in one’s future always pays back.
Bologna Business School is pleased to offer partial scholarships to the most meriting students. All of these scholarships are merit-based and will be awarded to the top-ranked candidates in the selection process. The students who come out on top in the selections will be students who not only come from strong academic or practical backgrounds but also those who display the strongest motivation to take part in this program.
There are scholarships of 6,000 euros and scholarships of 4,000 euros. All applicants will be considered for a scholarship – no specific application is required. They are awarded over the course of every round of selection and if you have performed well enough to merit one of them, you will be informed at the moment of admission.
The scholarships act as tuition waivers, so that they result in a deduction of the total amount of the tuition fees due.
The Italian National Security Institute (INPS) supports students attending I and II level Master’s Degrees with a public announcement and related scholarships of a maximum of 10.000€.
The scholarships are for sons and daughters of both INPS members and deceased INPS members.
You can check the requirements to apply to the scholarships on the INPS portal and apply by sending your application no later than Wednesday, October 30 2019 at 12 PM.
For the registration it is necessary:
Admission to the program is subject to the positive assessment of your individual interview and English test, if it’s not the candidate’s native language.
This Master’s is open to all applicants with a bachelor’s degree obtained before the enrolment deadline of each round.
Documents to send to firstname.lastname@example.org:
The selection process will be held at Bologna Business School. The selections for the first round will take place in May, 2020 while the selections for the second round will take place in July, 2020. The selections for the third round will take place in October 2020.
In line with the number of available places, admission to the program is granted according to the position on the list of qualified candidates, drawn up on the basis of the total score awarded at the end of the admissions process.
Detailed information on the requirements and application process are available in the “Official Call for Applications” downloadable below.Call for applications International student info
Of course we will. Non-EU citizens have to apply for a student visa before being able to commence their studies. We can provide you with a letter of admission as well as a letter of support, which you can use to make your visa application. In the case of particular problems our staff will be ready to contact embassies directly to discover the source of the problem and solutions to fix it.
After you arrive in Italy, you will be required to apply for a residence permit. Our staff will be able to help you fill out the forms and give you any support you need for this process as well.
Yes. The course is open to people of all nationalities regardless of where their previous studies have taken place. Please note, however, that admission is dependent upon you presenting one of two potential documents. If you have graduated from a university in the European Union then you will be able to get a European Diploma Supplement directly from that university. If possible, this should be submitted with your application. If you have graduated from outside the European Union then you will need to request a Declaration of Value from the Italian embassy/consulate present in the country where you graduated. Details on how to obtain this document can be found on the website of the relevant Italian embassy/consulate. If possible, this declaration of value should be submitted with your application. If not possible then it can be submitted at a later date but you will only be provisionally admitted until you do so.
Yes. Don’t worry if you if you are unable to present a IELTS or TOEFL, your level of English will be assessed during the selection process. You can be excused from the need to present proof of your English level if you are a native English speaker.
Upon registration and payment of the admission fee, you must submit or send via registered mail to Alma Bologna Business School (Via degli Scalini 18-40136 Bologna), the following documents:
• a copy of the receipt for the fee of 60.00 euro for administrative services;
• summary sheet;
• a copy of your ID;
• Undergraduate Degree (or substitute statement);
• curriculum vitae;
• any additional titles to be assessed for admission purposes.
The University of Bologna uses the ECTS system accurately applying the European Credit Transfer System (ECTS) in all courses of the first cycle (Laurea), second cycle (Laurea Magistrale) and unified cycle. ECTS is a recognized standard created with the goal of supporting mobility and cultural exchange among students at the European level. This standard allows for the comparison of credit systems used by Universities and higher education institutions in Europe, to plan and implement the learning path of students. This allows students who study in one country to see their studies recognized at an institution in another country that applies the same standard.
Faculty members at Bologna Business School work together offering outstanding teaching standards. An international and interdisciplinary approach is guaranteed by a joint team of distinguished national core professors, adjunct, visiting professors, guest speakers and top managers.
Associate Dean - Full Professor of Marketing
University of Bologna
Owner Injenia and Antica Innoveria 1.6
President School of Science
Full Professor of Information Security and Networks Systems and Applications
University of Modena and Reggio Emilia
University of Bologna
Eindhoven University of Technology
Full Professor of Computer Science and Engineering
University of Bologna
Adjunct Professor of Business Economics
University of Bologna
Full Professor of Marketing
University of Bologna
ICT Security Consultant
Associate Professor of Performance Management
University of Bologna
Full Professor at the Department of Computer Science and Engineering (DISI)
University of Bologna
University of Bologna
Founder Partner & CEO
Freelance ICT security & audit consultant
Associate Professor of Business Economics
University of Bologna