This master delivers up-to-date knowledge for information security professionals in order to excel in the governance and management of their ICT risk, security and compliance responsibilities. The program represents cyber security as an enterprise-wide risk management challenge, impacting technical, organizational and governance responsibilities.
In-class sessions are organized every 3 to 4 weeks in blocks of 2 days, 11 times per academic year (not during school holidays).
Thursday from 2 pm to 10 pm
Friday from 9 am to 5 pm
The program focuses on deepening, broadening and practicing your knowledge in IT Risk & Cyber Security Management. In addition, this program holds modules on business strategy, leadership, change and data science.
The complete master track represents a 60 ECTS study load. Alternatively, you can also register for each individual module:
Data Science for Business: Big Data Driven Analytics & Practices (6 ECTS)
Master Project: evolving project, spread over the entire duration of the master program (18 ECTS)
Master Project: group and faculty coaching & feedback sessions
Leadership, Change and Personal Development
ISACA Certification Lab (optional)
Digital Transformation Labs (4) - powered by XPLUS
Executive Master Electives (2) (optional)
After attending this program, participants have further developed and broadened their professional skills in:
Governance: understand and apply governance mechanisms needed to develop and to implement security programs while taking into account business strategies such as buy and build strategies, (de)centralized IT, cloud strategies, global presence, outsourcing strategies, etc.;
Management: develop, implement and manage successfully information security & risk management strategies and policies tailored to the specific needs of the organization;
Measure: develop information security and risk management processes, integrate them in related corporate processes and associated technology & behavior, all with the objective to guarantee a good measurable corporate governance that can be monitored on its performance;
Technology: understand and develop a strategic technical implementation roadmap that is aligned with business goals and addresses contemporary architecture and technology such as cloud control, security orchestration, automation and response capabilities, all with the objective to be compliant with the internal and external regulatory requirements;
Awareness: raise organization-wide awareness in terms of information vulnerabilities, risk scenario’s and decide on action oriented information security measures and metrics;
Coordination: facilitate constructive collaboration between business requirements and technical information security experts in order to harmonize policies, operational activities (Security Operations Centers) and IT security aspects, in for example the cloud environment;
Leadership: create the right risk-aware culture with associated ownership and craftsmanship for business as well as IT. Develop, explain and execute the necessary improvements and/or adjustments on people behavior, process and technology taking into account all legal, business, society and human related aspects;
In addition, you will be well prepared to successfully obtain professional ISACA certifications such as CISA, CISM, CGEIT and CRISC.
Our experienced faculty will coach and assist you during this program. All of them have an academic career (master, PhD or DBA) and international experience in terms of career, research, project management, advisory boards and/or consulting. Many of them have published about their practice-based research, business cases and management experiences. Our faculty are experts in executive education, tailor-made programs and business consultancy.