PGE 2A - Marketing digital
Information security management
Information systems management
Contact hours
27 H
Number of spots
Open to visitors

Pedagogical contribution of the course to the program

LEARNING GOAL 1 : Students will master state-of-the-art knowledge and tools in management fields in general, as well as in areas specific to the specialized field of management.

Students will identify a business organization’s operational and managerial challenges in a complex and evolving environment.
Students will understand state-of-the-art management concepts and tools and use them appropriately.
Students will implement appropriate methodologies to develop appropriate solutions for business issues.
LEARNING GOAL 2 : Students will develop advanced-level managerial skills.
Students will work collaboratively in a team.
Students will communicate ideas effectively, both orally and in writing, in a business context.
LEARNING GOAL 3 : Students will demonstrate their understanding of practices reflecting ethical, diversity and sustainable development values in business organizations.
Students will identify and analyze issues relating to diversity, ethics and sustainable development in their business context.
LEARNING GOAL 4: Students will study and work effectively in a multicultural and international environment.
Students will analyze business organizations and problems in a multicultural and international environment


Securing the availability, confidentiality and integrity of information became key success factors for enterprises to create, preserve, and extend their competitiveness in the information age. Information Security is an integral part of Information Systems Management going beyond IS boundaries and touching issues of HR, Marketing or Risk Management. This course provides a comprehensive overview of relevant topics in the area starting with developing a real-life security framework incl. Security Management & Governance strategies, applying international Best-Practice Standards, designing Security Strategies and Architectures, explaining the logic of Security Infrastructure and learning about Security Processes. The course combines theories with practical examples, using a case study to deepen students understanding of the topic. The course will also contain a final chapter on discussing Security Ethics encouraging critical thinking while deploying security tools.

Teaching methods


- Lectures
- E-learning
- Other :

In group

- Exercises
- Oral presentations
- Projects
- Case studies/texts


- Discussions/debates
- Games (educational, role play, simulation)


No items in this list have been checked.

Learning objectives

Cognitive domain

Upon completion of this course, students should be able to
  • - (level 1) Memorize the main theories/frameworks from InfoSec disciplines on Security Management and Governance, incl. HR Security, operational risk management etc.
  • - (level 3) Apply the principles for design of security architectures
  • - (level 3) produce a qualitative research case study.
  • - (level 4) Analyze Information Security Infrastructure elements to perform efficient and effective choices on their deployment.
  • - (level 5) Generate unanswered questions that may provide fruitful venues for research

Affective domain

Upon completion of this course, students should be able to
None affective domain have been associated with this course yet


Session 1: Introduction :The role of Information Security in Companies Session 2: Cyber Risk Management Session 3: Infonomics: The Value at Risk Session 4: CISO in Practice Session 5: Security Governance & Metrics Session 6: Global Security Standards Session 7: Security Strategies & Creating Security Awareness Session 8: Privacy Design w/ RGPD Session 9: Outlook & Ethics

No prerequisite has been provided

Knowledge in / Key concepts to master


Teaching material

Mandatory tools for the course

- Computer
- Other :

Documents in all formats

- Newspaper articles
- Case studies/texts

Moodle platform

- Upload of class documents
- Interface to submit coursework
- Assessments


No items in this list have been checked.

Additional electronic platforms

No items in this list have been checked.

Recommended reading

Course Book: Management of Information Security, 6th Edition Michael E. Whitman Michael J. Coles College of Business, Kennesaw State University/ Herbert J. Mattord Michael J. Coles College of Business, Kennesaw State University ISBN-10: 130550125X | ISBN-13: 9781305501256 592 Pages

No reading material has been provided.

EM Research: Be sure to mobilize at least one resource

Textbooks, case studies, translated material, etc. can be entered
Laura Georg Schaffner, Information security governance: pending legal responsibilities of non-executive boards, September 2016, Journal of Management and Governance 21(4), DOI: 10.1007/s10997-016-9358-0


List of assessment methods

Intermediate assessment / continuous assessment 1Class no. 2,3,4,5,6,7
Written (10 Min.) / Individual / English / Weight : 50 %
Details : Each session starts with a short quiz in moodle revisiting the content of the previous session as well as posing questions on the prepared material of the class of the day. Unexcused absences result in a reduction of 1 pt of the final grade. Excused absences can be compensated through bonus questions from quizzes of other sessions.
This evaluation is used to measure LO1.1, LO1.2, LO1.3, LO3.1
Intermediate assessment / continuous assessment 2Class no. 2,3,4,5,6,7
Written and oral (20 Min.) / Group / English / Weight : 50 %
Details : Groups of minimum of 2 students present their results of an ongoing course project at every session. The presentation must be made available to the class 2 days before the session.
This evaluation is used to measure LO1.1, LO1.2, LO1.3, LO2.1, LO2.3, LO4.2
No assessment methods have been attributed to this course yet.