Executive Master In Cybersecurity Management
Who is the programme aimed at?
Profile
This programme is intended for professionals requiring managerial and practical knowledge of the six domains representing the pillars of cybersecurity activities and management practices.
Key admissions criteria
- At least 5 years as a digital or cybersecurity manager
- Actively involved in digital or cybersecurity activities and decision-making.
Your benefits
Boost your Cybersecurity management career and focus on essential domains of knowledge and practice.
Aligned with European standards, regulations, and practices, the Executive Master in Cybersecurity Management addresses essential domains of knowledge, as well as fundamental challenges in order to protect organisations from cyber threats. Thanks to effective pre readings and an intensive self-research activity during the ACQUIRE part, participants get full access to the following resources during the entire academic year:
- Perlego books database
- ISO Standards in read only mode
- ISACA membership including all available books, references, journal articles, and bodies of knowledge
- CANVAS learning Management System with all shared material
And thanks to the new blended learning model, the Executive Master in Cybersecurity takes a new shape to enable participation across Europe.
Accessible across Europe with a hybrid educational model, designed for cybersecurity professionals. Combine this engaging study
experience with your current professional activity.
The course entails:
- Group work in groups of 3-5 in average when developing the business case study for each individual module.
- Individual pre-reading and research activity with guidance and coaching.
- Lecture from senior experts and guest lecturers during the two days on-site classes on per module.
- Presentation of each group case to the jury at the end of each lectured module.
Overview of the programme
This programme is intended for professionals requiring managerial and practical knowledge of the six domains representing the pillars of cybersecurity activities and management practices.
Combination of 6 bodies of knowledge
1 . Information Security Leadership
January - February 2024
The core management activities of a modern information security leader include the security governance process, the risk management process, the programme management process and the incident management process. This module will cover the job description of a typical CISO today and where the CISO fits within the organisation including reporting lines and responsibilities, skills and expertise; talk about the typical challenges CISO’s face in their role.
2 . Security Controls
March - April 2024
This module will take participants through the process of analysing context, defining scope, modelling threats, defining security controls and requirements, considering the solution space for controls, including technologies and operating models, and then finally evaluating risk (Inherent vs. Residual) and anchoring in policy, providing assurance that the controls operate as intended, e.g., for the purpose of internal or external assurance obligations or certification. This part builds on concepts introduced in module 1
(Information Security Leadership).
3 . Security Architecture
May - June 2024
Often people talk about “security-by-design” or “privacy-by-design”. Indeed, security cannot be “bolted on” at a later stage effectively. The better security is embedded “by design” in all layers of your organization’s business, enterprise, and
solution architecture and the better it is embedded in your design/delivery as well as run and operations, the better you will be able to understand your security posture and outstanding gaps and risks.
4 . Security Operations
September - October 2024
This module will build upon the concepts of the previous modules where Information Security Governance, the Implementation of Security Controls, implementing a Secure Architecture are key building blocks to set up a qualitative Security Operations team.
5 . Cybersecurity Battleground
November - December 2024
Cybersecurity management practices require the knowledge of own business, its functional and technical vulnerabilities and the threat landscape that needs to be addressed. The capabilities that require building cybersecurity capacity includes Identification, Protection, Detection, Response and Recovery techniques and processes.
6 . General Management
Spread over the year
This module will take participants through the basics of General Management dedicated to Cybersecurity and Digital professionals. There will be four parts: Finance, Strategy, Leadership and Human Capital. In the first part, participants will better understand the art and the language of finance. The topics that should be reviewed are the challenges of the income statement, the balance
sheet, cash, financial ratios, return on investment and working capital.
More programme features
Blended and Hybrid education model
Each module is delivered in two months through self-paced studying and in-person classes ( 2 full days on campus every 2 months). Blended Learning method is applied for each module as follows:
1. Acquire part entails 3 offline weeks of pre-reading guided by a coach and 4-8 hours of self-learning per week. Participants have access to recommended pre-reading materials, ISO standards, PERLEGO, ISACA membership with several hundred books, articles and bodies of knowledge to complete the "Acquire" part.
2. Evaluate part consists of a short questionnaire to check the progress of preparations for 2 full days classes on-site.
3. Build part entails attending classes and workshops during 2 full days on campus, led by an experienced coach and guest speakers who are leading cybersecurity experts.
4. Practice part entails working together on a group case study with group peers ( small groups of 3-5 people). Thanks to the knowledge acquired during each module and phase, participants create/develop their own management reports to resolve the case study challenges.
5. Deliver part - during this phase participants present their module case study with group peers. At the end of each module participants take a multiple- choice questionnaire for evaluation of acquired knowledge during the module.
Adjusted to your own needs and career targets
- A career development tool is available to participants in order to identify strong and weak skills based on their own self-assessment and the role that they select.On that basis, they adjust their education experience to focus on those domains that they require most.
- Based on the survey results, participants adjust their efforts to focus on those domains that they require the most for the target role.A personal acceptance interview is conducted to formalise the study plan and to level up the participants.
- As a result, both phases 1 (Acquire) and 4 (Case study) are required to address those focus areas.
- An acceptance interview is conducted with each candidate to assess your “fit” with the program, define your goals and motivations to join the program, and outline a study plan.
- Another interview is conducted before graduation to evaluate improvement on those skills that were identified as weak by participants.
Participants.
My expectations were high. I knew already that it would be something advanced but it took me by surprise how great it is to be among these top level cyber managers and experts. You get to meet a lot of people who work in the field that otherwise you wouldn’t. I get to spend time with the best of the best in the cyber world and learn a lot. Definitely worth applying for the programme. I manage to do it from Montenegro so everything is possible!
I was blown away by the quality presentations and experience of exceptional peers who shared their insights. The experience left me feeling inspired and empowered, and I'm grateful for the opportunity to learn from such a talented and accomplished group of professionals. If you're interested in cybersecurity management, I highly recommend considering the Executive Master in Cybersecurity Management programme. The caliber of speakers and the depth of knowledge offered are truly unparalleled.
The course was a great learning experience and it opened for me a new career opportunity in Cybersecurity. I learned a lot from the discussions and exchanges on information security topics, and I was able to built an expanded professional network to advance my career in Information Security.
Academic Leadership & Faculty
This "HR issue" is what is going to limit us in the years to come".
Partners
Leading Belgian business school
Any questions?
The Executive Master in CyberSecurity Management holds accreditations from EQUIS, Qfor, and KMO Portefeuille. Upon completion of the programme, graduates will receive a University Certificate awarded by ULB, recognising their achievement.
![]() |
![]() |
![]() |