Module 2 of 4
In Progress

Module 2: Digital transformation and cybersecurity

OVERVIEW

This module includes an introduction to the concept of digital transformation to better understand the importance of cybersecurity in the digitalised world, especially in the world of work – from industry to service or any other type of organisation.

Digital transformation is the integration of digital technologies into all aspects of a business or organisation, which leads to a significant change in the way it operates. This change is often driven by the need to improve efficiency, customer experience, and competitive advantage. Digital transformation includes several concepts such as cloud computing, big data, artificial intelligence, internet of things, and more, which will be addressed within this module.

However, digital transformation also brings new challenges, particularly in the context of cybersecurity. The increasing use of technology and digital processes increases the risk of cyber-attacks, data breaches, and other security incidents. Some of the cybersecurity considerations in the context of digital transformation include the use of strong passwords, data encryption, network security, and employee training.

The emphasis will be put on the different concepts related to the industry, such as Industry 4.0 and 5.0. However, the advanced technologies presented in this module have penetrated all spheres of society in general. In this sense, getting to know these concepts and studying the examples provided, you will be able to better understand how digital transformation affects society and businesses in the 21st century, as well as become more aware of the vulnerabilities of organisations, companies, and individuals, in digitalised world and economy.

KEY WORDS

LEARNING OBJECTIVES

By the end of this module, participants should be able to achieve the following learning outcomes:

Knowledge:
Skills:
Competences:
Time schedule

Time necessary for: F2F/guided learning: 1,5 hours.

Learning content (self-directed learning): 0,5 hours.

Reflection questions: 15 minutes.

Useful References And Resources

I-scoop. (n.d.) "What is digital business transformation? The essential guide to DX.  https://www.i-scoop.eu/digital-transformation/

Forbes (Zerlang Jasper) "Why Cybersecurity Is The Springboard For Successful Digital Transformation". https://www.forbes.com/sites/forbestechcouncil/2022/06/09/why-cybersecurity-is-the-springboard-for-successful-digital-transformation/?sh=54ed823362cb

Purplesec.us (n. d.)" Cyber Security StatisticsThe Ultimate List Of Stats Data, & Trends For 2022". https://purplesec.us/resources/cyber-security-statistics/#Cybercrime

Burger Gregor (2022), “Zavedanje pomena kibernetske varnosti v letu 2022”. https://dihslovenia.si/assets/images/GregorBurger_Zavedanje_pomena_kibernetske_varnosti_v_letu_2022.pdf

Whatfix, (n. d.) "What Is Digital Transformation?".                                                https://whatfix.com/digital-transformation/

Min Xu, Jeanne M David & Suk Kim (2018) "The Fourth Revolution: Opportunities and Challenges".  https://cdn.lgseta.co.za/resources/research_and_reports/4IR%20Resources/The%204IR_Opportunities_and%20Challenges_Min%20Xu,%20Jeanne%20M%20David%20and%20Suk%20Hi%20Kim_2018.pdf

IBM. (n. d) "How Industry 4.0 technologies are changing manufacturing". https://www.ibm.com/topics/industry-4-0

I-scoop. (n.d.) "Industry 4.0 and the fourth industrial revolution explained".                       https://www.i-scoop.eu/industry-4-0/

"Smeart University-Business Cooperation Model and Guidelines, Erasmus+ Programme of the European Union. 2019".                                                                  http://www.smeart.eu/en/results/handbook-smeart/SMeART_Handbook_2019__web_EN.pdf (Handbook)

UniversalRobots (n.d.) "Making a difference".                                                    https://www.universal-robots.com/about-universal-robots/

I-scoop. (n.d.) "Smart cities: acceleration, technology, cases and evolutions".                   https://www.i-scoop.eu/internet-of-things-iot/smart-cities-smart-city/

Internet of Things Global Standards Initiative (n. d) "IOT definition" https://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx

Vogt, A., Dransfeld, W., in Landrock, H. M. (2016). Industrie 4.0/Internet of Things, vendor benchmark [White paper]. Experto Group.

Technopedia (n.d.) "What Does Artificial Intelligence (AI) Mean?". https://www.techopedia.com/definition/190/artificial-intelligence-ai

TechTarget (Rahul Awati) "High-performance computing". https://www.techtarget.com/searchdatacenter/definition/high-performance-computing-HPC

I-scoop. (n.d.) "Big data and analytics: definitions, value, trends and applications".    https://www.i-scoop.eu/big-data-action-value-context/

Hiscox Cyber Readiness Report 2022. https://www.hiscoxgroup.com/sites/group/files/documents/2022-05/22054%20-%20Hiscox%20Cyber%20Readiness%20Report%202022-EN_0.pdf

Deloite (n.d.) "5 Key Cybersecurity Tips for Small Businesses for 2022." https://www2.deloitte.com/content/dam/Deloitte/de/Documents/risk/Deloitte-European-Cyber-Defense-Report-Part-2.pdf

Glas Gospodarstva, oktober 2022, Kelkedi Željka “Podjetja, še posebej MSP-ji, morajo vlagati v kibernetsko varnost”. https://www.gzs.si/Portals/SN-informacije-Pomoc/Vsebine/GG/2022/oktober/gg_10_lores.pdf

Apac Enterpreneur (n.d.) "5 Key Cybersecurity Tips for Small Businesses for 2022". https://apacentrepreneur.com/5-key-cybersecurity-tips-for-small-businesses-for-2022/

Invgate (Steve Manjaly.) "14 Most Common Types of Cyber Attacks (and How to Prevent Them)". https://blog.invgate.com/types-of-cyber-attacks

Expert insights (Joel Witts) "The Top 5 Biggest Cyber Security Threats That Small Businesses Face And How To Stop Them". https://expertinsights.com/insights/the-top-5-biggest-cyber-security-threats-that-small-businesses-face-and-how-to-stop-them/

Expert insights (Joel Witts) "The Top 5 Biggest Cyber Security Threats That Small Businesses Face And How To Stop Them". https://expertinsights.com/insights/the-top-5-biggest-cyber-security-threats-that-small-businesses-face-and-how-to-stop-them/

The Daily Swig (Jessica Haworth) "Data breach at healthcare provider Elara Caring exposes 100,000 patients' information". https://portswigger.net/daily-swig/data-breach-at-healthcare-provider-elara-caring-exposes-100-000-patients-information

The Gurdian (n. d.) "Data breach at healthcare provider Elara Caring exposes 100,000 patients' information". https://www.theguardian.com/society/2017/may/12/hospitals-across-england-hit-by-large-scale-cyber-attack

ZD net (Jonathan Greig) "Shell forced to reroute supplies after cyberattack on two German oil companies". https://www.zdnet.com/article/shell-forced-re-route-oil-supplies-after-cyberattack-on-german-companies/

Electric (n.d.) "High-Profile Company Data Breaches 2022".             https://www.electric.ai/blog/recent-big-company-data-breaches

United States Department of Justice (n.d.) "Former employee of medical packaging company charged with sabotaging electronic shipping records leading to the delay of PPE to healthcare providers".             https://www.justice.gov/usao-ndga/pr/former-employee-medical-packaging-company-allegedly-sabotages-electronic-shipping

CRN (n.d.) "10 Emerging Cybersecurity Trends To Watch In 2022".             https://www.crn.com/slide-shows/security/10-emerging-cybersecurity-trends-to-watch-in-2022

Deloitte (n.d.) "European Cyber Defense Part 2: Future of Cyber Security 2030". https://www2.deloitte.com/content/dam/Deloitte/de/Documents/risk/Deloitte-European-Cyber-Defense-Report-Part-2.pdf

Kaspersky (Susi O'Neill) "Predictions for Earth 2050: How will cybersecurity change?".

https://www.kaspersky.com/blog/secure-futures-magazine/earth-2050-cybersecurity/28313/

Hiscox Cyber Readiness Report 2022. https://www.hiscoxgroup.com/cyber-readiness

https://www.qualcomm.com/5g/what-is-5g

 

Videos:

https://www.youtube.com/watch?v=P5tgm7qY88Q

https://www.youtube.com/watch?v=Leifj6M7m9Y

Cisco Insights 16: Digital Transformation and Cybersecurity in the Public Sector

Cisco Insights 13: Cybersecurity in the Digital Transformation of Critical Infrastructure

Baking Cybersecurity into Digital Transformation