﻿{"id":147862,"date":"2023-10-06T15:17:41","date_gmt":"2023-10-06T13:17:41","guid":{"rendered":"https:\/\/www.ieseg.fr\/?page_id=147862"},"modified":"2025-12-04T15:46:34","modified_gmt":"2025-12-04T14:46:34","slug":"master-cybersecurity-management","status":"publish","type":"page","link":"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/master-cybersecurity-management\/","title":{"rendered":"Master in Cybersecurity Management"},"content":{"rendered":"\r\n<div id=\"keyfacts_program-block_651d52788cd98\" class=\"keyfacts_program\">\r\n\t<!-- KEYFACTS BEGIN -->\r\n\t<section class=\"keyfacts-container\">\r\n\t\t<div class=\"keyfacts-wrapper\">\r\n\t\t\t<div class=\"keyfacts-inner\">\r\n\t\t\t\t<p class=\"chapeau\">Protect your organization by becoming a leader in the exciting world of cybersecurity.<\/p>\r\n\t\t\t\t<ul class=\"keyfacts\">\r\n\t\t\t\t\t<div class=\"row_custom\">\r\n\t\t\t\t\t\t<li class=\"keyfact\">\r\n\t\t\t\t\t\t\t<div class=\"picto\">\r\n\t\t\t\t\t\t\t\t<img alt=\"Format\" src=\"https:\/\/www.ieseg.fr\/wp-content\/themes\/ieseg-2020\/dps-2020\/img\/pictos\/duree.svg\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t<!-- <p class=\"fact\">Format<\/p> -->\r\n\t\t\t\t\t\t\t\t<p class=\"key\">3 Terms + Capstone Project<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t<li class=\"keyfact\">\r\n\t\t\t\t\t\t\t<div class=\"picto\">\r\n\t\t\t\t\t\t\t\t<img alt=\"Languages\" src=\"https:\/\/www.ieseg.fr\/wp-content\/themes\/ieseg-2020\/dps-2020\/img\/pictos\/langues.svg\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t<!-- <p class=\"fact\">Language<\/p> -->\r\n\t\t\t\t\t\t\t\t<p class=\"key\">English<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t<li class=\"keyfact\">\r\n\t\t\t\t\t\t\t<div class=\"picto\">\r\n\t\t\t\t\t\t\t\t<img alt=\"Location\" src=\"https:\/\/www.ieseg.fr\/wp-content\/themes\/ieseg-2020\/dps-2020\/img\/pictos\/location-white.svg\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t<!-- <p class=\"fact\">Location<\/p> -->\r\n\t\t\t\t\t\t\t\t<p class=\"key\">Lille<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"row_custom\">\r\n\r\n\t\t\t\t\t\t<li class=\"keyfact\">\r\n\t\t\t\t\t\t\t<div class=\"picto\">\r\n\t\t\t\t\t\t\t\t<img alt=\"Fees\" src=\"https:\/\/www.ieseg.fr\/wp-content\/themes\/ieseg-2020\/dps-2020\/img\/pictos\/cout.svg\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t<!-- <p class=\"fact\">Fee<\/p> -->\r\n\t\t\t\t\t\t\t\t<p class=\"key\">\u20ac18,800 (Fast Track) \/ \u20ac21,800 (Regular Track)<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t<li class=\"keyfact\">\r\n\t\t\t\t\t\t\t<div class=\"picto\">\r\n\t\t\t\t\t\t\t\t<img alt=\"Intake\" src=\"https:\/\/www.ieseg.fr\/wp-content\/themes\/ieseg-2020\/dps-2020\/img\/pictos\/rentree.svg\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t<!-- <p class=\"fact\">Intake<\/p> -->\r\n\t\t\t\t\t\t\t\t<p class=\"key\">September<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"keyfact\">\r\n\t\t\t\t\t\t\t\t<div class=\"picto\">\r\n\t\t\t\t\t\t\t\t\t<img alt=\"Credits\" src=\"https:\/\/www.ieseg.fr\/wp-content\/themes\/ieseg-2020\/dps-2020\/img\/pictos\/credits.svg\">\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t\t<!-- <p class=\"fact\">Credits<\/p> -->\r\n\t\t\t\t\t\t\t\t\t<p class=\"key\">120 ECTS<\/p>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t\t\t\t<div class=\"accreditations\">\r\n\t\t\t\t\t\t<!-- <img alt=\"Format\" src=\"\">-->\r\n\r\n\t\t\t\t\t\t<p>Accreditations<\/p>\r\n\t\t\t\t\t\t<!--picto1-->\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.ieseg.fr\/en\/accreditations-labels-business-school\/\"><img alt=\"\" src=\"https:\/\/www.ieseg.fr\/wp-content\/themes\/ieseg-2020\/blocks\/programme_blocks\/keyfacts\/img\/logo_accred_AACSB.png\"><\/a>\r\n\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t<!--picto2-->\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t<!--picto3-->\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t<!--picto4-->\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t<!--picto5-->\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.ieseg.fr\/en\/accreditations-labels-business-school\/\"><img alt=\"\" src=\"https:\/\/www.ieseg.fr\/wp-content\/themes\/ieseg-2020\/blocks\/programme_blocks\/keyfacts\/img\/logo_accred_GRANDES_ECOLES.png\"><\/a>\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t<!--picto6-->\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t<!--picto7-->\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t<!--picto8-->\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.ieseg.fr\/en\/accreditations-labels-business-school\/\"><img alt=\"\" src=\"https:\/\/www.ieseg.fr\/wp-content\/themes\/ieseg-2020\/blocks\/programme_blocks\/keyfacts\/img\/logo_accred_gm.png\"><\/a>\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t<!--picto9-->\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.ieseg.fr\/en\/accreditations-labels-business-school\/\"><img alt=\"\" src=\"https:\/\/www.ieseg.fr\/wp-content\/themes\/ieseg-2020\/blocks\/programme_blocks\/keyfacts\/img\/logo_accred_VISE.png\"><\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/section>\r\n\t<!-- KEYFACTS END -->\r\n\t<!-- SOUS-MENU BEGIN -->\r\n\t<section class=\"sousmenu-container\">\r\n\t\t<div class=\"sousmenu-wrapper\">\r\n\t\t\t<div class=\"sousmenu-inner\">\r\n\t\t\t\t<nav class=\"sousmenu-nav\">\r\n\t\t\t\t\t<ul>\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<li class=\"active\"><p><span>Overview<\/span><\/p><\/li><li><a href=\"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/master-cybersecurity-management\/program-content\/\"><span>Program Content<\/span><\/a><\/li><li><a href=\"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/master-cybersecurity-management\/admission-fees\/\"><span>Admission &#038; Fees<\/span><\/a><\/li><li><a href=\"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/faq\/\"><span>FAQ<\/span><\/a><\/li>\t\t\t\t\t\t\r\n\r\n\t\t\t\t\t<\/ul>\r\n\t\t\t\t<\/nav>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/section>\r\n\t<!-- SOUS-MENU END -->\r\n<\/div>\n\n\n<div class=\"wp-container-3 wp-block-group block_modulable-container gray\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-container-2 wp-block-group block_modulable-wrapper\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-container-1 wp-block-group block_modulable-inner\"><div class=\"wp-block-group__inner-container\">\n<h2>Master in Cybersecurity Management<\/h2>\n\n\n\n<p><strong>The Master in Cybersecurity Management is a program completely taught in English designed for participants who wish to master the technical and business knowledge and skills to manage organizational cyber risk. Interactive lessons by academic and industry experts provide fundamental technical knowledge in addition to managerial and leadership skills. Program participants will have the opportunity to earn two industry-recognized certifications to demonstrate their expertise.<\/strong><\/p>\n\n\n\n<p>This master delivers up-to-date knowledge for organizational leaders to excel in the governance and management of their IT risk, security, and compliance responsibilities. The program represents cybersecurity as an enterprise-wide risk management challenge, impacting technical, organizational and governance responsibilities.<\/p>\n\n\n\n<p>Our interdisciplinary program provides participants with the necessary technical foundations, allowing participants without a technical background to enroll. During the program, participants will have the opportunity to earn two industry-recognized certifications: the CompTIA Security+ and a second CompTIA certification aligned with the participant\u2019s career goals.<\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div id=\"directeur_block-block_651d57630e7c2\" class=\"directeur_block\">\n    <!-- MOT DU DIRECTEUR STARTS-->\n    <section class=\"directeur-container\">\n        <div class=\"directeur-wrapper\">\n            <div class=\"directeur-inner\">\n\t\t\t\t                    <h2 class=\"titre\">Director\u2019s Foreword<\/h2>\n\t\t\t\t\n                <article class=\"directeur\">\n                    <div class=\"infos\">\n                        <h3 class=\"titre\">Dr. Jennifer L. ZIEGELMAYER                        <\/h3>\n                        <p class=\"meta\">Academic Director, Professor of Information Systems<\/p>\n                    <\/div>\n\n                    <div class=\"testi-excerpt\">\n                        <p>There is a common misperception that cybersecurity is all about protecting your organization from hackers. While that\u2019s part of it, there are many other risks that need to be managed from electrical outages to floods, to outdated software, to employees accidentally deleting or sharing confidential data. That\u2019s why it important for cybersecurity professionals to have more than just technical skills. They need to understand legal ramifications, compliance regulations, operational logistics, and have leadership skills. Combining foundational technology skills with risk assessment, legal, and management knowledge, this program prepares participants to protect their organizations from the myriad risks that exist today and to anticipate the risks of tomorrow.<\/p>\n                    <\/div>\n                <\/article>\n            <\/div>\n        <\/div>\n    <\/section>\n    <!-- MOT DU DIRECTEUR ENDS-->\n<\/div>\n\n\n\r\n<div id=\"video_programme-block_651d58840e7c3\" class=\"video_programme\">\r\n    <!-- VIDEO BEGIN -->\r\n    <section class=\"video-container\">\r\n        <div class=\"video-wrapper\">\r\n            <div class=\"video-inner \">\r\n                <button class=\"open_player\">Discover the detailed program in video<\/button>\r\n                <div class=\"player\">\r\n                    <figure class=\"wp-block-embed-youtube aligncenter wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\r\n                        <div class=\"wp-block-embed__wrapper\">\r\n                            <iframe loading=\"lazy\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/8H2Br4Jm4UU\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\"><\/iframe>\r\n\r\n                        <\/div>\r\n                    <\/figure>\r\n                    <p class=\"chapeau\">Master in Cybersecurity Management &#8211; Presentation<\/p>                <\/div>\r\n                <button class=\"open_player\"><img src=\"https:\/\/www.ieseg.fr\/wp-content\/themes\/ieseg-2020\/dps-2020\/img\/pictos\/picto_open-player-video.svg\" \/><\/button>\r\n            <\/div>\r\n        <\/div>\r\n    <\/section>\r\n    <!-- VIDEO END -->\r\n<\/div>\n\n\n<div class=\"wp-container-6 wp-block-group block_modulable-container\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-container-5 wp-block-group block_modulable-wrapper\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-container-4 wp-block-group block_modulable-inner\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"titre2\">Key Program Advantages<\/h3>\n\n\n\n<ul><li><strong>No need to have a technology background to enroll. <\/strong>You will learn the foundational technical skills to understand the nature of cyberthreats and how to defend against them.<\/li><li><strong>Develop the knowledge, skills and abilities <\/strong>(KSAs) to embark on a technical, or managerial focused career in cybersecurity. Regardless of your background and interests, this program will prepare you to steer your career in the direction you want.<\/li><li><strong>Earn industry-recognized certifications<\/strong> to set you apart from the crowd. Each participant will have the opportunity to earn two CompTIA certifications as part of the program.<\/li><\/ul>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-container-9 wp-block-group block_modulable-container gray\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-container-8 wp-block-group block_modulable-wrapper\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-container-7 wp-block-group block_modulable-inner\"><div class=\"wp-block-group__inner-container\">\n<h2>Master Degree<\/h2>\n\n\n\n<p>Upon successful completion of the program (120 ECTS), students get the <strong>State-recognized \u2018Grade de Master\u2019 for this Postgraduate program<\/strong> <em>(\u201cDESMI \u2013 Dipl\u00f4me d\u2019\u00c9tudes Sp\u00e9cialis\u00e9es en Management International\u201d)<\/em>, with the specialization \u201cCybersecurity Management\u201d.<\/p>\n\n\n\n<p>The degree is delivered by the French Ministry of Higher Education and Research, and <strong>registered with the French RNCP<\/strong> (the National Registry of Professional Certification) under the number RNCP41034.<\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-container-12 wp-block-group block_modulable-container\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-container-11 wp-block-group block_modulable-wrapper\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-container-10 wp-block-group block_modulable-inner\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"titre2\">Career Opportunities<\/h3>\n\n\n\n<p><strong>This program is a good fit if you are interested in working as, for example:<\/strong><\/p>\n\n\n\n<p><strong><span class=\"chevron-orange\"><strong><span class=\"chevron-orange\">><\/span> <\/strong><\/span><\/strong>Cyber Incident Responder<br><span class=\"chevron-orange\"><strong><span class=\"chevron-orange\">><\/span> <\/strong><\/span>Threat Analyst<br><span class=\"chevron-orange\"><strong><span class=\"chevron-orange\">><\/span> <\/strong><\/span>Cyber Forensics Expert<br><span class=\"chevron-orange\"><strong><span class=\"chevron-orange\">><\/span> <\/strong><\/span>Information Assurance Analyst<br><span class=\"chevron-orange\"><strong><span class=\"chevron-orange\">><\/span> <\/strong><\/span>Cybercrime Investigator<br><strong><span class=\"chevron-orange\"><strong><span class=\"chevron-orange\">><\/span> <\/strong><\/span><\/strong>Cyber Legal Advisor<br><span class=\"chevron-orange\"><strong><span class=\"chevron-orange\">><\/span> <\/strong><\/span>IT Auditor<br><span class=\"chevron-orange\"><strong><span class=\"chevron-orange\">><\/span> <\/strong><\/span>Cyber Ops Manager<br><strong><span class=\"chevron-orange\">><\/span> <\/strong>Cybersecurity Specialist<br><strong><span class=\"chevron-orange\">><\/span> <\/strong>Cybersecurity Consultant<\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-container-15 wp-block-group block_modulable-container yellow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-container-14 wp-block-group block_modulable-wrapper\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-container-13 wp-block-group block_modulable-inner\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"titre2\">Context and Market<\/h3>\n\n\n\n<p><strong>Since 2021, a ransomware attack has occurred every 11 seconds. Increased cloud adoption and the advent of 5G networks create significantly increased vulnerability. New technologies such as the Internet of Things (IOT) are creating new targets as more devices are connected. Additionally, work-from-home policies have resulted in greater exposure to risk as employees have shifted to working on personal devices on home networks that are often shared with family members. Meanwhile, hackers are using artificial intelligence and machine learning to trigger automated attacks.<\/strong><\/p>\n\n\n\n<p>As cyber threats increase, organizations need business-oriented specialists with cybersecurity knowledge. Cyber risk goes beyond IT to incorporate legal issues, financial risk modeling, organizational behavior, and executive leadership. Cyber risk management combines the technical aspects of identifying threats, vulnerabilities, and exploits with the business aspects of setting board-level objectives, implementing enterprise risk management strategies, and demonstrating strong organizational leadership.<\/p>\n\n\n\n<p><strong><span class=\"chevron-orange\">&gt;<\/span> $4.34 million: average cost of a data breach for an organization 2022<br><\/strong><em>Source: IBM Security Cost of a Data Breach Report 2022<\/em><br><strong><span class=\"chevron-orange\">&gt;<\/span> $2.1 trillion: Cybersecurity global cost to the economy in 2019<br><\/strong><em>Source: Juniper Research<\/em><br><strong><span class=\"chevron-orange\">&gt;<\/span> 10.5 trillion: Expected global cost by 2025<br><\/strong><em>Source: Cybersecurity Ventures<br><\/em><strong><span class=\"chevron-orange\">&gt;<\/span> 3,432,476: 2022 global cybersecurity workforce gap<br><\/strong><em>Source: (ISC)2 Cybersecurity Workforce Study 2021<\/em><\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-container-18 wp-block-group block_modulable-container\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-container-17 wp-block-group block_modulable-wrapper\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-container-16 wp-block-group block_modulable-inner\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"titre2\">Class Profile<\/h3>\n\n\n\n<p>Technical skills are not the most important skills sought in today\u2019s market. In fact, employers indicate that skills such as problem solving (38%) and communication (32%) are as important as cybersecurity certifications (32%) and relevant cybersecurity experience (31%). This is because security roles are not solely technical today, but involve analysis, oversight, management, and governance \u2013 the types of skills that students develop in business schools. In fact, many cybersecurity roles don\u2019t require a strong technical background. <\/p>\n\n\n\n<p>Candidates do not need to have technical skills &#8211; as we will provide students with the foundational technology competences needed to build their knowledge of cybersecurity &#8211; and may just have an academic background in fields like:<\/p>\n\n\n\n<p><strong><span class=\"chevron-orange\">><\/span><\/strong> General Business<br><span class=\"chevron-orange\"><span class=\"chevron-orange\"><strong><span class=\"chevron-orange\">><\/span> <\/strong><\/span><\/span>Auditing<br><span class=\"chevron-orange\"><span class=\"chevron-orange\"><strong><span class=\"chevron-orange\">><\/span> <\/strong><\/span><\/span>Risk Management<br><span class=\"chevron-orange\"><span class=\"chevron-orange\"><strong><span class=\"chevron-orange\">><\/span> <\/strong><\/span><\/span>Regulatory Compliance<br><span class=\"chevron-orange\"><span class=\"chevron-orange\"><strong><span class=\"chevron-orange\">><\/span> <\/strong><\/span><\/span>Human Resources\/Human Capital Management <br><strong><span class=\"chevron-orange\"><span class=\"chevron-orange\"><strong><span class=\"chevron-orange\">><\/span> <\/strong><\/span><\/span><\/strong>Law<br><span class=\"chevron-orange\"><span class=\"chevron-orange\"><strong><span class=\"chevron-orange\">><\/span> <\/strong><\/span><\/span>Criminal Justice\/Law Enforcement<\/p>\n\n\n\n<p>In addition, Cybersecurity today is now a field with great diversity. Women represent 32% of cybersecurity specialists under the age of 30 and 49% are ethnic minorities. Half of all cybersecurity professionals under 30 come from non-IT backgrounds.<\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-container-21 wp-block-group block_modulable-container gray\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-container-20 wp-block-group block_modulable-wrapper\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-container-19 wp-block-group block_modulable-inner\"><div class=\"wp-block-group__inner-container\">\n<h2><strong>STUDY IN AN&nbsp;INTERNATIONAL ENVIRONMENT<\/strong><\/h2>\n\n\n\n<p><strong>Where our students come from?<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img src=\"https:\/\/www.ieseg.fr\/images\/program-maps\/SpecializedMasters_ClassProfile_en.png\" alt=\"\"\/><\/figure><\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-container-24 wp-block-group block_modulable-container\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-container-23 wp-block-group block_modulable-wrapper\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-container-22 wp-block-group block_modulable-inner\"><div class=\"wp-block-group__inner-container\">\n<p class=\"titre2\">Meet with us<\/p>\n\n\n\n<p><strong>All year round, I\u00c9SEG is present at many events in France and abroad<\/strong>: fairs, open days, live events, etc. Discover our next events and don\u2019t hesitate to come and meet us! We would be happy to meet with you on this occasion.<\/p>\n\n\n\n<a href=\"https:\/\/www.ieseg.fr\/en\/discover-ieseg\/meet-with-us\/\" class=\"btn btn-jaune\"> Meet with us<\/a>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Master in Cybersecurity Management The Master in Cybersecurity Management is a program completely taught in English designed for participants who wish to master the technical and business knowledge and skills [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":147864,"parent":554,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-page-programs-newsOnly.php","meta":{"inline_featured_image":false},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Master in Cybersecurity Management - I\u00c9SEG<\/title>\n<meta name=\"description\" content=\"Master in Cybersecurity Management The Master in Cybersecurity Management is a program completely taught in English designed for participants who wish to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/master-cybersecurity-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Master in Cybersecurity Management - I\u00c9SEG\" \/>\n<meta property=\"og:description\" content=\"Master in Cybersecurity Management The Master in Cybersecurity Management is a program completely taught in English designed for participants who wish to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/master-cybersecurity-management\/\" \/>\n<meta property=\"og:site_name\" content=\"I\u00c9SEG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/IESEG-School-of-Management\/358733860458?fref=ts\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-04T14:46:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ieseg.fr\/wp-content\/uploads\/2023\/10\/Master-CybersecurityManagement.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"455\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anais ANDREOSSO\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@IESEG\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ieseg.fr\/#organization\",\"name\":\"Ieseg\",\"url\":\"https:\/\/www.ieseg.fr\/\",\"sameAs\":[\"https:\/\/www.linkedin.com\/edu\/school?id=12453\",\"https:\/\/www.youtube.com\/user\/IESEGChannel\",\"https:\/\/www.facebook.com\/pages\/IESEG-School-of-Management\/358733860458?fref=ts\",\"https:\/\/twitter.com\/IESEG\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ieseg.fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ieseg.fr\/wp-content\/uploads\/IESEG-Logo-2012-rgb.jpg\",\"contentUrl\":\"https:\/\/www.ieseg.fr\/wp-content\/uploads\/IESEG-Logo-2012-rgb.jpg\",\"width\":\"1000\",\"height\":\"311\",\"caption\":\"Ieseg\"},\"image\":{\"@id\":\"https:\/\/www.ieseg.fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ieseg.fr\/#website\",\"url\":\"https:\/\/www.ieseg.fr\/\",\"name\":\"I\u00c9SEG\",\"description\":\"School of Management\",\"publisher\":{\"@id\":\"https:\/\/www.ieseg.fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ieseg.fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/master-cybersecurity-management\/#primaryimage\",\"url\":\"https:\/\/www.ieseg.fr\/wp-content\/uploads\/2023\/10\/Master-CybersecurityManagement.jpg\",\"contentUrl\":\"https:\/\/www.ieseg.fr\/wp-content\/uploads\/2023\/10\/Master-CybersecurityManagement.jpg\",\"width\":1366,\"height\":455,\"caption\":\"Master in Cybersecurity Management\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/master-cybersecurity-management\/#webpage\",\"url\":\"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/master-cybersecurity-management\/\",\"name\":\"Master in Cybersecurity Management - I\u00c9SEG\",\"isPartOf\":{\"@id\":\"https:\/\/www.ieseg.fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/master-cybersecurity-management\/#primaryimage\"},\"datePublished\":\"2023-10-06T13:17:41+00:00\",\"dateModified\":\"2025-12-04T14:46:34+00:00\",\"description\":\"Master in Cybersecurity Management The Master in Cybersecurity Management is a program completely taught in English designed for participants who wish to\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/master-cybersecurity-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/master-cybersecurity-management\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/master-cybersecurity-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"I\u00c9SEG\",\"item\":\"https:\/\/www.ieseg.fr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Programs\",\"item\":\"https:\/\/www.ieseg.fr\/en\/programs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Specialized Masters\",\"item\":\"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Master in Cybersecurity Management\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Master in Cybersecurity Management - I\u00c9SEG","description":"Master in Cybersecurity Management The Master in Cybersecurity Management is a program completely taught in English designed for participants who wish to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/master-cybersecurity-management\/","og_locale":"en_US","og_type":"article","og_title":"Master in Cybersecurity Management - I\u00c9SEG","og_description":"Master in Cybersecurity Management The Master in Cybersecurity Management is a program completely taught in English designed for participants who wish to","og_url":"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/master-cybersecurity-management\/","og_site_name":"I\u00c9SEG","article_publisher":"https:\/\/www.facebook.com\/pages\/IESEG-School-of-Management\/358733860458?fref=ts","article_modified_time":"2025-12-04T14:46:34+00:00","og_image":[{"width":1366,"height":455,"url":"https:\/\/www.ieseg.fr\/wp-content\/uploads\/2023\/10\/Master-CybersecurityManagement.jpg","type":"image\/jpeg"}],"author":"Anais ANDREOSSO","twitter_card":"summary_large_image","twitter_site":"@IESEG","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.ieseg.fr\/#organization","name":"Ieseg","url":"https:\/\/www.ieseg.fr\/","sameAs":["https:\/\/www.linkedin.com\/edu\/school?id=12453","https:\/\/www.youtube.com\/user\/IESEGChannel","https:\/\/www.facebook.com\/pages\/IESEG-School-of-Management\/358733860458?fref=ts","https:\/\/twitter.com\/IESEG"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ieseg.fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.ieseg.fr\/wp-content\/uploads\/IESEG-Logo-2012-rgb.jpg","contentUrl":"https:\/\/www.ieseg.fr\/wp-content\/uploads\/IESEG-Logo-2012-rgb.jpg","width":"1000","height":"311","caption":"Ieseg"},"image":{"@id":"https:\/\/www.ieseg.fr\/#\/schema\/logo\/image\/"}},{"@type":"WebSite","@id":"https:\/\/www.ieseg.fr\/#website","url":"https:\/\/www.ieseg.fr\/","name":"I\u00c9SEG","description":"School of Management","publisher":{"@id":"https:\/\/www.ieseg.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ieseg.fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/master-cybersecurity-management\/#primaryimage","url":"https:\/\/www.ieseg.fr\/wp-content\/uploads\/2023\/10\/Master-CybersecurityManagement.jpg","contentUrl":"https:\/\/www.ieseg.fr\/wp-content\/uploads\/2023\/10\/Master-CybersecurityManagement.jpg","width":1366,"height":455,"caption":"Master in Cybersecurity Management"},{"@type":"WebPage","@id":"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/master-cybersecurity-management\/#webpage","url":"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/master-cybersecurity-management\/","name":"Master in Cybersecurity Management - I\u00c9SEG","isPartOf":{"@id":"https:\/\/www.ieseg.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/master-cybersecurity-management\/#primaryimage"},"datePublished":"2023-10-06T13:17:41+00:00","dateModified":"2025-12-04T14:46:34+00:00","description":"Master in Cybersecurity Management The Master in Cybersecurity Management is a program completely taught in English designed for participants who wish to","breadcrumb":{"@id":"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/master-cybersecurity-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/master-cybersecurity-management\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/master-cybersecurity-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"I\u00c9SEG","item":"https:\/\/www.ieseg.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Programs","item":"https:\/\/www.ieseg.fr\/en\/programs\/"},{"@type":"ListItem","position":3,"name":"Specialized Masters","item":"https:\/\/www.ieseg.fr\/en\/programs\/specialized-masters\/"},{"@type":"ListItem","position":4,"name":"Master in Cybersecurity Management"}]}]}},"_links":{"self":[{"href":"https:\/\/www.ieseg.fr\/en\/wp-json\/wp\/v2\/pages\/147862"}],"collection":[{"href":"https:\/\/www.ieseg.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ieseg.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ieseg.fr\/en\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ieseg.fr\/en\/wp-json\/wp\/v2\/comments?post=147862"}],"version-history":[{"count":84,"href":"https:\/\/www.ieseg.fr\/en\/wp-json\/wp\/v2\/pages\/147862\/revisions"}],"predecessor-version":[{"id":183355,"href":"https:\/\/www.ieseg.fr\/en\/wp-json\/wp\/v2\/pages\/147862\/revisions\/183355"}],"up":[{"embeddable":true,"href":"https:\/\/www.ieseg.fr\/en\/wp-json\/wp\/v2\/pages\/554"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ieseg.fr\/en\/wp-json\/wp\/v2\/media\/147864"}],"wp:attachment":[{"href":"https:\/\/www.ieseg.fr\/en\/wp-json\/wp\/v2\/media?parent=147862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}