MGT514: Cyber Security Training at SANS Managing Security Risk 2023

Provided by

Enquire about this course

What You Will Learn

IMPORTANT NOTICE: SANS is in process of changing course prefixes from “MGT” to “LDR”. There is no change in course content or pricing. MGT514 will run through December 31, 2023, then LDR514 will run thereafter. Course books may reflect the “MGT” prefix even for "LDR" classes of the course during the transition. If you would like to take the course after December 31, 2023, please visit the LDR514 course page.

Aligning Security Initiatives with Strategy

As security professionals, we have seen the landscape change. Cybersecurity is now more vital and relevant to the growth of your organization than ever before. As a result, information security teams have more visibility, more budget, and more opportunity. However, with this increased responsibility comes more scrutiny. This course gives you tools to become a security business leader who can build and execute strategic plans that resonate with other business executives, create effective information security policy, and develop management and leadership skills to better lead, inspire, and motivate your teams.

Policy is a manager's opportunity to express expectations for the workforce, set the boundaries of acceptable behavior, and empower people to do what they ought to be doing. These policies must be aligned with an organization's culture. In MGT514, we break down the steps to policy development so that you have the ability to design and assess policies that can successfully guide your organization.

Leadership is a skill that must be learned, exercised, and developed to better ensure organizational success. Strong leadership is brought about primarily through selfless devotion to the organization and staff, tireless effort in setting the example, and having the vision to see and effectively use available resources toward the end goal. Effective leadership entails persuading team members to accomplish their objectives, removing the obstacles preventing them from doing it, and maintaining the well-being of the team in support of the organization's mission. MGT514 will teach you to use management tools and frameworks to better lead, inspire, and motivate your teams.

"I like that you can take the course information right to your organization and start applying it." - Matt Faps

"I don't think words can portray how valuable this course has been and will be for my imminent career." - Ben Sweet, Aviva


This course will help your organization:
  • Create a security plan that resonates with customers
  • Develop leaders that know how to align cybersecurity with business objectives
  • Build higher performing security teams
  • How to develop strategic security plans
  • Create effective information security policy
  • Understand the different phases of the strategic planning process
  • Increase knowledge of key planning tools
  • Cultivate fundamental skills to create strategic plans that protect your company
  • Enable key innovations
  • Facilitate working effectively with your business partners
  • Advance security strategic plans that incorporate business and organizational drivers
  • Foster and assess information security policy
  • Use management and leadership techniques to motivate and inspire your team

MGT514 uses business case studies, fictional companies, and the Cyber42 leadership simulation game to put you in real-world scenarios that spur discussion and critical thinking of situations that you will encounter at work. This web application-based game is a continuous tabletop exercise where students play to improve security culture, manage budget and schedule, and improve security capabilities at a fictional organization. This puts you in real-world scenarios that spur discussion and critical thinking of situations that you will encounter at work.

The course also uses case studies from Harvard Business School, case scenarios, team-based exercises, and discussions that put students in real-world situations. You will be able to use these same activities with your own team members at work.
  • Section 1: LABS: CISO First Impression, Relationship Management, Strategy Map. Cyber42 Events: Cloud Migration Buy-In, Crown Jewels, Prioritizing Threat Defense
  • Section 2: LABS: Mission Statement, SWOT Analysis, Roadmap Development. Cyber42 Events: Dropbox or Bust, Making Your Case, Make Metrics Matter
  • Section 3: LABS: Positive and Negative Voicing, Vulnerability Management Policy, Cloud Computing Policy. Cyber42 Events: Where's the Policy?, Ransomware Response, Cloud Storage Policy
  • Section 4: LABS: Management and Leadership, Performance Review, Delegation. Cyber42 Events: The First Team Meeting, Strategic Communications, Employee Interactions
  • Section 5: Case Study Analysis 1 4. Cyber42 Events: Attack Aftermath, Merger Due Diligence, Executive Presentation
"I have truly enjoyed the labs and exercises. They have broke up the course throughout the weak. There has been a lot of information, but these exercises and labs helped us to put the knowledge into action."- Antoinette Stowers Lewis, Kaiser Permanente

"[The] strength of the course is live labs and exercise."- Ajay Kumar, National Grid

"I enjoy the use of Cyber 42. I particularly enjoyed the extra addition of going through the answers and discussing which answers had what effects to everyone's scores."- Alexander Walker, TechVets

"I love the lab and exercises. They are exactly what I am looking for as the new Marketplace Security PM on my team."- Rebecca Gaudet, Microsoft

  • Section 1 - Decipher the business and threat landscape
  • Section 2 - Create a security team roadmap and strategic plan
  • Section 3 - Develop and assess security policy
  • Section 4 - Lead, motivate, and inspire your team to implement the strategic plan
  • Section 5 - Analyze business school case studies using strategic planning tools from class

  • CISO Scorecard poster
  • Rekt Casino Hack Assessment Transformational Series - Business Security Strategy, Policies, and Leadership Gone Wrong
  • Transformational Cybersecurity Leader Triad
  • Building an Information Security Program Post-Breach, Part I - III
  • Electronic Courseware containing the entire course content
  • Printed course books
  • Access to the Cyber42 security leadership simulation web app
  • MP3 audio files of the complete course lecture

  • MGT512: Security Leadership Essentials for Managers
  • MGT521: Leading Cybersecurity Change: Building a Security-Based Culture


Start date Location / delivery
25 Sep 2023 Virtual Book now

Related article

At GIAC, we believe that hands-on testing is the future of cybersecurity certification. With five certification exams featuring CyberLive , and thr...