LDR514: SANS Amsterdam September 2024

Provided by

Enquire about this course

What You Will Learn
Aligning Security Initiatives with Strategy

As security professionals, we have seen the landscape change. Cybersecurity is now more vital and relevant to the growth of your organization than ever before. As a result, information security teams have more visibility, more budget, and more opportunity. However, with this increased responsibility comes more scrutiny. This course gives you tools to become a security business leader who can build and execute strategic plans that resonate with other business executives, create effective information security policy, and develop management and leadership skills to better lead, inspire, and motivate your teams.

Policy is a manager's opportunity to express expectations for the workforce, set the boundaries of acceptable behavior, and empower people to do what they ought to be doing. These policies must be aligned with an organization's culture. In LDR514, we break down the steps to policy development so that you have the ability to design and assess policies that can successfully guide your organization.

Leadership is a skill that must be learned, exercised, and developed to better ensure organizational success. Strong leadership is brought about primarily through selfless devotion to the organization and staff, tireless effort in setting the example, and having the vision to see and effectively use available resources toward the end goal. Effective leadership entails persuading team members to accomplish their objectives, removing the obstacles preventing them from doing it, and maintaining the well-being of the team in support of the organization's mission. LDR514 will teach you to use management tools and frameworks to better lead, inspire, and motivate your teams.

"Really helpful and aligned with my current need in security strategy within my organization. There wasn't a day or section that was not directly applicable to issues I'm facing and strategies to address them." - Scott Quenneville, American Transmission Company
What Is Cyber Security Strategy?

Simply put, strategy is the ability to get from one place to another in a beneficial way. Your job as a leader is to figure out how to do that for your business, your team, and yourself. You need a wide combination of skills that go beyond the technical nitty gritty to progress into a more senior leadership role and build rapport with executive leadership. This includes being able to build a strategic plan, conduct gap analysis, understand both the business and threat landscape, build a compelling business case, and create effective security policy. On top of all this you must ensure that your team can actually get the work done by leading, motivating, and inspiring them to actually WANT to get the work done. In summary, the ability to build a cybersecurity strategy will help you take the next step in your career, build higher performing teams, and align cybersecurity with business objectives.
Business Takeaways

This course will help your organization:
  • Create a security plan that resonates with customers
  • Develop leaders that know how to align cybersecurity with business objectives
  • Build higher performing security teams
Skills Learned
  • How to develop strategic security plans
  • Create effective information security policy
  • Understand the different phases of the strategic planning process
  • Increase knowledge of key planning tools
  • Cultivate fundamental skills to create strategic plans that protect your company
  • Enable key innovations
  • Facilitate working effectively with your business partners
  • Advance security strategic plans that incorporate business and organizational drivers
  • Foster and assess information security policy
  • Use management and leadership techniques to motivate and inspire your team
Hands-On Cyber Security Strategy Training

LDR514 uses business case studies, fictional companies, and the Cyber42 leadership simulation game to put you in real-world scenarios that spur discussion and critical thinking of situations that you will encounter at work. This web application-based game is a continuous tabletop exercise where students play to improve security culture, manage budget and schedule, and improve security capabilities at a fictional organization. This puts you in real-world scenarios that spur discussion and critical thinking of situations that you will encounter at work.

The course also uses case studies from Harvard Business School, case scenarios, team-based exercises, and discussions that put students in real-world situations. You will be able to use these same activities with your own team members at work.
  • Section 1: LABS: CISO First Impression, Relationship Management, Strategy Map. Cyber42 Events: Cloud Migration Buy-In, Crown Jewels, Prioritizing Threat Defense
  • Section 2: LABS: Mission Statement, SWOT Analysis, Roadmap Development. Cyber42 Events: Dropbox or Bust, Making Your Case, Make Metrics Matter
  • Section 3: LABS: Positive and Negative Voicing, Vulnerability Management Policy, Cloud Computing Policy. Cyber42 Events: Where's the Policy?, Unexpected AI, Cloud Storage Policy
  • Section 4: LABS: Management and Leadership, Performance Review, Delegation. Cyber42 Events: The First Team Meeting, Strategic Communications, Employee Interactions
  • Section 5: Case Study Analysis 1 - 4. Cyber42 Events: Attack Aftermath, Merger Due Diligence, Executive Presentation
"I have truly enjoyed the labs and exercises. They have broke up the course throughout the weak. There has been a lot of information, but these exercises and labs helped us to put the knowledge into action." - Antoinette Stowers Lewis, Kaiser Permanente

"[The] strength of the course is live labs and exercise." - Ajay Kumar, National Grid

"I enjoy the use of Cyber 42. I particularly enjoyed the extra addition of going through the answers and discussing which answers had what effects to everyone's scores." - Alexander Walker, TechVets

"I love the lab and exercises. They are exactly what I am looking for as the new Marketplace Security PM on my team." - Rebecca Gaudet, Microsoft
Syllabus Summary
  • Section 1: Decipher the business and threat landscape
  • Section 2: Create a security team roadmap and strategic plan
  • Section 3: Develop and assess security policy
  • Section 4: Lead, motivate, and inspire your team to implement the strategic plan
  • Section 5: Analyze business school case studies using strategic planning tools from class
Additional Free Resources
  • Promoting Your Path: From Engineer to CISO, webcast
  • CISO Scorecard, poster
  • Transformational Cybersecurity Leader Triad - learn more
  • Building an Information Security Program Post-Breach, Part I - III
What You Will Receive
  • Electronic Courseware containing the entire course content
  • Printed course books
  • Access to the Cyber42 security leadership simulation game
  • MP3 audio files of the complete course lecture
What Comes Next?
  • LDR512: Security Leadership Essentials for Managers
  • LDR521: Security Culture for Leaders

Enquire

Start date Location / delivery
09 Sep 2024 Amsterdam Book now

Related article

At GIAC, we believe that hands-on testing is the future of cybersecurity certification. With five certification exams featuring CyberLive , and thr...