LDR512: SANS London September 2025

Provided by

Enquire about this course

What You Will Learn
Leading Security Initiatives to Manage Information Risk

Take this security management course to learn the key elements of any modern security program. LDR512 covers a wide range of security topics across the entire security stack. Learn to quickly grasp critical information security issues and terminology, with a focus on security frameworks, security architecture, security engineering, computer/network security, vulnerability management, cryptography, data protection, security awareness, cloud security, application security, DevSecOps, generative AI (GenAI) security, and security operations.

The training course uses the Cyber42 leadership simulation game to put you in real-world scenarios that spur discussion and critical thinking of situations that you will encounter at work. Throughout the class you will participate in twenty-three Cyber42 activities.

"This is an excellent primer for management types. I come from a technical background and can see the value there plain as day." - Matt Zaycer, Pilot Flying J
What Is Security Management?

Security management is all about managing information risk. This means that you need the appropriate level of technical knowledge and leadership skills to gain the respect of technical team members, understand what technical staff are actually doing, and appropriately plan and manage security projects and initiatives. This is a big and important job that requires an understanding of a wide array of security topics. Being an effective security leader requires you to get up to speed quickly on information security issues and terminology to build a modern security program. Creating a high performing security team means that you can anticipate what security capabilities need to built to enable the business and mitigate threats.
Business Takeaways

This course will help your organization:
  • Develop leaders that know how to build a modern security program
  • Anticipate what security capabilities need to built to enable the business and mitigate threats
  • Create higher performing security teams
Skills Learned
  • Make sense of different cybersecurity frameworks
  • Understand and analyze risk
  • Decipher the pros and cons of different reporting relationships
  • Manage and lead technical teams and projects
  • Build a vulnerability management program
  • Inject security into modern DevOps workflows
  • Strategically leverage a SIEM
  • Lead a Security Operations Center (SOC)
  • Change behavior and build a security-aware culture
  • Effectively manage security projects
  • Enable modern security architectures and the cloud
  • Build security engineering capabilities using automation and Infrastructure as Code (IaC)
  • Understand and secure generative AI (GenAI) services
  • Get up to speed quickly on information security issues and terminology
  • Establish a minimum standard of security knowledge, skills, and abilities
  • Speak the same language as technical security professionals
Hands-On Security Manager Training

This leadership focused security training course uses case scenarios, group discussions, team-based exercises, in-class games, and a security leadership simulation to help students absorb both technical and management topics. About 60-80 minutes per day is dedicated to these learning experiences using the Cyber42 leadership simulation game.

This leadership simulation game is a continuous tabletop exercise where students play to improve security culture, manage budget and schedule, and improve security capabilities at a fictional organization. This puts you in real-world scenarios that spur discussion and critical thinking of situations that you will encounter at work.
  • Section 1: Cyber42 Watt's Warehouse Company Overview, Calibration Lab, Round 1 Initiative Selection, Events 1-3: Whither Watt's Warehouse, Institutionalizing Security, Board Briefing
  • Section 2: Cyber42 Round 1 Events 4-6: Network Security Implementation, End User Security, To Serve and Protect
  • Section 3: Cyber42 Round 2 Initiative Selection, Round 2 Events 7-10: Industry Breach, Shadow IT, Security Misconfiguration, Miracle on DevOps Way
  • Section 4: Cyber42 Round 3 Initiative Selection, Round 3 Events 11-14: Patching Problems, Let It Be Known!, Tough Negotiations, Managing Resistance
  • Section 5: Cyber42 Round 4 Initiative Selection, Round 4 Events 15-18: New Guy in Town, Cost Cutting, Ransomware Response, Opportunity Knocks
"Cyber42 was an amazing game and experience. Not only building connection with our peers, but also creating a rich dialogue. More importantly, the sharing and decision analysis really helped us learn the materials more effectively." - Jay Bhalodia, Microsoft

"Labs reinforce everything you learn during the lessons and makes the teams think on how to proceed." - German Regalado, CNRMC

"It's a fun game. It makes me think through the process before making a decision. There is a lot to consider." - Peter H., Law Enforcement
Syllabus Summary
  • Section 1 - Governance to plan your security program
  • Section 2 - Architecture to design your security capabilities
  • Section 3 - Engineering to build your security capabilities
  • Section 4 - Build and lead the team, process, and culture
  • Section 5 - Run operations to manage and mitigate attacks
Additional Free Resources
  • CISO Scorecard poster
  • Transformational Cybersecurity Leader Triad, blog
  • Rekt Casino Hack Assessment Transformational Series Weak Security Program, Unprotected Systems, and Poor Detection & Response, webcast
  • Rekt Casino Revisited: Transformational Series Part 2: Weak Security Program, Unprotected Systems, and Poor Detection & Response, blog
What You Will Receive
  • Electronic courseware containing the entire course content
  • Printed course books
  • Access to the Cyber42 security leadership simulation game
  • MP3 audio files of the complete course lecture
What Comes Next?
  • LDR514: Security Strategic Planning, Policy, and Leadership
  • LDR521: Security Culture for Leaders

Enquire

Start date Location / delivery
08 Sep 2025 London Book now

Related article

At GIAC, we believe that hands-on testing is the future of cybersecurity certification. With five certification exams featuring CyberLive , and thr...