Getting Started
💻 Register for Poll
💻 Welcome to Alta3 Live
Day 01 - Foundations of Strategic and CyberSecurity Planning
What Business Are You In
💬 Vision vs Mission
💻 Create A Mission
💬 Identifying Stakeholders
💬 Understanding History
💬 Assets
💬 Business and Security Goals
Strategic Planning
💬 Levels of Planning
💬 PESTLE Analysis
💻 Planing - Archive Solutions
💬 Communicate to the Team
💻 Persuading the Team
Understanding Threats
💬 CyberSecurity History
💬 Threat Actors
💻 Identifying Threat Actors
💻 Create a VERIS Report
💬 PEST Analysis
💬 MITRE ATT&CK Framework
💬 Intrusion Kill Chain
💻 Analyze the Intrusion Kill Chain
💬 Threat and Risk Surface Analysis
CyberSecurity Plan
💻 FCC Small Biz Cyber Planner
💻 CISA Cyber Essentials Starter Kit
💻 CISA Security Planning Workbook
Day 02 - Crafting Robust Security Frameworks
Tuesday Test and Review
Security Strategy
💬 Security Framework
💬 Business Strategy
Security Communication
💬 Budget
💬 Maturity Levels
💬 Security Metrics
💻 Apply Security Metrics
Identifying Threats
💬 Identifying Threats NIST IR 8286A
💬 SWOT Analysis
💻 Performing a SWOT Analysis
💬 GAP Analysis
NIST CSF
💬 NIST CSF Profiles and Roadmaps
💻 NIST CSF 2.0 and Profiling
Day 03 - Crafting and Implementing Security Policy
Wednesday Test and Review
Policy Breakdown
💻 Policy Breakdown
💻 Case Study - T Mobile Data Breaches
Why of Policy
💬 Philosophy of Policy
💬 Examples of Creating Policy
💬 Policy Pyramid
💻 Case Study - Equifax and Policy
💬 Arranging Policy
💬 Considering Culture
💬 Policy Requirements
What Makes Good Policy
💬 Clarity of Language
💬 Remain Accessible to Your Audience
💬 SMART
What is Security Policy
💬 NIST SP 800-18
💬 NIST SP 800-53
💬 CIS Critical Security Controls
💬 Summary of ISO IEC 27002
Policy Fix Up
💻 Assess Policy
Evolving Policy
💬 Ways to Evolve Policy
💻 Rating Policy with SMART
Policy Potpourri
💬 Vulnerability Management
💬 Generative AI
💬 Cloud Security
💻 Mobile Device Management - BYOD
💬 Zero Trust
💬 Data Breach Notification
💬 Data Retention and Disposal
💬 Privacy
Day 04 - Building and Leading Resilient Security Teams
Day 04 -
Thursday Test and Review
What is Leadership
💬 Leadership
💻 Learning Leadership
Effective Leaders
💬 Fundamental Leadership Traits
💻 Building Leadership Traits
Competence & Trust Building
💬 Improvement with Education
💬 Creating a Culture of Trust
Team Building
💬 Identifying Your Team
💻 Promoting Team Communication
💬 Deliberate Actions and Checklists
💻 Evolve Leadership Style
Relevance
💬 Three Ways Framework
💬 Security in the Value Stream
Enable and Shape Organizational Change
💻 Values Impacting Leadership
💬 Morale and Belief
💬 Enterprise Wide Disruptions
💻 Managing Change
Day 05 - Advanced Applications and Real-World Integration
Friday Test and Review
Case Studies
💻 Case Study - Wanna Cry
💻 Case Study - Sony Pictures Hack
💻 Case Study - Colonial Pipeline
💻 Case Study - Security Leadership at ArborSafe
Interacting with Leadership
💬 Interacting with Marketing and Executives
Stakeholders Management
💻 Interacting with Stakeholders - No SMTP Attachment Policy
Driving Innovation
💬 Values and Culture
💬 Innovating with Visioning
💻 Innovation
💬 Emerging Technologies
Appendix
References and Additional Reading
Glossary
Continuing Education
💬 Planning & Consulting with Alta3 Research