Clouds

Security Leadership - Strategy, Policy, and Planning

Essential Skills Gained

Checkmark

Equip cybersecurity leaders to assess the threat landscape

Checkmark

Teach management techniques to boost team cohesion and productivity

Checkmark

Develop and implement strategic plans for greater success

Checkmark

Set achievable goals for yourself and your teams

Format

5 day course with lecture and hands-on labs.

Audience

Cybersecurity professionals

Business leaders seeking cybersecurity insights

Developers expanding knowledge of threats and trends

Managers building secure programs and policies

Description

Emerging and veteran Cybersecurity leaders are responsible for forging a digital shield to protect their organization from growing and ever changing threats. By crafting and enforcing policy outlining acceptable and unacceptable behaviors, these professionals empower all employees to do better. This course will teach current and future leaders how to successfully build and implement sensible network and workplace policies via the implementation of strategic plans that align with organizational goals and values. Completion of the course includes leadership modules outlining methods for successfully managing teams, dealing with time constraints, budgeting, assessing threats appropriately, communicating with organizational leadership, and more. Daily, students will engage with real-world case studies over-viewing the successes and failures various business and organizations. By examining various past and current institutions using a variety of business analysis techniques, leaders gain more clarity on how to set achievable goals given limited resources.

Getting Started

  • 💻 Register for Poll

  • 💻 Welcome to Alta3 Live

Day 01 - Foundations of Strategic and CyberSecurity Planning

What Business Are You In

  • 💬 Vision vs Mission

  • 💻 Create A Mission

  • 💬 Identifying Stakeholders

  • 💬 Understanding History

  • 💬 Assets

  • 💬 Business and Security Goals

Strategic Planning

  • 💬 Levels of Planning

  • 💬 PESTLE Analysis

  • 💻 Planing - Archive Solutions

  • 💬 Communicate to the Team

  • 💻 Persuading the Team

Understanding Threats

  • 💬 CyberSecurity History

  • 💬 Threat Actors

  • 💻 Identifying Threat Actors

  • 💻 Create a VERIS Report

  • 💬 PEST Analysis

  • 💬 MITRE ATT&CK Framework

  • 💬 Intrusion Kill Chain

  • 💻 Analyze the Intrusion Kill Chain

  • 💬 Threat and Risk Surface Analysis

CyberSecurity Plan

  • 💻 FCC Small Biz Cyber Planner

  • 💻 CISA Cyber Essentials Starter Kit

  • 💻 CISA Security Planning Workbook

Day 02 - Crafting Robust Security Frameworks

  • Tuesday Test and Review

Security Strategy

  • 💬 Security Framework

  • 💬 Business Strategy

Security Communication

  • 💬 Budget

  • 💬 Maturity Levels

  • 💬 Security Metrics

  • 💻 Apply Security Metrics

Identifying Threats

  • 💬 Identifying Threats NIST IR 8286A

  • 💬 SWOT Analysis

  • 💻 Performing a SWOT Analysis

  • 💬 GAP Analysis

NIST CSF

  • 💬 NIST CSF Profiles and Roadmaps

  • 💻 NIST CSF 2.0 and Profiling

Day 03 - Crafting and Implementing Security Policy

  • Wednesday Test and Review

Policy Breakdown

  • 💻 Policy Breakdown

  • 💻 Case Study - T Mobile Data Breaches

Why of Policy

  • 💬 Philosophy of Policy

  • 💬 Examples of Creating Policy

  • 💬 Policy Pyramid

  • 💻 Case Study - Equifax and Policy

  • 💬 Arranging Policy

  • 💬 Considering Culture

  • 💬 Policy Requirements

What Makes Good Policy

  • 💬 Clarity of Language

  • 💬 Remain Accessible to Your Audience

  • 💬 SMART

What is Security Policy

  • 💬 NIST SP 800-18

  • 💬 NIST SP 800-53

  • 💬 CIS Critical Security Controls

  • 💬 Summary of ISO IEC 27002

Policy Fix Up

  • 💻 Assess Policy

Evolving Policy

  • 💬 Ways to Evolve Policy

  • 💻 Rating Policy with SMART

Policy Potpourri

  • 💬 Vulnerability Management

  • 💬 Generative AI

  • 💬 Cloud Security

  • 💻 Mobile Device Management - BYOD

  • 💬 Zero Trust

  • 💬 Data Breach Notification

  • 💬 Data Retention and Disposal

  • 💬 Privacy

Day 04 - Building and Leading Resilient Security Teams

Day 04 -

  • Thursday Test and Review

What is Leadership

  • 💬 Leadership

  • 💻 Learning Leadership

Effective Leaders

  • 💬 Fundamental Leadership Traits

  • 💻 Building Leadership Traits

Competence & Trust Building

  • 💬 Improvement with Education

  • 💬 Creating a Culture of Trust

Team Building

  • 💬 Identifying Your Team

  • 💻 Promoting Team Communication

  • 💬 Deliberate Actions and Checklists

  • 💻 Evolve Leadership Style

Relevance

  • 💬 Three Ways Framework

  • 💬 Security in the Value Stream

Enable and Shape Organizational Change

  • 💻 Values Impacting Leadership

  • 💬 Morale and Belief

  • 💬 Enterprise Wide Disruptions

  • 💻 Managing Change

Day 05 - Advanced Applications and Real-World Integration

  • Friday Test and Review

Case Studies

  • 💻 Case Study - Wanna Cry

  • 💻 Case Study - Sony Pictures Hack

  • 💻 Case Study - Colonial Pipeline

  • 💻 Case Study - Security Leadership at ArborSafe

Interacting with Leadership

  • 💬 Interacting with Marketing and Executives

Stakeholders Management

  • 💻 Interacting with Stakeholders - No SMTP Attachment Policy

Driving Innovation

  • 💬 Values and Culture

  • 💬 Innovating with Visioning

  • 💻 Innovation

  • 💬 Emerging Technologies

Appendix

  • References and Additional Reading

  • Glossary

Continuing Education

  • 💬 Planning & Consulting with Alta3 Research

Your Team has Unique Training Needs.

Your team deserves training as unique as they are.

Let us tailor the course to your needs at no extra cost.