Technology Risk Graph
Your attack surfaces are growing. Hackers keep learning. The speed of enterprise response is significantly slower than the rate of negative consequences. What is your plan to prepare your leaders for proper defensive knowledge, strategy, and skill to secure your organization?
Maximize your ROI on technology spend, employee satisfaction, and your bottom line while protecting your reputation by developing your cybersecurity program through sufficiently trained leaders.
To learn more about these learning paths: contact our team today.Planning Her Path to CISO
Jeneé Saunders is the first SANS Cybersecurity Leadership professional to earn the Transformational and Operational Triads. Her goal is to become a CISO and she found the Triads to be the perfect path for her to pursue.
Cyber Risk Officer
Cyber Risk Officer Triad Coin
A Cyber Risk Officer will be able to:
- Build a comprehensive security program
- Lead security initiatives to manage business risk
- Implement cybersecurity tools and methodologies
- Manage and mitigate cybersecurity risks while ensuring compliance
- Analyze risks, select safeguards, and prioritize threats
- Enhance cybersecurity governance and program management
- Lead teams in times of crisis and extreme pressure
- Build and lead teams to manage cyber incidents
- Brief all levels from the hands-on team to executives, Board, investigative journalists, and even the attackers
Transformational Cybersecurity Leaders
Transformational Triad Coin
A Transformational Cybersecurity Leader will be able to:
- Lead security initiatives in line with business goals
- Apply cybersecurity concepts to overall business strategy
- Implement cybersecurity tools and methodologies
- Analyze current state of information risk
- Identify target state
- Perform a gap analysis
- Develop a comprehensive cybersecurity roadmap
- Include employees at all levels of the org in every type of job role
- Build, measure and manage a strong security culture
- Decrease a company's risk profile
- Increase ROI on cybersecurity
Operational Cybersecurity Executive
Operational Triad Coin
An Operational Cybersecurity Leader will be able to:
- Grow and sharpen their cyber defense team
- Understand purpose of critical security controls
- Implement a prioritized, risk-based approach to controls
- Create and mature a vulnerability management program
- Strategically identify vulnerability priorities
- Align SOC efforts to track and organize defensive capabilities
- Drive, verify, and communicate SOC improvements
- Decrease a company's risk profile
- Increase ROI on cybersecurity
Downloadable Fliers and Additional Free Resources
Transformational Cybersecurity Leaders
Isaiah Aguilera | Charles Dorling | Ines Khandelwal | Jenee Saunders |
Majed Waqit Alharthi | Jonathan Douglas | Doug Lang | Jack Sharpe |
Abdulmalek Almoghamis | Eric J. Dudley | Merisa Lee | Ian Sheldon |
Jerry Alsay | Charles Dumas | Michael Lewis | Gary Slinger |
Alanood AlShehry | Dan D. Duplito | James Loughlin | Robert Smilie |
John Alves | Saeed Elahi | Peter Malan | Haytham Sobhan |
Travis Anderson | Stanley Fidge | Januari Martin | Christopher Sorensen |
Anthony Aukland | Vince Fitzpatrick | Mike Melo | Viatcheslav Sotnikov |
Martin Baader | John Forker | Muhiballah Mohammed | Todd Stewart |
Zohaib Baig | Tracy Fu | Lisandra Maisonet Montanez | Ina Steyn |
Maciej Bak | Lee Gerney | Pedro Mora | Malcolm Strachan |
Amir Banan | Stephen Goldman | Christopher Morici | Dan Swanson |
Brett Barkman | Nathaniel Gonzalez | Greg Morton | Dumitru Adrian Tanasie |
Lea Beeken | Sebastian Gonzalez | Ted Moskalenko | Sean Thomas |
Steve Bernard | Jerry Gran | Christopher Mountcastle | Mark Tillman |
Brian Blangsted | Andrew Hanks | Suresh Murugan | Nicola Utting |
Christopher Bohlk | Anthony Harrell | Christine Naenfeldt | Brian Vasquez |
Michael Brodack | Elizabeth Tysall Harris | Tanya Ortiz | Wenona Vistoso |
Lysandra Capella | Ray Hawkins | Joseph Potchanant | Blakely Wall |
Edward Carter | Chris Houle | Dwayne Price | Robert Waples |
Michael Cheramie | Greg Hydro | Samir Puri | Katie Ward |
Mandy Chow | Sherif Ibrahim | Jorge Ramos-Soto | Nik Wileman |
Mark Cohen | Mark James | Laura Ramsey | Brad Wilkerson |
Lonnie Colbert | Jay James | Neal Richardson | Antonia Williams |
Liam Connolly | Janie Jones | Matthew Rosenthal | Scott Workman |
Cornelius Coverson | Quincy-James Julian | Justin Rundell | Chad Yancey |
Angela Davis | Kaveriappa Muddiyada Karumbaiah | Gillian Rutledge | Paul Zikmund |
Operational Cybersecurity Executives
Olubunmi Akintonde | Eric J. Dudley | Timothy Hidalgo | Gillian Rutledge |
Sultan Alsaad | Stanley Fidge | Richard Ivey | Jenee Saunders |
Steve Bernard | Lee Gerney | Ivan Ivkovic | Petr Sidopulos |
Michel Bruggeman | Nathaniel Gonzalez | Brandi Loveday-Chesley | James Wilburn |
Lysandra Capella | Syed Talha Habi | Diego Mendoza | Brad Wilkerson |
Liam Connolly | Ray Hawkins | Mustafa Qasim | Rob Young |
Cyber Risk Officers
Paul Zikmund |