Technology Risk Graph
Your attack surfaces are growing. Hackers keep learning. The speed of enterprise response is significantly slower than the rate of negative consequences. What is your plan to prepare your leaders for proper defensive knowledge, strategy, and skill to secure your organization?
Maximize your ROI on technology spend, employee satisfaction, and your bottom line while protecting your reputation by developing your cybersecurity program through sufficiently trained leaders.
To learn more about these learning paths: contact our team today.Planning Her Path to CISO
Jeneé Saunders is the first SANS Cybersecurity Leadership professional to earn the Transformational and Operational Triads. Her goal is to become a CISO and she found the Triads to be the perfect path for her to pursue.
Cyber Risk Officer
Cyber Risk Officer Triad Coin
A Cyber Risk Officer will be able to:
- Build a comprehensive security program
- Lead security initiatives to manage business risk
- Implement cybersecurity tools and methodologies
- Manage and mitigate cybersecurity risks while ensuring compliance
- Analyze risks, select safeguards, and prioritize threats
- Enhance cybersecurity governance and program management
- Lead teams in times of crisis and extreme pressure
- Build and lead teams to manage cyber incidents
- Brief all levels from the hands-on team to executives, Board, investigative journalists, and even the attackers
Transformational Cybersecurity Leaders
Transformational Triad Coin
A Transformational Cybersecurity Leader will be able to:
- Lead security initiatives in line with business goals
- Apply cybersecurity concepts to overall business strategy
- Implement cybersecurity tools and methodologies
- Analyze current state of information risk
- Identify target state
- Perform a gap analysis
- Develop a comprehensive cybersecurity roadmap
- Include employees at all levels of the org in every type of job role
- Build, measure and manage a strong security culture
- Decrease a company's risk profile
- Increase ROI on cybersecurity
Operational Cybersecurity Executive
Operational Triad Coin
An Operational Cybersecurity Leader will be able to:
- Grow and sharpen their cyber defense team
- Understand purpose of critical security controls
- Implement a prioritized, risk-based approach to controls
- Create and mature a vulnerability management program
- Strategically identify vulnerability priorities
- Align SOC efforts to track and organize defensive capabilities
- Drive, verify, and communicate SOC improvements
- Decrease a company's risk profile
- Increase ROI on cybersecurity
Downloadable Fliers and Additional Free Resources
Transformational Cybersecurity Leaders
Isaiah Aguilera | Jonathan Douglas | Doug Lang | Ian Sheldon |
Majed Waqit Alharthi | Eric J. Dudley | Merisa Lee | Gary Slinger |
Abdulmalek Almoghamis | Charles Dumas | Michael Lewis | Robert Smilie |
Jerry Alsay | Dan D. Duplito | James Loughlin | Haytham Sobhan |
Alanood AlShehry | Saeed Elahi | Peter Malan | Christopher Sorensen |
John Alves | Stanley Fidge | Januari Martin | Viatcheslav Sotnikov |
Travis Anderson | Vince Fitzpatrick | Mike Melo | Todd Stewart |
Anthony Aukland | Matthew Flack | Muhiballah Mohammed | Ina Steyn |
Martin Baader | John Forker | Lisandra Maisonet Montanez | Malcolm Strachan |
Zohaib Baig | Tracy Fu | Pedro Mora | Dan Swanson |
Maciej Bak | Lee Gerney | Christopher Morici | Dumitru Adrian Tanasie |
Amir Banan | Stephen Goldman | Greg Morton | Sean Thomas |
Brett Barkman | Nathaniel Gonzalez | Ted Moskalenko | Mark Tillman |
Lea Beeken | Sebastian Gonzalez | Christopher Mountcastle | Nicola Utting |
Steve Bernard | Jerry Gran | Suresh Murugan | Brian Vasquez |
Brian Blangsted | Andrew Hanks | Christine Naenfeldt | Wenona Vistoso |
Christopher Bohlk | Anthony Harrell | Tanya Ortiz | Blakely Wall |
Michael Brodack | Elizabeth Tysall Harris | Joseph Potchanant | Robert Waples |
Lysandra Capella | Ray Hawkins | Dwayne Price | Katie Ward |
Edward Carter | Bassem Hemida | Samir Puri | Nik Wileman |
Alisha Chambers | Chris Houle | Jorge Ramos-Soto | Brad Wilkerson |
Michael Cheramie | Greg Hydro | Laura Ramsey | Antonia Williams |
Mandy Chow | Sherif Ibrahim | Neal Richardson | Scott Workman |
Mark Cohen | Mark James | Matthew Rosenthal | Chad Yancey |
Lonnie Colbert | Jay James | Justin Rundell | Paul Zikmund |
Liam Connolly | Janie Jones | Gillian Rutledge | |
Cornelius Coverson | Quincy-James Julian | Jenee Saunders | |
Angela Davis | Kaveriappa Muddiyada Karumbaiah | Jack Sharpe | |
Charles Dorling | Ines Khandelwal | Ian Sheldon |
Operational Cybersecurity Executives
Olubunmi Akintonde | Stanley Fidge | Ivan Ivkovic | Petr Sidopulos |
Sultan Alsaad | Lee Gerney | Brandi Loveday-Chesley | Basil Alawi S. Taher |
Steve Bernard | Nathaniel Gonzalez | Peter Malan | James Wilburn |
Michel Bruggeman | Syed Talha Habi | Diego Mendoza | Brad Wilkerson |
Lysandra Capella | Ray Hawkins | Mustafa Qasim | Rob Young |
Liam Connolly | Timothy Hidalgo | Gillian Rutledge | |
Eric J. Dudley | Richard Ivey | Jenee Saunders |
Cyber Risk Officers
Paul Zikmund |