Chief Information Security Officer Training

SANS Cybersecurity Leadership Triads | NEW Cyber Risk Officer Triad!
TechRiskGraph.png

Technology Risk Graph

Your attack surfaces are growing. Hackers keep learning. The speed of enterprise response is significantly slower than the rate of negative consequences. What is your plan to prepare your leaders for proper defensive knowledge, strategy, and skill to secure your organization?

Maximize your ROI on technology spend, employee satisfaction, and your bottom line while protecting your reputation by developing your cybersecurity program through sufficiently trained leaders.

To learn more about these learning paths: contact our team today.

Planning Her Path to CISO

Jeneé Saunders is the first SANS Cybersecurity Leadership professional to earn the Transformational and Operational Triads. Her goal is to become a CISO and she found the Triads to be the perfect path for her to pursue.

Cyber Risk Officer

Modern security leaders must deal with an endless barrage of changes to the business, technology, and threat landscape. This requires a combination of technical knowledge, understanding of risk, and the ability to lead teams in times of intense pressure. Doing so requires building a comprehensive program of controls to manage information risk, enhancing cybersecurity governance while ensuring compliance, and dealing with the inevitable incidents and crises. The SANS Cyber Risk Officer triad is here to provide CISO training to help you effectively lead, govern, and manage this risk for your organization. These triads provide chief information security officer certification from the world's leading cybersecurity training and certification provider, SANS|GIAC.
470x382_Coins_TriadCoins_CRO.jpg

Cyber Risk Officer Triad Coin

A Cyber Risk Officer will be able to:

  • Build a comprehensive security program
  • Lead security initiatives to manage business risk
  • Implement cybersecurity tools and methodologies
  • Manage and mitigate cybersecurity risks while ensuring compliance
  • Analyze risks, select safeguards, and prioritize threats
  • Enhance cybersecurity governance and program management
  • Lead teams in times of crisis and extreme pressure
  • Build and lead teams to manage cyber incidents
  • Brief all levels from the hands-on team to executives, Board, investigative journalists, and even the attackers

Transformational Cybersecurity Leaders

With enterprises in need of protecting against an endless and increasing onslaught of information security threats, technology management skills alone are no longer sufficient. Today it is about technology, business strategy, and people. Cybersecurity leaders need to be up to speed on information security issues from a technical standpoint, understand how to implement security planning into the broader business objectives, and be able to build a longer lasting security and risk-based culture. Our chief information security officer training paths teach how to adjust employees’ and leadership’s way of thinking about security in order to prioritize and act to prevent today’s most common cybersecurity attacks. Organizational change is required to affect the foundational culture of the organization. These triads provide chief information security officer certification from the world's leading cybersecurity training and certification provider, SANS | GIAC.
Transformational Challenge Coins Triad

Transformational Triad Coin

A Transformational Cybersecurity Leader will be able to:

  • Lead security initiatives in line with business goals
  • Apply cybersecurity concepts to overall business strategy
  • Implement cybersecurity tools and methodologies
  • Analyze current state of information risk
  • Identify target state
  • Perform a gap analysis
  • Develop a comprehensive cybersecurity roadmap
  • Include employees at all levels of the org in every type of job role
  • Build, measure and manage a strong security culture
  • Decrease a company's risk profile
  • Increase ROI on cybersecurity

Operational Cybersecurity Executive

As cyber attacks become more common and more expensive, many organizations are making a foundational shift to view operations from the point of view of an adversary in order to protect their most sensitive information. Despite vulnerability tools and programs being available for several decades, breaches still happen regularly from known vulnerabilities. Complicating the matter more are a wide range of modern technologies requiring more time and knowledge to manage, more known vulnerabilities than ever before, an unprecedented migration to cloud, and ever-increasing legal and regulatory compliance standards. Information Assurance Engineers, Auditors, SOC Analysts, Cybersecurity Managers, and CISOs need more to better defend an organization’s data systems. The SANS Operational Cybersecurity Executive triad is here to provide CISO training to help you build, grow, and sharpen your cyber defense team. These triads provide chief information security officer certification from the world's leading cybersecurity training and certification provider, SANS | GIAC.
Operation Challenge Coins Triad

Operational Triad Coin

An Operational Cybersecurity Leader will be able to:

  • Grow and sharpen their cyber defense team
  • Understand purpose of critical security controls
  • Implement a prioritized, risk-based approach to controls
  • Create and mature a vulnerability management program
  • Strategically identify vulnerability priorities
  • Align SOC efforts to track and organize defensive capabilities
  • Drive, verify, and communicate SOC improvements
  • Decrease a company's risk profile
  • Increase ROI on cybersecurity

Transformational Cybersecurity Leaders

Congratulations to the professionals who have earned this distinction. Bolded names have earned two or more Leadership Triads. This list is updated quarterly.

Isaiah Aguilera

Angela Davis

Doug Lang

Ian Sheldon

Majed Waqit Alharthi

Charles Dorling

Merisa Lee

Gary Slinger

Abdulmalek Almoghamis

Eric Dudley

Michael Lewis

Robert Smilie

Jerry Alsay

Charles Dumas

James Loughlin

Christopher Sorensen

Alanood AlShehry

Saeed Elahi

Januari Martin

Viatcheslav Sotnikov

John Alves

Stanley Fidge

Mike Melo

Todd Stewart

Travis Anderson

Vince Fitzpatrick

Pedro Mora

Ina Steyn

Anthony Aukland

John Forker

Christopher Morici

Malcolm Strachan

Martin Baader

Tracy Fu

Greg Morton

Dan Swanson

Zohaib Baig

Lee Gerney

Ted Moskalenko

Dumitru Adrian Tanasie

Maciej Bak

Stephen Goldman

Christopher Mountcastle

Sean Thomas

Amir Banan

Nathaniel Gonzalez

Suresh Murugan

Mark Tillman

Brett Barkman

Sebastian Gonzalez

Christine Naenfeldt

Nicola Utting

Lea Beeken

Jerry Gran

Tanya Ortiz

Brian Vasquez

Steve Bernard

Andrew Hanks

Joseph Potchanant

Blakely Wall

Brian Blangsted

Elizabeth Tysall Harris

Dwayne Price

Robert Waples

Christopher Bohlk

Ray Hawkins

Samir Puri

Katie Ward

Michael Brodack

Chris Houle

Jorge Ramos-Soto

Brad Wilkerson

Lysandra Capella

Greg Hydro

Laura Ramsey

Antonia Williams

Edward Carter

Sherif Ibrahim

Neal Richardson

Scott Workman

Michael Cheramie

Mark James

Matthew Rosenthal

Chad Yancey

Mark Cohen

Janie Jones

Justin Rundell

Paul Zikmund

Lonnie Colbert

Quincy-James Julian

Gillian Rutledge

Liam Connolly

Kaveriappa Muddiyada Karumbaiah

Jenee Saunders

Cornelius Coverson

Ines Khandelwal

Jack Sharpe

Operational Cybersecurity Executives

Congratulations to the professionals who have earned this distinction. Bolded names have earned two or more Leadership Triads. This list is updated quarterly.

Olubunmi Akintonde

Lee Gerney

Ivan Ivkovic

Petr Sidopulos

Steve Bernard

Nathaniel Gonzalez

Brandi Loveday-Chesley

James Wilburn

Michel Bruggeman

Syed Talha Habi

Diego Mendoza

Brad Wilkerson

Lysandra Capella

Ray Hawkins

Mustafa Qasim

Rob Young

Liam Connolly

Timothy Hidalgo

Gillian Rutledge

 

Stanley Fidge

Richard Ivey

Jenee Saunders

 

Cyber Risk Officers

Congratulations to the professionals who have earned this distinction. Bolded names have earned two or more Leadership Triads. This list is updated quarterly.
Coming soon!