Technology Risk Graph
Your attack surfaces are growing. Hackers keep learning. The speed of enterprise response is significantly slower than the rate of negative consequences. What is your plan to prepare your leaders for proper defensive knowledge, strategy, and skill to secure your organization?
Maximize your ROI on technology spend, employee satisfaction, and your bottom line while protecting your reputation by developing your cybersecurity program through sufficiently trained leaders.
To learn more about these learning paths: contact our team today.Planning Her Path to CISO
Jeneé Saunders is the first SANS Cybersecurity Leadership professional to earn the Transformational and Operational Triads. Her goal is to become a CISO and she found the Triads to be the perfect path for her to pursue.
Cyber Risk Officer
Cyber Risk Officer Triad Coin
A Cyber Risk Officer will be able to:
- Build a comprehensive security program
- Lead security initiatives to manage business risk
- Implement cybersecurity tools and methodologies
- Manage and mitigate cybersecurity risks while ensuring compliance
- Analyze risks, select safeguards, and prioritize threats
- Enhance cybersecurity governance and program management
- Lead teams in times of crisis and extreme pressure
- Build and lead teams to manage cyber incidents
- Brief all levels from the hands-on team to executives, Board, investigative journalists, and even the attackers
Transformational Cybersecurity Leaders
Transformational Triad Coin
A Transformational Cybersecurity Leader will be able to:
- Lead security initiatives in line with business goals
- Apply cybersecurity concepts to overall business strategy
- Implement cybersecurity tools and methodologies
- Analyze current state of information risk
- Identify target state
- Perform a gap analysis
- Develop a comprehensive cybersecurity roadmap
- Include employees at all levels of the org in every type of job role
- Build, measure and manage a strong security culture
- Decrease a company's risk profile
- Increase ROI on cybersecurity
Operational Cybersecurity Executive
Operational Triad Coin
An Operational Cybersecurity Leader will be able to:
- Grow and sharpen their cyber defense team
- Understand purpose of critical security controls
- Implement a prioritized, risk-based approach to controls
- Create and mature a vulnerability management program
- Strategically identify vulnerability priorities
- Align SOC efforts to track and organize defensive capabilities
- Drive, verify, and communicate SOC improvements
- Decrease a company's risk profile
- Increase ROI on cybersecurity
Downloadable Fliers and Additional Free Resources
Transformational Cybersecurity Leaders
Isaiah Aguilera | Angela Davis | Doug Lang | Ian Sheldon |
Majed Waqit Alharthi | Charles Dorling | Merisa Lee | Gary Slinger |
Abdulmalek Almoghamis | Eric Dudley | Michael Lewis | Robert Smilie |
Jerry Alsay | Charles Dumas | James Loughlin | Christopher Sorensen |
Alanood AlShehry | Saeed Elahi | Januari Martin | Viatcheslav Sotnikov |
John Alves | Stanley Fidge | Mike Melo | Todd Stewart |
Travis Anderson | Vince Fitzpatrick | Pedro Mora | Ina Steyn |
Anthony Aukland | John Forker | Christopher Morici | Malcolm Strachan |
Martin Baader | Tracy Fu | Greg Morton | Dan Swanson |
Zohaib Baig | Lee Gerney | Ted Moskalenko | Dumitru Adrian Tanasie |
Maciej Bak | Stephen Goldman | Christopher Mountcastle | Sean Thomas |
Amir Banan | Nathaniel Gonzalez | Suresh Murugan | Mark Tillman |
Brett Barkman | Sebastian Gonzalez | Christine Naenfeldt | Nicola Utting |
Lea Beeken | Jerry Gran | Tanya Ortiz | Brian Vasquez |
Steve Bernard | Andrew Hanks | Joseph Potchanant | Blakely Wall |
Brian Blangsted | Elizabeth Tysall Harris | Dwayne Price | Robert Waples |
Christopher Bohlk | Ray Hawkins | Samir Puri | Katie Ward |
Michael Brodack | Chris Houle | Jorge Ramos-Soto | Brad Wilkerson |
Lysandra Capella | Greg Hydro | Laura Ramsey | Antonia Williams |
Edward Carter | Sherif Ibrahim | Neal Richardson | Scott Workman |
Michael Cheramie | Mark James | Matthew Rosenthal | Chad Yancey |
Mark Cohen | Janie Jones | Justin Rundell | Paul Zikmund |
Lonnie Colbert | Quincy-James Julian | Gillian Rutledge | |
Liam Connolly | Kaveriappa Muddiyada Karumbaiah | Jenee Saunders | |
Cornelius Coverson | Ines Khandelwal | Jack Sharpe |
Operational Cybersecurity Executives
Olubunmi Akintonde | Lee Gerney | Ivan Ivkovic | Petr Sidopulos |
Steve Bernard | Nathaniel Gonzalez | Brandi Loveday-Chesley | James Wilburn |
Michel Bruggeman | Syed Talha Habi | Diego Mendoza | Brad Wilkerson |
Lysandra Capella | Ray Hawkins | Mustafa Qasim | Rob Young |
Liam Connolly | Timothy Hidalgo | Gillian Rutledge | |
Stanley Fidge | Richard Ivey | Jenee Saunders |
Cyber Risk Officers
Coming soon! |
---|