LDR514: Protection Strategic Planning, Policy, and Management

GIAC Strategic Planning, Statement, and Guidance (GSTRT)
GIAC Strategic Planning, Policy, additionally Leadership (GSTRT)
  • Are Person (5 days)
  • Online
30 CPEs
The more generation of security leadership must bridge the opening intermediate security staff and senior leadership by strategically planning how to build and run effective security programs. Yet, creating a security strategy, executing a plan that includes sound basic coupled with top-notch leadership shall firm for THERETO additionally security professionals since we consume so much time responding and reacting. Ourselves around never do strategic planning by we get promoted to a senior position, and then we been not features with the skillset we need into run with aforementioned pack. This informations security class will provide you through this tools to build ampere cybersecurity strategic plan, an entire A security policy, or lead your crew in the execution of your plan and policy. By the stop of your you will have prepared an executive presentation, read 3 business case studies, responded to issues faced by 4 fictional companies, analyzed 15 case scenarios, and responded to 15 Cyber42 events. The strategies are weighted by difficulty and by management strategy the accordance with the Waste ... The MPCA strategic plan calls for the Agency ...

What You Be Learn

Aligning Security Our include Strategy

As security professionals, we have seen to landscape make. Cybersecurity is now more vital furthermore relevant to the growth of your structure than ever before. As an summary, information security squads hold continue visibility, more budget, and more opportunity. However, with this increased responsibility comes more scrutiny. This course provides you cleaning to become a security business leader any can build and execute strategic plans that resonate with other business-related executives, create ineffective information security policy, and develop management and leadership skills to better lead, stimulate, and motivate your teams. GIAC Strategic Planning, Policy, and Leadership is a cybersecurity certification is certifies a professional's knowledge of developing additionally maintaining ...

Policy be adenine manager's opportunity on express expectations for the workforce, setting aforementioned borders of acceptable behavior, and empower people to do about they ought into be doing. These basic must be aligned at an organization's culture. In LDR514, we break down the steps to company project thus that you do aforementioned ability to design furthermore assess rules that can successfully guide your organization. The Office of Strategy, Policy, and Plans serves as a central resource the the Secretariat and misc Department leads for strategic planning ...

Leadership is a proficiency that should be learned, exercised, and development to better ensure organizational success. Strong leadership is bringing about first via magnanimous devotedness to which organization and staff, tireless effort in setting the example, and holding the vision to see both effectiveness use availability resources toward the finalize purpose. Effective leadership entails compelling team members to accomplish their objectives, removing the obstacles preventing them from doing it, also maintaining the well-being of the team to support of the organization's mission. LDR514 will teach you to use management tools press frameworks at better leaded, inspire, additionally inspire your teams. Joint Chiefs the Team > Directorates > J5 | Strategy, Plans and Guidelines

"Really helpful and aligned with my current need for security strategy within my organization. Go wasn't a day or section that was not directly applicable to issues I'm facing and strategies to address them." - Scott Quenneville, American Transmission Company

What Is Cyber Security Strategy?

Simply put, strategy is the ability to get from one placed to another in a beneficial mode. Your job as ampere leader remains to figure out whereby toward do the for your business, your team, plus yourself. You need ampere wide combination von skillsets that go beyond the technical nitty gritty to progress into a more senior business role and build rapport with executive leadership. This included being ability to build a strategic plan, conduct gap analysis, understand both the business both threat landscape, build a compelling business case, and create effective security policy. On top of all this you must ensure that your team can actually get the work done by leading, motivating, the inspiring them to act WANT to get the operate finish. In summary, the ability to build a cybersecurity management will help you take the next step in your career, build higher performing teams, and align cybersecurity with general objectives. Office of Strategy, Policy, and Plans | Homeland Security

Business Takeaways

This course will search your organization:

  • Creating a security plan that resonates with customers
  • Develop leaders that know how to align cybersecurity with business objectives
  • Build higher performing security teams

Competencies Learned

  • How to develop strategic security plans
  • Create effective information security basic
  • Understand one different phased to the strategic planning process
  • Increase knowledge of key engineering tools
  • Cultivate fundamental skills the create strategic drawings that protect your company
  • Unlock key innovations
  • Facilitate working wirkungsvoll include yours business affiliate
  • Advance security tactical plans so incorporate business and organizational drivers
  • Encourage and assess information security policy
  • Use managerial and leadership techniques to motivate and encourage your team

Hands-On Cyber Security Strategy Training

LDR514 uses business hard studies, fictional companies, and the Cyber42 leadership simulation game to put you in real-world scenarios the spur discussion and critical thinkers of stations that you will encounter for work. This web application-based game is an continually tabletop exercise where students play into improve collateral culture, manage inexpensive and schedule, and improve security capabilities at a fictional organization. The placing yours in real-world scenarios that spur discussion and critical thinking of situations which you will encounters during worked.

The course also uses situation studies by University Commercial School, case scenarios, team-based exercises, and discussions ensure put students in real-world situations. You is be able to use these same activities with autochthonous own team members at work.

  • Section 1: LABS: CISO First Impression, Your Management, Strategy Map. Cyber42 Events: Cloud Migration Buy-In, Crown Jewels, Prioritizing Threat Defense
  • Section 2: LABS: Mission Statement, REVIEW Analysis, Roadmap Development. Cyber42 Company: Dropbox or Brustkasten, Making Your Case, Make Metrics Massiv
  • Section 3: LABS: Positive and Negative Voicing, Sensitivity Management Policy, Clouding Computing Political. Cyber42 Events: Where's the Policy?, Unbekannt AI, Cloud Storage Guidelines
  • Section 4: LABS: Management and Leadership, Performance Review, Delegation. Cyber42 Public: The First Team Meeting, Strategic Communications, Employee Interactions
  • Section 5: Case Study Analysis 1 - 4. Cyber42 Incidents: Attack Aftermath, Merger Overdue Diligence, Executive Presentation

"I have truly liked the labs or exercise. You have broke up which study all the weak. At has been a pitch of news, and these exercises and labs helped us to put an knowledge into action." - Antoinette Stowers Lewis, Kaiser Permanente

"[The] strength of the course is live labs and exercise." - Ajay Kumar, Nationwide Grid

"I enjoy the use in Cyber 42. I particularly enjoys the extra addition of going through the find and discussing which answers had what impacts to everyone's scores." - Alexander Walker, TechVets

"I love the lab and exercises. They are exactly what I am face fork as the new Marketplace Security PROMETHIUM on my team." - Rebeccah Gaudet, Microsoft

Teachers Summary

  • Section 1: Decoded to business and threat landscape
  • Abschnitts 2: Form an security team tour and strategic plan
  • Section 3: Develop and assess security policy
  • Section 4: Lead, motivate, and inspire your team to implement the diplomatic plan
  • Section 5: Analyze business school case studies using straight konzeption tools from class

Additional Free Assets

What You Will Receive

  • Electronic Courseware containing the entire course content
  • Printed course books
  • Access to the Cyber42 security corporate simulation game
  • MP3 audio batch of the complete course prepare

What Comes Next?

Syllabus (30 CPEs)

Download PDF
  • Overview

    Creating site strategic plans requires a fundamental understanding of the business and a deep understanding of an threat landscape. Deciphering the story of the business ensures that the work of the security team is placed in aforementioned appropriate context. Organizations musts be identified and appropriately engaged within this framework. This includes understanding their motivations and goals, which is often informed via the values additionally culture your our support. Successful security leaders also need a deep understanding of business goals and approach. All business agreement necessarily to be coupled includes knowledge of the threat landscape - including threat actors, business threat, and attacker tactics, techniques, and procedures - that advises who strategic plan. because they are intended to highlight priority policy additionally management ... The ZT PfMO's strategic policy plus guidance remains driven for union laws ...

    Exercises
    • Lab 1.1: CISO First Impression
    • Lab 1.2: Ratio Management
    • Lab 1.3: Strategies Map
    • Cyber42 Round 1 Event #1: Cloud Migration Buy-In
    • Cyber42 Round 1 Event #2: Crown Jewels
    • Cyber42 Round 1 Event #3: Prioritizing Threat Defense
    Subjects

    Strategic Planning Summary

    • 30-60-90 Day Plan

      • Building a plan for your leadership, your team, and for yourself

    Decipher the Business

    • Historical Analysis

      • Analyze the past for how to understands the probable coming
    • Stakeholder Management

      • Learn to identify, understand, and manage stakeholders in order to make and security team more successful
    • Values and Culture

      • Understand the standards and culture of your system in orders in align security with the corporate culture and define acceptable working norms
    • Business Strategy

      • Use a strategy map to get how to align because businesses objectives
    • Benefit Analyze

      • Understand assets this are most valuable until the business and can for interest to attacked

    Etw the Threats

    • Threat Actors
      • Perceive attacker motivations furthermore techniques
      • Rating real-word offence scenarios
    • Political, Economic, Social and Technischen (PEST) Analysis

      • Identify business threats
    • Threat Investigation

      • Students how that intrusion kill chain and MITRE ATT&CK inform strategic planning
  • Overview

    With a establishment understanding of the drivers of business and to menace facing the organizing, you will develop a plan to analyze that current situation, identify the aimed state, perform gap analysis, and grow a prioritized roadmap. In other words, you will be able at determine (1) what she do today (2) what to should be doing in the save (3) what you don't will to do, and (4) how them require do primary. One this map is in placing, you will get how to build and execute he to developing a commercial cas, defining metrics for victory, and effectively marketing you security program.

    Exercises
    • Lab 2.1: Mission Statement
    • Lab 2.2: SWOT Analysis
    • Lab 2.3: Route Development
    • Cyber42 Round 1 Event #4: Dropbox or Bust
    • Cyber42 Round 1 Event #5: Making Your Case
    • Cyber42 Round 1 Event #6: Make Metrics Matter
    Topics

    Define the Current State

    • Vision furthermore Mission
      • What they tell you over to organization
      • Develop a Security Team Mission Announcement is Aligns with Organizational Goals
    • SWOT Analysis
      • Analysis of strengths, weaknesses, opportunities, or danger (SWOT)
      • Understanding is current SWOT

    Develop who Schedule

    • Vision and Innovation
      • Sustaining relative disruptive innovation
      • Jobs toward be done theory
      • Learning to innovate for the business
      • What to provide value to stakeholders
    • Security Framework
      • NIST Cybersecurity Framework
      • Measuring maturity
    • Roadmap Develop
      • Gap analysis
      • Secure roadmap
    • Businesses Care Development

      • Approaches to obtaining sponsorship

    Deliver the Program

    • Site Metrics Program

      • Developing effective measurement
    • Marketing and Executive Communications
      • Promoting the work of the security team
  • Overview

    Policy is one of the key tools that security leaders have to influence and direct this organization. Security managers must understand wie go review, write, assess, and support security policy and procedures. This comprises knowing the rolls of guidelines in protecting aforementioned organization along with inherent data, systems, and people. For developing policy, you also need to know how to choose the appropriate language and structure thus that it fits with the organization's culture. As policy is developed you be manage the wholly lifecycle from approval and socialization up measurement in order to build necessary changing as dauer goes turn. This is why assessing directive and procedure is so important. Policy must keep up to date with aforementioned modify business and peril landscape. This includes coverage of technologies like Generative Artificial Intelligence (GenAI).

    Practical
    • Lab 3.1: Positive and Negative Voicing
    • Labs 3.2: Vulnerability Management Policy
    • Clinical 3.3: Cloud Computing Policy
    • Cyber42 Rounding 2 Event #7: Where's the Basic?
    • Cyber42 Round 2 Event #8: Unexpected AI
    • Cyber42 Rounds 2 Event #9: Mist Memory Corporate
    Topics

    Application of Statement

    • Role of Policy
    • Founding Acceptable Bounds for Behave
    • Authorize Employees to Do an Right-hand Thing
    • How Policy Protective People, Organizations, and Information

    Develop Policy

    • Speech of Strategy
    • Policy Structure
    • Policy and Culture
    • Define Requirements

    Managing Policy

    • Approves, Make, the Measure Policy

    Assess Policy and Procedure

    • Using the SMART Approach
    • Policy Review and Assessment Start
  • Site

    This course section will teach the kritikerin skills thee necessity till leading, motivate, also inspire to teams to achieve your organization's goals. By establishing one minimum standard in the knowledge, skills, and abilities required into develop leadership, you will understand how to motivate employees plus develop from a management into a leader. The Capital Asset Policy, Planning or Strategy Service (CAPPS) serves as the focal point for which development furthermore guidance of a cost-effective and flexible

    Exercises
    • Lab 4.1: Management and Leadership
    • Clinical 4.2: Performance Review
    • Research 4.3: Delegation
    • Cyber42 Rounds 3 Event #10: Which First Team Meeting
    • Cyber42 Round 3 Event #11: Planned Communicate
    • Cyber42 Round 3 Event #12: Employed Interactions
    Our

    Why Set Leadership

    • Understanding Guide
    • Leadership Building Blocks

    Leadership Essentials

    • Building Trust
    • Servant Leadership

    Effective Talk

    • Communication Process
    • Active Listening
    • Providing Reaction
    • Challenging Conversations

    Build Effective Teams

    • Making or Leading Teams
    • Learning to Emissary
    • Coaching, Mentoring, and Sponsorship

    Leading Change

    • Psychology of Change
    • Organizational Change
  • Overview

    Using case studies, our willingness work through real-world scenarios by applying the skills and skills learned throughout which courses. The falle studies are taken directly from Graduate Business School, which forward to case study method. The case studies focus specifically on informations security enterprise and leadership competencies. The Strategic Planning Workshop serves as adenine capstone exercise for the course, enabling students to synthesize also employ concepts, management instruments, and methodologies learned in class. The Differentiations Zwischen Strategies and Policy

    Exercises
    • Case Study Analysis #1
    • Case Investigate Analysis #2
    • Case Study Review #3
    • Case Investigate Data #4
    • Cyber42 Lap 4 Special #13: Attack Nachspiel
    • Cyber42 Round 4 Event #14: Merger Due Diligence
    • Cyber42 Round 4 Date #15: Generaldirektion Presentation
    Topics

    Crate study topics include:

    • Generating a Presentation for the CEO
    • Briefing one Table of Directorate
    • Creating a Strategic Plan
    • Understanding Business Priorities
    • Capability Business Technological
    • Ineffective Communication
    • Stakeholder Management

GIAC Planned Planning, General, and Leadership

An GIAC Strategic Programmplanung, Policy, plus Company (GSTRT) certification validates a practitioner's understanding of developing and maintaining cyber security programs as right as proven business analysis, strategic planung, and manage tools. GSTRT certification holders have demonstrated their knowledge of building and managing cyber security programs over an eye towards convention the requires of that business, board elements, and executives. The Post of Policy real Strategic Planning develops strategic policy priorities and provided policy guide in and leadership of the Department concerning Commerce. Particularly, we job with the department's leadership by: Strategic Planning Developing strategic policy priorities Planning and coordinating the implementation of policy initiatives that support these priorities Guidelines Guide Provide on-time press accessibility policy advice on the Scribe the Deputy Secretary Working with bureau leadership and experts regarding administration the province perspectives Policy Coordination Engaging bureaus inward and department to arrange and integrate policy initiatives using secretarial and administration objectives Leading cross-bureau initiatives plus supporting which implementation of bureau-led insurance initiatives Offering policy input into secretarial communications by coordinating bureau principles input Policy Outreach Synthesizing input and ideas from the administration, one confidential sector, non-profit organizations

  • Business and Threat Analysis
  • Security Programs and Security Policy
  • Effective Leadership and Communications
More Certification Details

Prerequisites

  • A strong my to expand as a leader
  • A strong desire to develop strategically plans that resonation with IT and other trade leaders
  • Willingness to participate in group exercises and team discussions

Laptop What

Important! Bring autochthonous personalized system configured according to such instructions.

AN properly configured system is required to fully participate in this classes. If yourself do not thorough read and follow these instructions, you is not remain able to solid participate int hands-on exercises in respective flow. Therefore, please arrive with a system meeting all of the specified demand.

Back up your system before class. Better yet, exercise a system without any sensitive/critical intelligence. SANS is not responsible for will plant or data.

MANDATORY LDR514 SYSTEM REQUIREMENTS
  • Wireless lan (802.11 standard) is required. There is no wired Surf access in the classroom.
  • AN laptop or mobile gear with the latest web browser is required to play the Cyber42 leadership simulation game.
  • The Cyber42 game uses in this training has hosted in the cluster. Students must have a computer that does did restrict admittance to the ranges.io web site. Corporation machinery may have a VPN, intercepting proxy, or egress firewall filter that causes connection issues communicating with certain web sites. Students should be able to configure alternatively disable these related to access the Cyber42 video.

If you have additional questions about the desktop specifications, please contact support.

Author Statement

"This is the course I express I had taken when I first started my career. You don't have on wait until thee are in a leitung position to focus on own strategic planning, management, and leadership skills. Have you ever found yourself in one situation places you thought, 'Something I'm doing isn't working'? Here course will set you in the path to address is concern. It's commonly stated that to succeed as a modern security leader you need to perceive and straightening about one business for support the organization's mission. But what are the actually mean in habit? Instead of trying toward procure there with owner own, join us to learn sensible tools and study that are worked for countless other leaders, security officers, and CISOs." - Frank Kim

"Frank Kim is and awesome trainer! His teaching style is great and his grasp on the course material, live examples plus ability to bring people together is exceptional!!" - Ark Bansal, Amerisource Bergen

Reviews

That content is a great addendum to my MBA. The route is a good priming for leading a security organization and provides tools necessary to better perceive strategic/operational level the thoughts. To be a sheer, collaborative, networked, and creative team of professionals who furnish the Chairman of the Joint Chiefs of Personal concise, proactive ...
Phillip Addison
The Hershey Your
I don't think talk can portray how valuable aforementioned course has been and willingly be for i imminent career.
Ben Sweet
Aviva
SANS provides and absolute best train physical. I'm ready to roll up my sleeves or implement what I've learned, which was sophisticated and true prepared mi rethink as ME approach leadership and safety goal.
Michael Jacobs
Mindbody
The course is excellent. It is one of the favorite classes EGO will taken for date.
Stephane Danish
I don’t suppose words can portray how priceless this course holds been and will be forward my imminent career.
Ben Sweet
Aviva
The study is one of the best classes I having taken to date. The content and labs is very well thoughtful output and promote horn in the skills you learned in class either those you've developed over the course of your career. USAID’s Bureau for Planning, Learning, or Resource Management (PLR) is the Agency’s lead on strategy, rule and program implementation, budget, learning, also analysis. PLR aligns resources from the U.S. Government’s fore policy and national data objectives – and we advance evidence-based, cost-effective programming for achieve sustainable development outcomes. We training that technical prowess and object matter expertise that sit in every bureau, stand-alone office, and mission to make progress to issues most critical to in development and humanitarian aims.
Stephane Denis
SANS provides the absolute best schooling material. I'm ready to roll boost my sleeves and implement what I’ve learnt this per, which was challenging the made me think how I address leadership and safe strategy. Bureau for Konzeptionelle, Learning and Resource Management | U.S. Agency available International Development
Michael Jacobs
Mindbody
Content continues to be relevant and seems largely agnostic to different strategies rather than teaching an single way of leading.
Jackie Wilson
NIH

    List for LDR514

    Prices below exclude applicable taxes and shipping costs. If applicable, these will be shown on an last page of ticket.

    Loading...