Cyber Security

Transforming CISO Success

How to succeed as a CISO: leader of the most important and demanding profession of the information, digital, and cyber age

Upcoming Course Dates

View all course dates

There are currently no dates scheduled for this course, or in the city selected.
Try viewing all dates & locations or else contact us for more information.

 

Overview

How to succeed as a CISO: leader of the most important and demanding profession of the information, digital, and cyber age?

In this innovative and ground-breaking two-day seminar, world-leading security strategist and architect, and author of the SABSA methodology, David Lynas, will introduce hugely valuable methods and techniques to transform CISO success in building, leading and sustaining an Enterprise Security program, and take an existing program to the next level.

Our Trainers Make the Difference

With 40 years experience in security, David has been at the forefront of the Enterprise Security Architecture field since its inception in 1995. David is a co-author of the SABSA Methodology & Chief Education Officer at The SABSA Institute.

  • David Lynas

    David Lynas is co-author and developer of the SABSA framework and is the world leading authority on the use and application of SABSA.

    Read full bio

Learning Outcomes

There are two key objectives of this seminar:

  • Support the CISO
  • Enable the Business

The challenges today are too profuse to list. The business is complex, ever evolving, and full of inter-connected risks and dependencies. Yet it demands value, and it expects solutions. There are always too many high priorities and always too much to do but rarely enough support, understanding, money, time, or resources to do it with. And just when you think you are getting somewhere, everything changes.

Who Should Attend

  • CISOs
  • CISO reports
  • Security Management
  • Security Architects
  • Risk Professionals
  • Governance Professionals

Course Contents

1. The Security Framework

  • Establish a Business-driven focus to ensure Security is always delivered in the context of the Business mission and objectives
  • Define a repeatable approach to understand requirements and make meaningful decisions within the complexity of the modern Enterprise
  • Inform the way the Security team approaches their work and frame the questions they ask
  • Create a common structure, a common language, common principles, and a common means by which diverse specialists can collaborate, interact, and make decisions
  • Integrate and align in a security context, the diverse Enterprise methods, frameworks, and standards, whatever they are, whatever they become
  • Balance the need to protect what matters while embracing innovation in a coherent, holistic, systemic way
  • Deploy techniques to resolve complexity and deliver clarity of risk ownership, governance, and policy

2. Requirements

  • Define and articulate what Security means and what it must achieve in your unique Enterprise context
  • Create a stakeholder engagement and communications technique to cross the chasm between Business and Security
  • Apply a method to model Business Requirements as normalised, measurable, demonstrable, re-usable, reportable requirements for Security
  • Demonstrate the ability to understand what matters most, articulate it, and validate it with stakeholders at all levels in the most instinctive way possible

3. Value

  • Overcome the legacy of Security as a constraint to progress, innovation, and change
  • Transform perceptions into those of a pro-active, beneficial, and Business-enabling function
  • Answer the important “So what?” questions
  • Understand what stakeholder success looks like and how to support it
  • Demonstrably contribute to Business and client success
  • Provide traceability that requirements are met
  • Ensure transparency of solutions value
  • Develop the capability to identify and assess real value from supplier snake oil, magic silver bullets, and claims that one-size-fits-all
  • Deliver in-context measures, metrics, and reporting

4. Risk

  • Architect Security Risk in the context of Business Risk
  • Achieve an appropriate balance between realising opportunities for gain while minimising loss
  • Apply an architecturally structured and comprehensive approach
  • Integrate and align risk silos to holistically embed risk management into all levels and perspectives of Enterprise
  • Traceably align risk management activities to Enterprise context
  • Customise ‘risk thinking’ to be instinctive to the Enterprise culture
  • Provide a method to include and engage Stakeholders at all levels in meaningful terms
  • Deliver clarity and certainty of risk ownership
  • Empower risk owners to make objective and proportionate risk decisions in-context
  • Cater for the systemic, interconnected, interdependent nature of risk complexity
  • Create an ability to clearly define risk appetite
  • Distribute Business risk appetite downwards to specialist technical areas, and report risk performance upwards to Business

5. Governance

  • Define clear dominions of authority
  • Understand and communicate the dependencies and inter-dependencies of authorities both internally and externally in a complex interacting Enterprise
  • Resolve the competing and conflicted interests of authorities
  • Allocate and enact clear Accountability
  • Allocate and enact clear Responsibilities
  • Define the necessary channels and types of communication required between Accountable and Responsible parties
  • Understand trust requirements and enable trusted relationships

6. Policy

  • Transform a rules-based enforcement culture with policy that is advocated and embraced
  • Ensure policy is Business-driven and clearly embeds and supports stakeholder objectives
  • Overcome constraints to policy success
  • Create a simplified structure that is easy to maintain and adaptable to change
  • Provide an integrated and holistic Architectural policy structure that embeds control and enablement objectives for what really matters, with dominions of authority for what matters, and clearly defined authority, roles, and responsibilities

7. Making it Happen

  • Resolve the strategist’s eternal dilemma – how to turn strategy into reality
  • Provide a method to translate ever-changing complex requirements into a definitive Security Strategy
  • Specify the Security Roadmap to deliver the Strategy through prioritised actionable transformations, programs, and solutions
  • Ensure that the roadmap encompasses requirements for strategic transformation, remediation of current-state issues, and has the capability to adapt to changing circumstances and priorities
  • Create a problem-solving framework for dealing with tomorrow’s problems
  • David is extremely knowledgeable in architecture. I recommend David to do anything with security architecture. Thanks to David for making the course interesting and providing some real examples.

    Face-to-Face Training | 2022

Testimonial

SABSA Foundation

read more

Fees

Transforming CISO Success (2 days) 

  • $2,480 + gst

Fee Includes:

  • Comprehensive seminar workbook
  • Certificate of attendance

Pre-requisites:

There are no pre-requisites to attendance. The SABSA Methodology will be referenced but no SABSA knowledge or experience is necessary.