Data and information security are at the top of the agenda for CEOs, boards of directors, enterprise senior leaders, and especially CISOs in most every organization across all industries. This uniquely positions security teams to not only protect the business, but more importantly, to help shape the business.
We compiled insights from our National Advisory Board comprised of industry-leading information security officers, survey results from over 3000 executives, and content detail from over 100 focus groups to design and make available the CCI Cybersecurity Leadership Academy. This 12-week fully facilitated online leadership program is like none other you have experienced.
Enterprise Cybersecurity Leadership is designed to maximize ROI on participants’ time and consists of 12 one-week modules with a time commitment of 30-60 minutes per day. Modules can be completed on the participants’ schedule and accessed online anywhere.
|1||The Security Leadership Mindset||Program overview focused on what it means to think and act like a cybersecurity leader.|
|2||The Art of Security Intelligence||Learn how data security professionals can best obtain, use, and distribute threat intelligence.|
|3||The Balance Between Security & Innovation||Establish a mindset that embraces innovation and looks for ways to consistently simplify complexity.|
|4||Security Change Mindset||Learn to be a change agent and use change practices to address and overcome security challenges.|
|5||Positive Leadership in Security||Develop positive leadership practices to achieve positively deviant organizational outcomes.|
|6||Collaboration & Negotiation||Apply Mutual Gains Approach and leverage collaboration necessary to provide satisfying outcomes and enhance relationships.|
|7||Security Communication||Adapt practical and meaningful useful techniques for how IT security leaders can communicate within and outside of the organization.|
|8||Relationship Management||Create and execute the steps to build strong professional relationships and form key strategic partnerships.|
|9||Security & the Network of Things||Use your network to aid in developing and maintaining an effective risk management strategy.|
|10||Your Changing Role in Security||Apply techniques for learning and adapting as a cybersecurity leader while establishing a clear leadership philosophy.|
|11||Simulated Cyberattack||Foster development and alignment within cybersecurity individuals and work teams through drills, training, and war games.|
|12||The Power of One||Communicate how your value as a cybersecurity leader directly impacts the long-term success of the enterprise and beyond.|
"This is the single best professional development training we have received in the past decade. I have witnessed transformations in myself as well as my co-workers."
"I loved being able to work on the content on my schedule. Having the breakout group calls each week kept me accountable to having my activities done. The best part was working with my classmates and making those networking connections. They added a different perspective than my own or validated that I was headed in the right direction. Invaluable!"
— IT Manager