Security Leadership and Management w/ Chris Brenton (4 Sessions – 4 Hour Classes)
Instructor: Chris Brenton
- A full set of example security policies
- A full security awareness training program
- Example questionnaire for validating vendor security
- Course slide and additional collateral
- Six-month complimentary access to our Cyber Range
- Much more!
“Security” is arguably one of the most challenging disciplines to move from being an individual contributor (IC) to being a manager. While security ICs can perform most tasks in isolation, a manager needs to regularly interact with people both inside and outside of the team. Further, “security” has its own language which can be completely foreign to people outside of the discipline. How do you take security concerns and convert them into a language that senior leaders and “C” levels can understand? Honing these skills will be the primary objective of this course.
In this course, we will cover all of the steps needed to stand up and lead a security team within an organization. We start with a clean slate so that every aspect gets covered. If you are in an environment that already has a security team, this can help fill in the gaps. This course will have a heavy focus on how to integrate the security team with the rest of the business units. We’ll look at strategies for increasing funding, as well as converting “security risks” into “business risks” so they are better understood by the organization’s leadership. The course includes a lot of collateral like a full set of pre-written security policies. The goal is to help you build an effective security team in as little time as possible.
Who should take this course:
Security managers that are struggling for budget
Security managers that face challenges when communicating with “C” level roles
Individual contributors looking to move to security management
Existing security managers looking to improve their execution
Individuals that are struggling to stand up a full security program
Audience skill level:
Students should have a basic understanding of multiple security disciplines. You need to be able to bring a holistic view of how different security technologies fit together. For example, you don’t need to be a seasoned pentester, but you should understand the value a pentest can provide and how it fits into a layered security model.
A system capable of participating in the video session. A stable Internet connection with sufficient speeds for video conferencing. Software capable of reading standard documents (MS Office, Google Drive, LibreOffice, etc).
What students should bring:
An open mind, a positive attitude, and a curiosity to improve their skills.
Join the Wild West Hackin’ Fest Discord server to stay updated on future training and webcasts: Join Our Server!