var lpData = {"site_url":"https:\/\/staging.cyberleadershipinstitute.com","user_id":"0","theme":"astra-child","lp_rest_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/","nonce":"0ecf0564f4","is_course_archive":"","courses_url":"https:\/\/staging.cyberleadershipinstitute.com\/courses-old-learnpress\/","urlParams":[],"lp_version":"4.2.6"};
var gtm4wp_datalayer_name = "dataLayer";
var dataLayer = dataLayer || [];
var twb = {"nonce":"6e00496722","ajax_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin-ajax.php","plugin_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/photo-gallery\/booster","href":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin.php?page=twbbwg_photo-gallery"};
var twb = {"nonce":"6e00496722","ajax_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin-ajax.php","plugin_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/photo-gallery\/booster","href":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin.php?page=twbbwg_photo-gallery"};
var bwg_objectsL10n = {"bwg_field_required":"field is required.","bwg_mail_validation":"This is not a valid email address.","bwg_search_result":"There are no images matching your search.","bwg_select_tag":"Select Tag","bwg_order_by":"Order By","bwg_search":"Search","bwg_show_ecommerce":"Show Ecommerce","bwg_hide_ecommerce":"Hide Ecommerce","bwg_show_comments":"Show Comments","bwg_hide_comments":"Hide Comments","bwg_restore":"Restore","bwg_maximize":"Maximize","bwg_fullscreen":"Fullscreen","bwg_exit_fullscreen":"Exit Fullscreen","bwg_search_tag":"SEARCH...","bwg_tag_no_match":"No tags found","bwg_all_tags_selected":"All tags selected","bwg_tags_selected":"tags selected","play":"Play","pause":"Pause","is_pro":"","bwg_play":"Play","bwg_pause":"Pause","bwg_hide_info":"Hide info","bwg_show_info":"Show info","bwg_hide_rating":"Hide rating","bwg_show_rating":"Show rating","ok":"Ok","cancel":"Cancel","select_all":"Select all","lazy_load":"1","lazy_loader":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/photo-gallery\/images\/ajax_loader.png","front_ajax":"0","bwg_tag_see_all":"see all tags","bwg_tag_see_less":"see less tags"};
var tve_frontend_options = {"ajaxurl":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin-ajax.php","is_editor_page":"","page_events":[],"is_single":"1","social_fb_app_id":"","dash_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/thrive-visual-editor\/thrive-dashboard","queried_object":{"ID":12959,"post_author":"3"},"query_vars":[],"$_POST":[],"translations":{"Copy":"Copy","empty_username":"ERROR: The username field is empty.","empty_password":"ERROR: The password field is empty.","empty_login":"ERROR: Enter a username or email address.","min_chars":"At least %s characters are needed","no_headings":"No headings found","registration_err":{"required_field":"<strong>Error<\/strong>: This field is required","required_email":"<strong>Error<\/strong>: Please type your email address.","invalid_email":"<strong>Error<\/strong>: The email address isn’t correct.","passwordmismatch":"<strong>Error<\/strong>: Password mismatch"}},"routes":{"posts":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/tcb\/v1\/posts","video_reporting":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/tcb\/v1\/video-reporting","testimonials":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/tcb\/v1\/testimonials"},"nonce":"0ecf0564f4","allow_video_src":"1","google_client_id":null,"google_api_key":null,"facebook_app_id":null,"lead_generation_custom_tag_apis":["activecampaign","aweber","convertkit","drip","klicktipp","mailchimp","sendlane","zapier"],"post_request_data":[],"user_profile_nonce":"af2647e82c","ip":"45.156.129.118","current_user":[],"post_id":"12959","post_title":"Home Page","post_type":"page","post_url":"https:\/\/staging.cyberleadershipinstitute.com\/","is_lp":"","conditional_display":{"is_tooltip_dismissed":false}};
Join the Cyber Security Elite - Level Up Yourself, Your Team, Your Organisation
See why leading organisations in over 60 countries around the world rely on Cyber Leadership Institute for learning and career development for cyber security leaders and their teams
TRUSTED BY OVER 5000+ MEMBERS GLOBALLY Empowering Leaders, Developing Teams, Pursuing Excellence
At our core, we serve three distinct yet interconnected groups:
Individuals: Boost your cyber security career with our highly acclaimed courses, coaching, and mentorship. Our programs are tailored to help you climb the career ladder and increase your earning potential. Join a global community of leading cyber experts, all working together to make a real difference.
Enterprises: Strengthen your cyber security leadership team with our modular skills development framework, designed to enhance capabilities and drive effective team performance. Our proven leadership and functional cyber domain training are key to fostering a more cohesive culture and improving staff retention, ultimately paving the way for greater success in the boardroom.
Vendors and Consulting Firms: Take your cyber security expertise to the next level with our specialized courses. We train vendor and consulting teams to better understand and meet the needs of top cyber executives, turning them from regular vendors into essential, trusted advisors.
FEATURED LEADERSHIP DEVELOPMENT PROGRAMS
CYBER LEADERSHIP PROGRAM (CLP)January cohort is now FULL. April cohort is filling up fast, register now.
Are you new to cyber security management, a technology manager, or a senior cyber security leader looking to advance your executive and leadership skills?
The Cyber Leadership Program (CLP) is an intensive, leadership accelerator program designed for cyber professionals who want to advance their executive skills, feel comfortable dealing with senior stakeholders, including c-suite, senior business leaders, board of directors and external regulators. In addition to cyber resilience strategies and risk management, you will learn the essential leadership topics such as effective governance and oversight, developing a high-value cyber strategy, leading a culture change program, running a cyber crises exercise and building high performing teams. Our program is designed to integrate your technical skills with the business skills necessary to support you cyber career advancement ambitions. Graduates from this program typically go on to take the CSTP, to deepen their cyber strategy and transformation skills.
Are you a senior business leader, head of technology or senior cyber security executive, accountable for developing cyber strategy and leading a transformation?
The Cyber Strategy and Transformation Program (CSTP) is an advanced, strategic level course designed for experienced senior leaders, program directors and CISO's who want to advance their strategic thinking and lead cyber transformation programs with confidence across their organization. The CSTP is designed to help you develop and execute high-value strategies to reach cyber resilience quickly and make the important link between cyber strategy, business strategy, and business risk. Learn how to communicate clearly and effectively, enlisting the support of critical stakeholders to accelerate change, and build confidence and credibility with key stakeholders, including the C-suite, regulators and the Board. Typically graduates from the cyber leadership program take CSTP to go deeper in the development of cyber strategy and transformation skills.
Do you want to stand out from the crowd, get ahead of your peers and boost your earning potential, or become an authority in your professional domain?
Elevate Your Personal Brand (EPB) shares proven strategies to help any professional develop a strong personal brand quickly. This short, intensive, and self-paced course will help you develop, monetize, and sustain an outstanding personal brand and equip you with the skills to give you leverage. Designed to position you as the thought leader and obvious choice for keynote addresses, executive roles, opinion pieces, and high-visibility strategic projects, it will also ensure you stand out from the crowd.
Seeking to advance beyond basic certifications and take your first significant step in a new exciting cyber security career?
Cyber Resilience Fundamentals (CRF) is the ultimate entry-level course for aspiring and established cybersecurity professionals who are eager to accelerate their cybersecurity careers, regardless of age, background or experience. From understanding high-impact cyber resilience strategies to articulating cyber risk and strategies to decision-makers, the CRF provides the necessary tools and knowledge to position you as a business-savvy cyber professional, accelerate your career and begin your leadership journey.
Phil is an international keynote speaker, multi-award winning virtual CISO and bestselling author. He is an official member of Forbes Business Council, an Invitation-Only Global Community for Successful Business Owners and Leaders. He was named one of 2020’s Top 100 Most Influential People of African Descent (New York USA), as well as 2017 winner of ISACA International’s Best Article Award (Chicago, USA). His views have been featured by Forbes, CISCO, NZ Business Herald, Financial Standard, SAP, etc., and named as one of the Top 7 Global Cyber Security Leaders in 2023 by the Security Magazine and ISACA.
Darren Argyle
Chairman and Co-Founder
Former Group CISO three times, including Qantas Airlines, Darren was ranked in the Top 100 Chief Information Security Officers globally in 2017 and 2022, achieving 'Innovator of the Year' by SANS Institute 2022. In 2023, awarded Chief Security Officer 30 (CSO30) for the third year running. Including the first Leadership award for CSO30. Darren is currently also serving as the Group Chief Information Security Risk Officer at Standard Chartered Bank based in Singapore.
Jan Schreuder
COO and Co-Founder
Jan is a well-known veteran of the IT and cybersecurity industry. Named in the IFSEC Top 25 Most Influential Global Cyber Security Professionals in 2022. Previously a partner at a Big 4 professional services firm for more than 25 years, Jan lead cybersecurity consulting projects for large global organizations. He is now an independent cybersecurity strategy advisor to boards and executives.
PRACTICAL SKILLS GROUNDED IN REAL-WORLD EXPERIENCE, NOT JUST THEORETICAL KNOWLEDGE
Cyber security technical certifications and degrees are important, but they don't deliver the practical real world skills required to meet on the job demands of todays modern cyber leaders. Technical functional skills alone creates specialists who don't always understand the big picture and can’t communicate effectively with the board, executive management, or business stakeholders — skills usually developed through years of experience.
In addition to high impact cyber strategies, we teach you the complete set of interconnected business skills, supported by advance toolkits you need to succeed as a cyber leader including:
Enabling the business strategy with your cyber strategy
Linking cyber risk to enterprise and operational risk
Stakeholder management and communication
Metrics, measures and KPIs
Program planning, budgeting, and oversight
Develop and lead culture change programs
Team building and department leadership
GET CLARITY AND FOCUS
Sharply focus on the high-value cyber strategies that deliver the greatest risk reduction.
We help you to cut through the noise...
Senior business professionals often find cybersecurity overly technical and complex. As a result, they often have limited direct engagement in or buy-in into the key decisions required to drive cyber resilience.
..with laser-focused high impact strategies
We help you cut through the complexity and steer away from conventional, one-size-fits-all cybersecurity investment models to define high impact strategies that prioritize your “crown jewels.”
FLEXIBILITY TO WORK ONLINE
AT YOUR OWN PACE
We understand that business executives are busy. That’s why all of the Cyber Leadership Institute learning programs are available in multiple formats, so you can choose to work the way you want to. Learn anytime, anywhere, in whichever mode you like
Online e-learning platform
Watch training videos in high definition at adjustable playback speeds, listen to recordings or read the text transcripts. Access the training online from any desktop or mobile device, anywhere in the world, anytime you like.
Join the Cyber Leadership Hub
Join an online community of like-minded cyber leaders who are all tackling cyber risks in their businesses. Created to democratize essential and high-quality toolkits, helping you fast-track your resilience strategies. We help you accomplish more without breaking the bank because we are simply obsessive about CISO success. Get inspired, ask questions, generate ideas, work together, share solutions, build trust, and lead the charge together.
On-demand mentoring by experienced cyber leaders
Get personalized mentoring from experienced cyber leaders who can troubleshoot your problems and provide direction. All programs include weekly Q&A calls, recordings, case studies, live stream sessions and 24/7/365 support.
Real world experience
Enhance your credibility as an executive cyber leader by learning and applying practical strategies that have been tried and tested in real world situations.
FEEDBACK FROM PREVIOUS ATTENDEES
FEATURED RESOURCES
CISO Playbook:
Protecting the Crown
Jewels
Build a cybersecurity strategy around high-value digital assets.
CISO Playbook:
Mergers and Acquisitions
Learn to balance cybersecurity risk with business opportunity.
CISO Playbook:
First 100 Days
First 100 Days CISO training, setting the CISO up for success.
CISO Playbook:
Cyber Resilience Governance
Learn to develop lean, efficient, and effective cyber governance structures.
Click here to access an ever-growing collection of valuable resources intended to help cyber security professionals and cyber leaders successfully lead their organizations to cyber resilience.
CISOs are now closely involved in strategic decision making, including mapping product road maps, complying with a raft of regulations, ensuring the business securely embraces digital transformation while assuring the board, clients and investors that cyber capabilities are fit for purpose.
The old narrative that you focus on deterrent cyber controls doesn’t make sense any more. Most enterprises now concede that if a capable threat actor targets them, it will likely get in.
At the Cyber Leadership Institute, we are obsessed with helping aspiring CISOs realize and fulfil their dreams. We recognize, however, the gender imbalance within our industry.
I’m often asked by my fellow colleagues, 'what keeps me up at night?', to which I currently reply, 'an uncomfortable bed'. For those of you who have ever had significant home renovation, I know you will sympathize.
Our reimagined one-stop-shop that will give you full access to a range of tools designed to help you excel in your executive role, boost your credibility, and advance your career, including:
Access to the CISO Playbook series — our in-depth guides designed to assist yourcybersecurity posture — and other free resources
Private discussions groups where you can discuss cybersecurity topics with your global peers
The latest cybersecurity industry news, all in one place
A monthly newsletter jam-packed with actionable cybersecurity leadership insights, inspiring CISO success stories, and career transforming tips
Live or recorded webcasts on emerging cyber risks andcutting-edge leadership ideas
First access to job opportunities posted directly by hiring CISOs, not recruiters
To improve your experience, our new Hub is available on Web, Android, and iOS.
var starter_templates_zip_preview = {"AstColorPaletteVarPrefix":"--ast-global-color-","AstEleColorPaletteVarPrefix":["ast-global-color-0","ast-global-color-1","ast-global-color-2","ast-global-color-3","ast-global-color-4","ast-global-color-5","ast-global-color-6","ast-global-color-7","ast-global-color-8"]};