var lpData = {"site_url":"https:\/\/staging.cyberleadershipinstitute.com","user_id":"0","theme":"astra-child","lp_rest_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/","nonce":"3b303d02ab","is_course_archive":"","courses_url":"https:\/\/staging.cyberleadershipinstitute.com\/courses-old-learnpress\/","urlParams":[],"lp_version":"4.2.6"};
var gtm4wp_datalayer_name = "dataLayer";
var dataLayer = dataLayer || [];
var twb = {"nonce":"cc59c81a29","ajax_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin-ajax.php","plugin_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/photo-gallery\/booster","href":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin.php?page=twbbwg_photo-gallery"};
var twb = {"nonce":"cc59c81a29","ajax_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin-ajax.php","plugin_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/photo-gallery\/booster","href":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin.php?page=twbbwg_photo-gallery"};
var bwg_objectsL10n = {"bwg_field_required":"field is required.","bwg_mail_validation":"This is not a valid email address.","bwg_search_result":"There are no images matching your search.","bwg_select_tag":"Select Tag","bwg_order_by":"Order By","bwg_search":"Search","bwg_show_ecommerce":"Show Ecommerce","bwg_hide_ecommerce":"Hide Ecommerce","bwg_show_comments":"Show Comments","bwg_hide_comments":"Hide Comments","bwg_restore":"Restore","bwg_maximize":"Maximize","bwg_fullscreen":"Fullscreen","bwg_exit_fullscreen":"Exit Fullscreen","bwg_search_tag":"SEARCH...","bwg_tag_no_match":"No tags found","bwg_all_tags_selected":"All tags selected","bwg_tags_selected":"tags selected","play":"Play","pause":"Pause","is_pro":"","bwg_play":"Play","bwg_pause":"Pause","bwg_hide_info":"Hide info","bwg_show_info":"Show info","bwg_hide_rating":"Hide rating","bwg_show_rating":"Show rating","ok":"Ok","cancel":"Cancel","select_all":"Select all","lazy_load":"1","lazy_loader":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/photo-gallery\/images\/ajax_loader.png","front_ajax":"0","bwg_tag_see_all":"see all tags","bwg_tag_see_less":"see less tags"};
var tve_frontend_options = {"ajaxurl":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin-ajax.php","is_editor_page":"","page_events":[],"is_single":"1","social_fb_app_id":"","dash_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/thrive-visual-editor\/thrive-dashboard","queried_object":{"ID":26504,"post_author":"3"},"query_vars":{"page":"","pagename":"our-members"},"$_POST":[],"translations":{"Copy":"Copy","empty_username":"ERROR: The username field is empty.","empty_password":"ERROR: The password field is empty.","empty_login":"ERROR: Enter a username or email address.","min_chars":"At least %s characters are needed","no_headings":"No headings found","registration_err":{"required_field":"<strong>Error<\/strong>: This field is required","required_email":"<strong>Error<\/strong>: Please type your email address.","invalid_email":"<strong>Error<\/strong>: The email address isn’t correct.","passwordmismatch":"<strong>Error<\/strong>: Password mismatch"}},"routes":{"posts":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/tcb\/v1\/posts","video_reporting":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/tcb\/v1\/video-reporting","testimonials":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/tcb\/v1\/testimonials"},"nonce":"3b303d02ab","allow_video_src":"1","google_client_id":null,"google_api_key":null,"facebook_app_id":null,"lead_generation_custom_tag_apis":["activecampaign","aweber","convertkit","drip","klicktipp","mailchimp","sendlane","zapier"],"post_request_data":[],"user_profile_nonce":"3242568761","ip":"98.80.143.34","current_user":[],"post_id":"26504","post_title":"Our members","post_type":"page","post_url":"https:\/\/staging.cyberleadershipinstitute.com\/our-members\/","is_lp":"","conditional_display":{"is_tooltip_dismissed":false}};
JOIN OUR GLOBAL MOVEMENT OF VISIONARY CYBER LEADERS
Our Purpose
The Cyber Leadership Institute is creating a powerful and diverse global movement of visionary cyber leaders who think critically and actively collaborate to drive positive change within their organizations and accelerate the creation of a resilient digital ecosystem.
Become part of a closely bonded network of like-minded cyber leaders from all over the world.
CYBER LEADERS ON THE MOVE – Untold Stories of Visionaries shaping the Cyber World
Since its founding, CLI has trained cyber leaders from more than 47 countries, cutting through genders, cultures, geographies, and industries. Our ambitious journey — to build a global cohesive global community of 10 000 cyber leaders who actively collaborate to create a safer digital world — has connected us with some incredible global change-makers.
From the bustling Nairobi, to the charming Geneva, from the megacity of Mumbai to the Fijian Archipelagos, these remarkable stories have inspired the cyber community to dream beyond any perceived limitations.
Here are some of our most remarkable alumni going beyond the call of duty in the fight against the menace of cybercrime.
Ashwin Ram
Cybersecurity Evangelist, Check Point
Our inaugural story features the charismatic Ashwin Ram, who boasts more than 15 years on the frontlines of cyber defense. Ashwin’s journey, who spent part of his childhood growing up in Lakeba, a remote island in Fiji’s Southern Lau Archipelago, comprised of six villages with only two vehicles in his time, is deeply inspiring to say the least.
Director of Global Cyber Threat Intelligence, Nike
At 14, Noureen stripped her home PC down, carefully studied dozens of individual components, and then rebuilt the PC. From that moment, her tech career started. Noureen went on to defy incredible odds, migrating to the USA at a young age, and accelerating herself through the ranks to the Director of Global Cyber Threat Intelligence at Nike. Noureen’s journey proves the remarkable power of relentless focus to achieve goals previously deemed unreachable.
Possessing a rare combination of deep leadership experience, clarity of thought, and humility, Georges is one of the most decorated CISOs out there. During his stellar career, spanning different geographies and changing times, he held executive and advisory roles at major global brands like Etihad Airways, Thales, IBM, Airbus, and the World Economic Forum. The Childhood lessons in empathy and hard work continue to push Georges forward.
Growing up in Wales, Natasha was acutely aware she was different as one of only three black/mixed-race kids at school. But Natasha would soon turn her proverbial lemons into lemonade. The absence of a relatable role model instilled an unrelenting quest for self-improvement. Now Cyber Security Consulting Partner at KPMG Natasha has become the mentor to emerging female leaders she never had.
Born and raised the UK, Joss’s love for cybersecurity was birthed within the Royal Air Force (RAF), which she joined at a young age. She spent almost two decades across multiple mission-critical roles within the RAF, working on the cutting edge of IT security, learning techniques to identify and exploit physical and technical vulnerabilities. The adversities she faced at a young age instilled bottomless quest for self-improvement and empathy.
Global Chair of OWASP and Security Relations Leader APJ, ANZ region at Snyk
Vandana learnt the importance of competing against herself at a young age. Whilst in college, Vandana dabbled in networking computers and routers and then pursued an MBA. Vandana built her impressive career across global tech giants like Wipro, IBM, and Accenture. But what is most inspiring about Vandana is her selflessness, championing diversity on the global stage, founding InfoSec Kids, and most recently being appointed Chair of OWASP.
Cyber leaders who participate in our flagship executive courses — Cyber Leadership Program (CLP) and Cyber Strategy and Transformation Program (CSTP) — are required to participate in strategy presentation competitions. Why do we gamify cyber strategy design and presentation? Because as countless studies show, the fastest path to mastery is through doing. These competitions reinforce strategy design, leadership, stakeholder engagement, and board communication skills — essentials to succeed in the high-pressure CISO role. The following winners of these highly contested competitions rigorously tied their cyber strategies to business goals, ruthlessly prioritized high-impact initiatives, defined clear road maps, and presented their strategies with clarity, persuasion, and impact.
Cyber Leadership Program (CLP)
Natasha Passley
Cybersecurity Consulting Partner, KPMG
June 2020 CLP Cohort
Eugene Teo
VP & Deputy Chief Security Officer, UKG
August 2020 CLP Cohort
Ashwin Ram
Cybersecurity Evangelist, Check Point Software Technologies, Ltd.
October 2020 CLP Cohort
Niranjan Kunwar
Senior Director, Information Security Architecture, Vontier
November 2020 CLP Cohort
Joss Howard
Cybersecurity Partner, McGrathNicol
February 2021 CLP Cohort
Nicole Neil
Director Information Security, Seer
April 2021 CLP Cohort
Etienne Botha
Country Security Manager | Intelligence Analyst | Cyber Specialist, Saipem
June 2021 CLP Cohort
Neil Gooding
Information Security Lead,
BP
August 2021 CLP Cohort
Arun Subramaniam
Senior Security Architect, Woolworths Group
September 2021 CLP Cohort
Sajin Nelson
Information Security Manager, UK Software Solutions and Managed Services
November 2021
CLP Cohort
Ankur Kumar
Director, CyberStrat
February 2022 CLP Cohort
Danielle Pentony
A/g Chief Information Security Officer, Australian Digital Health Agency
April 2022 CLP Cohort
Avelet Fernandes
Information Security Audit Manager, Haleon
June 2022 CLP Cohort
Joe Varkey
Domain Manager,
Transport for NSW
August 2022 CLP Cohort
Prashil Kumar
Senior Manager IT & Cybersecurity,
Fiji Airways
October 2022 CLP Cohort
Pete Sharp
Head of Cybersecurity Strategy & Governance
February 2023 CLP Cohort
Tim Vonderwall
General Manager Corporate Services, Rural City of Murray Bridge
February 2023 CLP Cohort
Krishna Bagla
Service Delivery Manager,
Penrith City Council
February 2023 CLP Cohort
Johanna Williamson
Senior Manager - Security Strategy & Governance, nbn™ Australia
April 2023 CLP Cohort
Grant Hughes
IT Manager: Cybersecurity GRC, Engen
June 2023 CLP Cohort
Daniel Johns
Principal Security Consultant, MyCISO
August 2023 CLP Cohort
Cyber Strategy and Transformation Program (CSTP)
Ashwin Ram
Cybersecurity Evangelist, Check Point Software Technologies, Ltd.
August 2021 CSTP
Cohort
Jumar Pando
Cyber Security & IT Risk,
MECCA Brands
September 2021 CSTP Cohort
Tom Sadler
Head of Cyber Security and IT,
Prospa
November 2021 CSTP Cohort
Louisa Vogelenzang
Head of Cybersecurity APJ, Ceridian
February 2022 CSTP Cohort
Satinder Singh
Senior Manager, Cyber Security, KPMG Canada
June 2022 CSTP
Cohort
Joe Varkey
Domain Manager,
Transport for NSW
October 2022 CSTP Cohort
David Stafford-Gaffney
General Manager Cybersecurity (AU),
Datacom
March 2023 CSTP Cohort
Join us
Join our global community of cyber leaders by becoming a member of the Cyber Leadership Institute. We offer various membership categories to suit your needs, as outlined below:
FREE
MEMBERSHIP
Join the Cyber Leadership Institute for Free and take advantage of CLI free resources, customizable toolkits, an instant network of cyber experts, live webcasts and more!
Transform your entire organization with unrestricted access to hundreds of carefully curated actionable strategy guides, executive templates, research, and other toolkits.
var starter_templates_zip_preview = {"AstColorPaletteVarPrefix":"--ast-global-color-","AstEleColorPaletteVarPrefix":["ast-global-color-0","ast-global-color-1","ast-global-color-2","ast-global-color-3","ast-global-color-4","ast-global-color-5","ast-global-color-6","ast-global-color-7","ast-global-color-8"]};