var lpData = {"site_url":"https:\/\/staging.cyberleadershipinstitute.com","user_id":"0","theme":"astra-child","lp_rest_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/","nonce":"04a0776f6a","is_course_archive":"","courses_url":"https:\/\/staging.cyberleadershipinstitute.com\/courses-old-learnpress\/","urlParams":[],"lp_version":"4.2.6"};
var gtm4wp_datalayer_name = "dataLayer";
var dataLayer = dataLayer || [];
var twb = {"nonce":"6a807139b9","ajax_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin-ajax.php","plugin_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/photo-gallery\/booster","href":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin.php?page=twbbwg_photo-gallery"};
var twb = {"nonce":"6a807139b9","ajax_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin-ajax.php","plugin_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/photo-gallery\/booster","href":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin.php?page=twbbwg_photo-gallery"};
var bwg_objectsL10n = {"bwg_field_required":"field is required.","bwg_mail_validation":"This is not a valid email address.","bwg_search_result":"There are no images matching your search.","bwg_select_tag":"Select Tag","bwg_order_by":"Order By","bwg_search":"Search","bwg_show_ecommerce":"Show Ecommerce","bwg_hide_ecommerce":"Hide Ecommerce","bwg_show_comments":"Show Comments","bwg_hide_comments":"Hide Comments","bwg_restore":"Restore","bwg_maximize":"Maximize","bwg_fullscreen":"Fullscreen","bwg_exit_fullscreen":"Exit Fullscreen","bwg_search_tag":"SEARCH...","bwg_tag_no_match":"No tags found","bwg_all_tags_selected":"All tags selected","bwg_tags_selected":"tags selected","play":"Play","pause":"Pause","is_pro":"","bwg_play":"Play","bwg_pause":"Pause","bwg_hide_info":"Hide info","bwg_show_info":"Show info","bwg_hide_rating":"Hide rating","bwg_show_rating":"Show rating","ok":"Ok","cancel":"Cancel","select_all":"Select all","lazy_load":"1","lazy_loader":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/photo-gallery\/images\/ajax_loader.png","front_ajax":"0","bwg_tag_see_all":"see all tags","bwg_tag_see_less":"see less tags"};
var tve_frontend_options = {"ajaxurl":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin-ajax.php","is_editor_page":"","page_events":[],"is_single":"1","social_fb_app_id":"","dash_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/thrive-visual-editor\/thrive-dashboard","queried_object":{"ID":9074,"post_author":"3"},"query_vars":{"page":"","pagename":"strategyandtransformation-video"},"$_POST":[],"translations":{"Copy":"Copy","empty_username":"ERROR: The username field is empty.","empty_password":"ERROR: The password field is empty.","empty_login":"ERROR: Enter a username or email address.","min_chars":"At least %s characters are needed","no_headings":"No headings found","registration_err":{"required_field":"<strong>Error<\/strong>: This field is required","required_email":"<strong>Error<\/strong>: Please type your email address.","invalid_email":"<strong>Error<\/strong>: The email address isn’t correct.","passwordmismatch":"<strong>Error<\/strong>: Password mismatch"}},"routes":{"posts":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/tcb\/v1\/posts","video_reporting":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/tcb\/v1\/video-reporting","testimonials":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/tcb\/v1\/testimonials"},"nonce":"04a0776f6a","allow_video_src":"1","google_client_id":null,"google_api_key":null,"facebook_app_id":null,"lead_generation_custom_tag_apis":["activecampaign","aweber","convertkit","drip","klicktipp","mailchimp","sendlane","zapier"],"post_request_data":[],"user_profile_nonce":"5c5e9f1c8c","ip":"","current_user":[],"post_id":"9074","post_title":"Cyber Strategy and Transformation Program","post_type":"page","post_url":"https:\/\/staging.cyberleadershipinstitute.com\/strategyandtransformation-video\/","is_lp":"","conditional_display":{"is_tooltip_dismissed":false}};
Join the Elite: Cyber Strategy and Transformation Program – Cement your current CISO level position and accelerate your path toward more senior strategic roles
In just 8 weeks, quickly acquire the exact strategic cyber security executive skills, backed by proven methods, mentorship and career coaching, to effectively deliver high value in complex digital cyber transformation programs for demanding senior stakeholders.
Designed for elite cyber security leaders at the top of their game, looking to gain the edge and step up into more senior international Group CISO roles, executive cyber consulting positions and Cyber Advisory Board roles.
To preview Elevate Your Personal Brand course content, please watch the videos below.
Week 1: Accelerating your cyber resilience
Introduction and Housekeeping
Introduction: Important things to remember
Introduction: Cyber Resilience Mindset
Introduction: Program Overview
Introduction: Terminology
Week 1: Overview
1.1. Why do you need to accelerate your cyber resilience?
1.2. Key success factors
1.3. Five essential disciplines
1.4. Approach - the basics
1.5. Fundamentals first
1.6. What is cyber resilience?
1.7.a. Developing a high value cyber resilience strategy
1.7.b. Measuring the value of cyber resilience
1.8. Assessing your current cyber resilience - getting visibility fast
1.9. Setting up for success
1.10. Learn from others and avoid failure - key pitfalls
Week 1: Action Items
Week 2: Where do you want to be? The target state
2.1. Introduction: Developing your cyber resilience strategy
2.2.a. Drivers for your strategy
2.2.b. Drivers for your strategy (Part 2)
2.3. Where do you want to be? How will you know? Target future state
2.4. How will you really know? KPIs, KRIs and metrics
2.5. Getting stakeholder buy-in and agreement to the target state
Week 2: Action Items
Week 3: Where are you now? Measuring your current state
3.1. The importance of a solid baseline -
3.2. What is your cyber posture?
3.3. Are you meeting your regulatory obligations?
3.4. What is your cyber risk profile?
3.5. Are you cyber enabling the business strategy?
3.6. How mature are your cyber capabilities?
3.7. How much is cybersecurity costing you?
3.8. Getting stakeholder buy-in and agreement to the current state assessment
Week 3: Action Items
Week 4: What do you need to get there? Developing a high value cyber resilience strategy
What do you need to get there? Developing a high value cyber resilience strategy
4.1. Defining strategies
4.2. High value strategies - lessons from the trenches
4.3. Prioritizing the crown jewels
4.4. Building mature capabilities quickly
4.5. Developing a cyber-savvy workforce
4.6. Securing your digital transformation
4.7. Managing third party cyber risk
4.8. Cyber insurance
4.9. Reducing the attack surface
4.10. Getting stakeholder buy-in and agreement to your strategy
Week 4: Action Items
Week 5: How do you get there? Developing the roadmap and budget
5.1. Developing your transformation roadmap and budget
5.2. How quickly can you build resilience and deliver value
5.3. Accelerating core capability build
5.4. Build vs. buy
5.5. Picking the right partners
5.6. Fast tracking the selection process
5.7. Plan the people and change impact of the program
5.8.a. Developing your program delivery plan
5.8.b. Developing your program delivery plan
5.9.a. Getting your budget prepared and approved
5.9.b. Getting your budget prepared and approved (Part 2)
Week 5: Action Items
Week 6: Making it happen – Mobilizing the transformation
6.1. Setting your Cyber Transformation Program up for success
6.2. Getting key delivery stakeholders on board
6.3. Establishing a cross-functional program steering committee
6.4. Assembling an experienced delivery team
6.5. Structuring the program to deliver value
6.6. Managing program delivery risks
Week 6: Action Items
Week 7: Delivering value quickly – Accelerating execution
7.1. Building sustainable capabilities
7.2. Delivering value quickly
7.3. Tracking progress against your goals: how do you know?
7.4. Communicating the value you've delivered
Week 7: Action Items
Week 8: Lock in the value – Sustaining your cyber resilience
8.1. Embedding security solutions into operations
8.2.a. How do you know? Tracking and monitoring ongoing cyber resilience
8.2.b. How do you know? Tracking and monitoring ongoing cyber resilience (Part 2)
8.3. Continuous testing and learning
8.4. Securing remediation funding
8.5. Sustaining momentum during constant change
8.6. Adapting your cyber strategies to new and emerging threats
8.7. Ensuring resilience during major organizational change
Week 8: Action Items
Being overlooked at promotion time, not quite landing the interviews you hoped for, and missing out on the compensation uplift that many of your peers are now enjoying can be frustrating.
With enough hard work and commitment you may eventually get the rewards you deserve, but why wait until you're close to retirement age. Take advantage of this comprehensive package of mentorship, executive level coaching and proven techniques designed to help you lead yourself and your teams with confidence.
Our unique approach combines online tutorials you can access anytime anywhere from a digital platform, via web or mobile and weekly live check in calls. No tests or exams, but instead you'll get to build a strategy and transformation project during the program. You also get 12 months access to all training materials, course toolkits and premium membership benefits; and so much more.
Being overlooked at promotion time, not quite landing the interviews you hoped for, and missing out on the compensation uplift that many of your peers are now enjoying can be frustrating.
With enough hard work and commitment you may eventually get the rewards you deserve, but why wait until you're close to retirement age. Take advantage of this comprehensive package of mentorship, executive level coaching and proven techniques designed to help you lead yourself and your teams with confidence.
We run limited cohorts every year and we opt for smaller, more personal exclusive groups to ensure the highest quality and focused attention for our attendees., unlike many other course providers. Consequently, limited spaces tend to sell out quickly. To secure your spot and avoid missing out and a chance to get a ahead of your peers, register today.
Ready to join the elite? Let our founders Darren, Phil, and Jan lead you to your next career milestone - check out just some of the endorsements below, from our 5000+ members from around the world.
Our unique approach combines online tutorials you can access anytime anywhere from a digital platform, via web or mobile and weekly live check in calls. No tests or exams, but instead you'll get to build a strategy and transformation project during the program. You also get 12 months access to all training materials, course toolkits and premium membership benefits; and so much more.
We run limited cohorts every year and we opt for smaller, more personal exclusive groups to ensure the highest quality and focused attention for our attendees., unlike many other course providers. Consequently, limited spaces tend to sell out quickly. To secure your spot and avoid missing out and a chance to get a ahead of your peers, register today.
Ready to join the elite? Let our founders Darren, Phil, and Jan lead you to your next career milestone - check out just some of the endorsements below, from our 5000+ members from around the world.
SAMPLE OF WHAT YOU'LL LEARN IN THIS 8 WEEK PROGRAM
ESTABLISH PROGRAM SPONSORSHIP AND AGILE GOVERNANCE
Using our adaptive model, you'll be able to deliver with confidence and ensure key stakeholder engagement and buy-in
PROGRAM METRICS DESIGNED TO DELIVER CONFIDENCE AND SUSTAINABILITY
Step-by-step tutorials supported by practical metrics toolkits you can apply easily and measure your progress toward program goals
DELIVER A HIGH-VALUE CYBER RESILIENCE STRATEGY AND TRANSFORMATION PROGRAM
Exclusive access to strategy and transformation templates and methodologies proven to deliver real business value.
BUDGET DESIGN AND ALLOCATION TO DELIVER RISK REDUCTION OUTCOMES
Proven funding and finance allocation methods to match control deployment and maturity, to sustainable risk reduction
Winner of multiple industry awards, including ISACA International’s 2017 Best Book / Article Award SACA’s for his paper, “The Automation Conundrum”.
Featured in multiple channels and publications (ISACA International Magazine, The NZ Business Herald, IT News, The Australian).
Named as one of the Top 7 Global Cyber Security Leaders in 2023 by the Security Magazine and ISACA.
Darren Argyle FCIIS
Chairman and Co-Founder
Ranked in the Top 100 Chief Information Security Officers globally in 2017 and 2022, achieving 'Innovator of the Year' by SANS Institute 2022.
In 2023, awarded Chief Security Officer 30 (CSO30) for the third year running. Including the first Leadership award for CSO30.
Qualified executive coach and currently serving as the Group Chief Information Security Risk Officer – Standard Chartered Bank. Former Group CISO three times, including Qantas Airlines.
As featured on...
WHAT OUR CUSTOMERS SAY - JOIN OVER 4,500+ MEMBERS
★★★★★
Josué Delgado
CISO
Lisbon, Portugal
"Dedication means reward. Thank you Cyber Leadership Institute for such a great program. The Cyber Strategy and Transformation Program has given me more insights and tools to be a better professional and to excel in my mission."
★★★★★
GlaucoGeorgini
Regional CISO & CSO
Sydney, Australia
"This is the 3rd badge I received from Cyber Leadership Institute. Thanks a lot for bringing this awesome community of cyber leaders together Jan Schreuder, Phillimon Zongo and Darren Argyle FCIIS. The experience I had through the courses, the round tables, calls, meetings changed my way to look at some topics and improved my analytical skills. Thanks to the many contributions I received along the way."
★★★★★
Syam Gumpalli
CISO
Singapore
"Thank you all for your support, innovation, inspiration, intensity, and can-do attitude for this wonderful journey."
★★★★★
Natasha Passley
Security and Transformation Executive
Sydney, Australia
"It really is an inspiring, thought-provoking and interesting course with great collaboration from the community. I loved the weekly calls and recommend it to anyone looking to grow their executive cyber skills. Thanks, Phil Zongo, Jan Schreuder, and Darren Argyle."
★★★★★
SuhaasMadhyastha
Associate Director
Sydney, Australia
"Absolutely thrilled to receive my first badge from the Cyber Leadership Institute on completing the Cyber Strategy and Transformation Program (CSTP) that involved 8 weeks of continuous learning while juggling between work and new dad chores.
Thank you, Darren Argyle FCIIS and Phillimon Zongo, for your support towards this program and a big shout out to Jan Schreuder for delivering fantastic content!
This program focused on the accelerated execution of cyber resiliency strategies to deliver tangible values to businesses quickly. I highly recommend this course to my fellow professionals and am happy to connect if you have any questions."
★★★★★
Magda Chelly
Member of the World Economic Forum's Expert Network on Cybersecurity
Singapore
"It is an amazing opportunity to discuss with excellent cybersecurity leaders from all over the world, exchanging about the latest trends, and priorities. I am loving the continuous learning that we all get during the weekly calls, a chance to learn from each other, and strengthen our capabilities."
After training and educating 1,000s of cyber security professionals and executives in more than 35 countries through our books and courses, we are confident you are going to love our course and gain the skills, confidence and relationships you need to take your career to the next level. If you aren't deeply satisfied with the first 30 days of our industry-leading course, simply let us know and we'll give you a full refund.
Elevate your professional presence in a competitive landscape, stand out from the crowd and showcase your expertise anywhere online — be it LinkedIn, your digital resume, or your email signature — with the exclusive Credly digital badge. It’s not just a symbol, it’s your digital mark of excellence, practical application of skills learned, used by 1000's of household global brands.
YOUR CAREER ADVANCEMENT SUPPORT PLATFORM
All our training programs, including mentoring, and resources to support career advancement are delivered to you on a digital platform: Cyber Leadership Hub — access anytime, anywhere via the web or mobile device app. Available on iOS and Android as the "Cyber Leaders" app.
What kind of professional should enroll into the program?
We have designed the Cyber Strategy and Transformation for executives in charge of cyber-resilience strategies. Created specifically to empower business leaders with the skills and tools they need to mature their cyber resilience frameworks rapidly.
What experience is required?
No leadership skills are required to enter the course, but there is an expectation that you have a background and experience in the world of cybersecurity and/or information technology.
Our headquarters are located right in the heart of the central business district in Sydney, Australia, where Phil Zongo and Jan Schreuder currently reside.
Our chairman Darren Argyle, originally from the United Kingdom, lives in Singapore, where he works as the Global Chief Information Security Risk Officer at Standard Chartered Bank.
Can my employer pay for the course?
Yes — some of our previous attendees formally request their employers to fund for their participation in our programs. You, however, must familiarize yourself with your company employee training policy in this regard.
To help make your life easier, we have drafted an email capturing most of the information employers often request. You can download it here.
Are the program fees tax deductible?
Whether the program fees are tax deductible will depend on the tax legislation in your country and your personal circumstances. In some countries a tax deduction may be available for some or all of the program fees, for example in Australia self-education expenses may be deductible if the education has a sufficient connection to your current employment. We recommend that you speak to your tax accountant or advisor to determine whether a tax deduction will be available.
What are my payment options?
Full payment — via credit card or bank transfer — must be received before the program start date. If you would like to arrange for a payment plan, please speak to your enrolment officer about available options.
How long is the program?
The learning content is self-paced, and we have carefully designed it to fit your busy schedule. We, however, recommend completing the program within the standard eight weeks to maximize the value of weekly collaborations with fellow participants.
What happens if I am unable to complete the program in 8 weeks?
If, for any reason, you are unable to complete the program in the recommended eight weeks, you can request a deferral at no extra cost.
Alternatively, you can ask to be re-enrolled into the next class, should it suit you.
If your employer has paid for your course, you may need to seek their approval first.
How do you deliver the program?
We have designed the CSTP to empower business leaders with the skills and tools they need to mature their cyber resilience frameworks rapidly. All learning happens online so that participants can watch the pre-recorded modules in their own time, at a pace comfortable for them. That said, we encourage participants to do their best to keep up with the weekly lectures to maximize the value of group interactions. Transcripts for all online videos are also available online for those who prefer reading.
We host highly interactive Zoom calls where participants ask pressing questions, openly share career-defining mistakes and success stories in a safe environment. If you miss any of these calls, you can request a complete voice recording or transcript.
If you have a question specific to Phil, Darren, or Jan at any stage over the eight-week program, you can contact them via WhatsApp or email.
How many hours per week?
Participants should devote an average of 4-5 hours per week to earn their CSTP badge.
We estimate participants to allocate their weekly time commitment as follows:
2 hours to go through online lectures, 2 hours to complete the strategy competition project, and 1 hour to attend the Zoom calls.
What time is the Zoom call?
Because of the global reach of our program, we have no preset times for our Zoom calls. Once the enrollment for a specific class is finalized, we organize the weekly Zoom calls, considering various time zones.
How long will I have access to the videos/materials?
Upon completing the CSTP, you will have full access to the program content (online lectures and transcripts) for twelve months or as long as you keep your Premium Membership. Furthermore, you will retain full access to the Cyber Leadership Hub — an online repository of hundreds of high-quality strategy toolkits, playbooks, frameworks, and more — giving you full ammunition to thrive in your cyber leadership role.
How long have you been running the course?
The three co-founders (with combined experience spanning more than 70 years) have been practicing and teaching these proven leadership principles for decades. That said, our first formal CSTP cohort started in August 2021.
How will people know I’ve completed the program?
Once you have fulfilled the CSTP requirements, you will receive a Credly digital badge that you can use to showcase your solid grasp of cyber leadership essentials on LinkedIn or other platforms that matter to you. Credly, trusted by several large global brands, hosts the largest and most connected digital credential network.
There is no standard exam or test at the end of CSTP. To receive their CSTP digital badge, however, participants must complete the cyber strategy competition project.
Over the course of the eight weeks, each participant develops a comprehensive cyber transformation program plan with detailed mentorship directly from the program leaders. During week 7, we select three finalists and invite them to pitch their cyber transformation program to the entire cohort during the last Zoom call.
What if in Week one, I feel the program is not for me?
If you aren't deeply satisfied with the first 30 days of our industry-leading course, simply let us know, and we'll give you a full refund.
Are there still positions available in the upcoming enrolment?
To inquire about upcoming enrolment, please contact our support team or our Enrolment Officer, Nicholas Malcolm.
Tell me about the registration process/costs/how do I get my name added to the list?
For more information regarding the Cyber Strategy and Transformation Program, please download our course prospectus.
Click here today to speak to one of our enrolment officers, and we can secure your spot.
Would it be possible to see a sample of the content of the program?
To see a sample of the content, please access the Demo version of the program.
SEND ME THE CYBER RESILIENCE STRATEGY PLAYBOOK AND TEMPLATE
As a program supporting asset, this proven cyber strategy and transformation program toolkit serves a complete strategic guide and template outlining key initiatives and approach to deliver high value.
We don't want this to get lost, so please fill in the details and we'll get this to you right away.
jQuery(document).ready(function(){
var $= jQuery;
var divs = $('.divs>div');
var now = 0; // currently shown div
divs.hide().first().show(); // hide all divs except first
var title0 = $('.tutorial-1').find('.course-thumbnail-text').text();
var title1 = $('.tutorial-2').find('.course-thumbnail-text').text();
var title2 = $('.tutorial-3').find('.course-thumbnail-text').text();
var title3 = $('.tutorial-4').find('.course-thumbnail-text').text();
if(now == 0 ){
$('.previous').css('display','none');
$('.content').text(title1);
}
else{
$('.previous').css('display','block');
}
$("button[name=next]").click(function() {
divs.eq(now).hide();
now = (now + 1 < divs.length) ? now + 1 : 0;
divs.eq(now).show(); // show next
(now == 0 ) ? $('.previous').css('display','none') : $('.previous').css('display','block');
(now == 3) ? $('.next').css('display','none') : $('.next').css('display','block');
if(now == 1 ){
$('.prev-content').text(title0);
$('.content').text(title2);
}
if(now == 2 ){
$('.prev-content').text(title1);
$('.content').text(title3);
}
if(now == 3 ){
$('.prev-content').text(title2);
$('.content').text(title3);
}
});
$("button[name=prev]").click(function() {
divs.eq(now).hide();
now = (now > 0) ? now - 1 : divs.length - 1;
divs.eq(now).show(); // show previous
(now == 0 ) ? $('.previous').css('display','none') : $('.previous').css('display','block');
(now == 3) ? $('.next').css('display','none') : $('.next').css('display','block');
if(now == 1 ){
$('.prev-content').text(title0);
$('.content').text(title2);
}
if(now == 2 ){
$('.prev-content').text(title1);
$('.content').text(title3);
}
if(now == 3 ){
$('.prev-content').text(title2);
$('.content').text(title3);
}
if(now == 0 ){
$('.content').text(title1);
}
});
});
var starter_templates_zip_preview = {"AstColorPaletteVarPrefix":"--ast-global-color-","AstEleColorPaletteVarPrefix":["ast-global-color-0","ast-global-color-1","ast-global-color-2","ast-global-color-3","ast-global-color-4","ast-global-color-5","ast-global-color-6","ast-global-color-7","ast-global-color-8"]};