• Cyber Leadership Classes

  • AntiCrysys provides remote and onsite training for organizations, groups, and individual by helping organizations establish effective leadership and training programs for information security, and non-technical roles. We help individuals transition from being an individual contributor into a security leadership role.

    Our approach to leadership training consists of three main sections that starting first with moving from an individual contributor to a leadership role. The next step consists steps to become a functional security leader using industry standard approaches to building effective security programs. The third step is creating a productive culture and leading change in information security. 

  • Topics

  • Transitioning from Contributor to Leader

  • Stakeholder Management: This is an important area that security leaders need to focus on. The decisions security leaders make can impact a large number of stakeholders. Understanding who the stakeholders are and how to manage them is a key aspect of being a successful security leader.

    Communication Strategies: Communication is another critical aspect of being a security leader. Security leaders communicate information critical to the organization, stakeholders, individuals, and external organizations. Having effective communication strategies for these perspectives includes presentations, executive communications, reporting, and communications during crisis.

     Hiring Cyber Talent: As a leader you will need to establish a talent pipeline to fill positions on your team. In the current landscape traditional approaches for filling cyber security positions is difficult and time consuming. In this section we cover approaches to identify non-traditional roles for these positions and where to find today's cyber talent.

    Training Program Development: Training in cyber security is critical in this ever-changing landscape of threats and technology. We help organizations establish effective training programs for security teams, individualized leadership training programs, and topic specific technical training programs.

    Growing Effective and Cohesive Teams: One of the most challenging aspects organizations face today is creating an effective and cohesive team. There's more to building a team than bringing a group of people together. Building teams takes a methodical approach with an understanding of team dynamics, organizational goals, and objectives.

  • Organizational Culture and Leading Change

  • A role in security leadership will always in include being an agent of change. Culture is also an important part of the change process. Organization culture, departmental culture, and team culture.

    Diversity, Equity, and Inclusion: This is an important part of creating a good culture and creating a high performing team. Diversity fills in gaps in talent, innovation, and execution as an organization and a team.

    Preventing Burnout: The effects of burnout can drastically affect your team culture, attrition rate, and the engagement of your team members. Preventing burnout is critical for a security leader. In this area we cover strategies for recognizing and preventing burnout before it becomes impactful.

    Situational Analysis: A security leader needs to have good situational analysis. Situational analysis is the assessment and strategy for resolving issues where the solution may not be obvious. We have a number of tools and methodologies we cover for deciphering organizations, teams, and individuals.

    Feedback: Proving feedback and dealing with people is one of the more challenging aspects of any leadership position. We'll cover providing positive and negative feedback, performance improvement in this section.

    Marketing for Security: This is an often overlooked area in security. Marketing is necessary for managing culture, stakeholders, and creating a talent pipeline. Marketing also promotes security to the organization in the form of services, initiatives, and partnership.

  • Functional Security Leader

  • Becoming a functional cyber leader includes utilizing industry standard frameworks and approaches to operationalize defenses and incident response. 

    Security Frameworks: We cover how to implement industry standard frameworks such as the CIS Controls, NIST Cybersecurity Framework, maturity models, and other security frameworks.

    Using Assessments: Understanding threats, risk, and successful initiative starts with an effective assessment. We cover a number of approaches for risk assessments, maturity assessments, and assessing vendors.

    Justifying Budget: One of the biggest obstacles we encounter when consulting with cyber leaders is how do they justify budget. In this area we cover building a business case, industry comparisons, and how to provide options for initiatives and projects.

    Reporting and Metrics: A security leader has to answer the question "how are we doing in security". Metrics help answer this question and show progress towards process improvement, effective defenses, and highlight the invisible value security provides to the organization.

    Executive and Board Level Presentations: Presentations to executives and board members requires a careful approach. There's a balance that must be created to provide the right amount of relevant information in a manner that business consumable. In this training area we cover how to communicate technology and frame your message to executives and board members.