Leading a Secure Organization

An Executive Leadership Series that focuses on C-level, board members and other executives and their role in assessing, developing and promoting a security-minded culture within their organization
cybersecurity training for executives represented by Business man in boardroom

Course Description

Global Learning Systems has developed this series to support organizations’ cybersecurity programs by training the executives within the organization. The Executive Leadership Series: Leading a Secure Organization includes three modules that focus on senior management’s role in assessing, developing and promoting a security-minded culture within their organization.

This cybersecurity training for executives familiarizes users with cybersecurity risks that leaders face and teaches them how to avoid becoming a victim. They will learn strategies for creating an organization-wide culture of security and understand how to identify and implement key elements of a comprehensive cybersecurity training program. The course engages users by providing real-world examples and key questions for executives to consider when assessing cybersecurity risk within their organization.

Why C-level security training is crucial

Also known as a whaling attack, cybercriminals often target the C-Suite, board members and other top executives in an organization. As leaders of a company, they are most likely to have high-level privileges required to access the types of valuable corporate systems and information that cybercriminals seek. These high-profile employees are also the ones with the ability to authorize high-value wire transfers that promise big payouts for hackers. 

C-level executives are 12 times more likely to fall victim to a cyberattack, according to recent statistics. Yet, most believe they are immune to attacks, so much so that 40% of companies cite their C-level employees as representing their most vulnerable employees and highest cyber risk to their organizations.

screen grab from cybersecurity training for executives course

Upon Completion, Learners Will Be Able To

Course Curriculum

  • Threats
  • Cybersecurity Stakeholders
  • CEO Accountability
  • Cost of a Breach
  • Keeping Your Data Secure
  • Social Networking
  • Public Posts
  • What Would You Do?
  • Securing Your Social Media Presence
  • Social Engineering Information Gathering
  • Prevent Social Engineering
  • Passwords 
  • Hack Time
  • Limit the Damage
  • Mobile Malware Targets
  • Attack Vectors
  • Mobile Security
  • Travel Security
  • No Assumption of Safety
  • Before You Leave
  • Expect the Unexpected
  • While You’re Away
  • When You Return
  • Keeping Your Data Secure
  • Managing Organization Cyber Risk
  • Risk Perception vs. Reality
  • Frameworks and Resources
  • Compliance Requirements
  • Risk Management Model
  • Identify Risk
  • Analyze Your data
  • Risk Appetite
  • Ways to Manage Risk
  • Frameworks and Controls
  • Controls Framework Implementation
  • Incident Response
  • Monitor and Review
  • Controls, Intelligence, Measures and Metrics
  • Reporting
  • Review Key Questions
  • Introduction
  • Alignment to Values and Mission
  • Enabling Growth through Security
  • Principles of HROs
  • HRO vs. Security Threats
  • Accountability and Auditing
  • Meaning and Competence
  • Positive Attitude
  • Characteristics of Comprehensive Training
  • Cybersecurity Skills Shortage
  • Attracting and Retaining talent 
  • Conclusion

Request a Demo or Quote

First Name
Last Name
Job Title
Email Address
Phone Number
Organization Name
Organization Size
Product/Solution Area of Interest

GLS’s cybersecurity training for executives:

Executives looking at a projection of a world map and interlocking network of icons.
GLS Logo

Your download is complete!

Need more training?