Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

LDR514: Security Strategic Planning, Policy, and Leadership

LDR514Cybersecurity Leadership
  • 5 Days (Instructor-Led)
  • 30 Hours (Self-Paced)
Course created by:
Frank Kim
Frank Kim
LDR514: Security Strategic Planning, Policy, and Leadership
Course created by:
Frank Kim
Frank Kim
  • GIAC Strategic Planning, Policy, and Leadership (GSTRT)
  • 30 CPEs

    Apply your credits to renew your certifications

  • In-Person, Virtual or Self-Paced

    Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months

  • Advanced Skill Level

    Course material is geared for cyber security professionals with hands-on experience

  • 32 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

This course offers an MBA-level approach, preparing cybersecurity leaders to build strategic plans, craft effective policies, and lead across technical and business teams.

Course Overview

Forge the crucial bridge between technical security teams and executive management through strategic planning and program development. This course equips security professionals with essential tools to create comprehensive cybersecurity strategy, develop sound security policies, and lead implementation teams effectively. Whether you’re seeking to elevate your leadership impact or prepare for the GSTRT certification (GIAC Strategic Planning, Policy, and Leadership), LDR514 delivers practical skills and executive-level insight.

Through this immersive experience, participants prepare executive presentations, analyze business case studies, address challenges faced by fictional organizations, and engage with 20 Cyber42 leadership simulation challenges. The course also utilizes 9 real-world scenarios and 3 in-depth business case studies to cultivate critical thinking and practical application.

Security leaders will develop the ability to implement strategic approaches aligned with organizational objectives and communicate security imperatives persuasively to business executives— skills that are essential for anyone pursuing a mature cyber security strategy or preparing for the GSTRT certification.

What You'll Learn

  • Create security strategic plans aligned with business goals
  • Develop and implement effective information security policies
  • Build and lead high-performing cybersecurity teams
  • Communicate security priorities to executives effectively
  • Apply business analysis techniques to security initiatives

Business Takeaways

  • Elevated security strategy aligned with business objectives
  • Improved risk management through effective policy creation
  • Enhanced team performance through leadership techniques
  • Stronger executive support for security initiatives
  • More effective resource allocation for security programs
  • Measurable security metrics tied to business outcomes
  • Practical roadmap for security program implementation

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in LDR514: Security Strategic Planning, Policy, and Leadership.

Section 1Strategic Planning Foundations

Students learn frameworks for developing strategic plans that connect security to business and organizational drivers. This section examines stakeholder identification and ways to gain executive support. Through exercises including capability assessments, roadmap development, and strategy maps, students practice creating plans that gain executive approval.

Topics covered

  • Business context analysis for security
  • Stakeholder identification and engagement
  • Strategic security planning frameworks
  • Capability assessment methodologies
  • Security roadmap development

Labs

  • CISO First Impression exercise
  • Strategic capability assessment
  • Business alignment mapping
  • Stakeholder communication planning
  • Security roadmap development

Section 2Strategic Roadmap Development

Section two establishes methodologies for analyzing security posture, identifying target states, and developing prioritized roadmaps. Students learn to assess organizational vision, conduct SWOT analysis, and apply security frameworks. The section covers business case creation and metrics for effectively marketing security initiatives.

Topics covered

  • Security vision and mission alignment
  • SWOT analysis methodology
  • Security framework implementation
  • Roadmap and gap analysis processes
  • Business case development techniques

Labs

  • Mission statement development
  • Security roadmap creation
  • Stakeholder engagement simulation
  • Business case preparation
  • Security metrics development

Section 3Security Policy Development and Assessment

Section three explores policy as a security leadership tool for guiding organizational behavior. Participants learn methods for developing policies aligned with corporate culture. The section covers policy lifecycle from creation to measurement, with a focus on governance and emerging technology considerations.

Topics covered

  • Policy purpose and governance frameworks
  • Policy language and structure design
  • Requirements definition methodologies
  • Emerging technology considerations
  • Policy assessment techniques

Labs

  • Vulnerability management policy creation
  • Cloud computing policy development
  • AI security policy implementation
  • Policy evaluation exercise
  • Stakeholder engagement simulation

Section 4Leadership and Management Competencies

Section four addresses critical skills for leading, motivating, and inspiring security teams. Participants develop knowledge and abilities essential for transitioning from management to leadership. The section establishes standards for effective leadership and explores methods for employee motivation aligned with organizational goals.

Topics covered

  • Leadership foundations and principles
  • Situational leadership approaches
  • Effective communication techniques
  • Team building methodologies
  • Change management strategies

Labs

  • Management and leadership comparison
  • Performance review exercises
  • Delegation practice
  • Team communication simulation
  • Change management implementation

Section 5Strategic Planning Workshop

Section five applies course concepts through Harvard Business School case studies focused on information security leadership. Participants analyze real-world scenarios that reinforce management competencies. The Strategic Planning Workshop serves as a capstone exercise where students synthesize methodologies and tools from previous sections.

Topics covered

  • Executive presentation techniques
  • Board communication strategies
  • Strategic planning methodologies
  • Business priority alignment
  • Stakeholder management approaches

Labs

  • Harvard case study analysis
  • Incident response simulation
  • Metrics and maturity assessment
  • Merger due diligence exercise
  • Executive presentation development

Things You Need To Know

Relevant Job Roles

Cybersecurity Auditor

European Cybersecurity Skills Framework

Perform cybersecurity audits on the organisation’s ecosystem. Ensuring compliance with statutory, regulatory, policy information, security requirements, industry standards and best practices.

Explore learning path

Cyber Incident Responder

European Cybersecurity Skills Framework

Manages compliance with cybersecurity-related standards, legal and regulatory frameworks based on the organisation’s strategy and legal requirements.

Explore learning path

Privacy Compliance Manager (DCWF 732)

DoD 8140: Cyber Enablers

Leads privacy program development and compliance oversight to ensure adherence to privacy laws, standards, and executive data protection needs.

Explore learning path

Cybersecurity Architect

European Cybersecurity Skills Framework

Plans and designs security-by-design solutions (infrastructures, systems, assets, software, hardware and services) and cybersecurity controls.

Explore learning path

Cyber Risk Officer

Cybersecurity Leadership

Lead, govern, and manage this risk for your organization.

Explore learning path

Cyber Threat Intelligence Specialist

European Cybersecurity Skills Framework

Collect, process, analyse data and information to produce actionable intelligence reports and disseminate them to target stakeholders.

Explore learning path

Secure Project Management (OPM 802)

NICE: Oversight and Governance

Responsible for overseeing and directly managing technology projects. Ensures cybersecurity is built into projects to protect the organization’s critical infrastructure and assets, reduce risk, and meet organizational goals. Tracks and communicates project status and demonstrates project value to the organization.

Explore learning path

Systems Security Management (OPM 722)

NICE: Oversight and Governance

Responsible for managing the cybersecurity of a program, organization, system, or enclave.

Explore learning path

Information Systems Security Developer (DCWF 631)

DoD 8140: Cybersecurity

Designs and evaluates information system security throughout the software lifecycle to ensure confidentiality, integrity, and availability.

Explore learning path

Senior Security Leader

Cybersecurity Leadership

Daily focus is on the leadership of technical teams. Includes titles such as Technical Director, Manager, and Team Lead.

Explore learning path

Information Systems Security Manager (DCWF 722)

DoD 8140: Cybersecurity

Oversees program, system, or enclave cybersecurity, ensuring protection from cyber threats and compliance with organizational standards.

Explore learning path

Cybersecurity Risk Manager

European Cybersecurity Skills Framework

Manage the organisation's cybersecurity-related risks aligned to the organisation’s strategy. Develop, maintain and communicate the risk management processes and reports.

Explore learning path

Media Exploitation Analyst

Digital Forensics and Incident Response

This expert applies digital forensic skills to a plethora of media that encompasses an investigation. If investigating computer crime excites you, and you want to make a career of recovering file systems that have been hacked, damaged or used in a crime, this may be the path for you. In this position, you will assist in the forensic examinations of computers and media from a variety of sources, in view of developing forensically sound evidence.

Explore learning path

Cyber Policy and Strategy Planner (DCWF 752)

DoD 8140: Cyber Enablers

Creates cyberspace strategies and policies that align with mission objectives and support organizational readiness and future initiatives.

Explore learning path

Cybersecurity Educator

European Cybersecurity Skills Framework

Improves cybersecurity knowledge, skills and competencies of humans.

Explore learning path

Executive Cyber Leader (DCWF 901)

DoD 8140: Cyber Enablers

Sets direction and policies for cyber operations, assumes risk decisions, and aligns mission objectives with available cyber resources.

Explore learning path

Program Management (OPM 801)

NICE: Oversight and Governance

Responsible for leading, coordinating, and the overall success of a defined program. Includes communicating about the program and ensuring alignment with agency or organizational  priorities.

Explore learning path

Penetration Tester

European Cybersecurity Skills Framework

Assess the effectiveness of security controls, reveals and utilise cybersecurity vulnerabilities, assessing their criticality if exploited by threat actors.

Explore learning path

Digital Forensics Investigator

European Cybersecurity Skills Framework

Ensure the cybercriminal investigation reveals all digital evidence to prove the malicious activity.

Explore learning path

Cybersecurity Researcher

European Cybersecurity Skills Framework

Research the cybersecurity domain and incorporate results in cybersecurity solutions.

Explore learning path

Course Schedule & Pricing

Looking for Group Purchase Options?Contact Us
Filter by:
  • Location & instructor

    Virtual (OnDemand)

    Instructed by Frank Kim
    Date & Time
    OnDemand (Anytime)Self-Paced, 4 months access
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Amsterdam, NL & Virtual (live)

    Instructed by Kim Jones
    Date & Time
    Fetching schedule..View event details
    Course price
    €7,715 EUR*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Washington, DC, US & Virtual (live)

    Instructed by Russell Eubanks
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    London, GB & Virtual (live)

    Instructed by Mark Williams
    Date & Time
    Fetching schedule..View event details
    Course price
    £6,715 GBP*Prices exclude applicable taxes | EUR price available during checkout
    Enrollment options
  • Location & instructor

    London, GB & Virtual (live)

    Instructed by Mark Williams
    Date & Time
    Fetching schedule..View event details
    Course price
    £6,715 GBP*Prices exclude applicable taxes | EUR price available during checkout
    Enrollment options
  • Location & instructor

    Boston, MA, US & Virtual (live)

    Instructed by Kim Jones
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Virginia Beach, VA, US & Virtual (live)

    Instructed by Kim Jones
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Virginia Beach, VA, US & Virtual (live)

    Instructed by Kim Jones
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Enrollment options
Showing 8 of 29

Benefits of Learning with SANS

Instructor teaching class with code in the background

Get feedback from the world’s best cybersecurity experts and instructors

Learning via laptop

Choose how you want to learn - online, on demand, or at our live in-person training events

Learning via laptop

Get access to our range of industry-leading courses and resources