Cyber Leadership Program (Free Sample)

Cyber Leadership Program [Free Sample]

Course Contents

This is a demo version of the Cyber Leadership Program and contains a few sample modules.

Week 1: The role of a CISO / Cyber Leader

Week 2: Developing a high value cyber resilience strategy 

Develop a business-focused cyber security strategy that is centered around your most valuable assets. Learn about the consequences of cyber crime on innovation, business growth and profitability and provide insight to the C-suite about various cyber threat actors. Expand your communication and engagement strategies to assess cyber maturity and build a business case for cyber transformation. Learn to work smart, adopt cyber standards and invest in your brand. 

  • 2.1. Introduction
  • 2.2. Approach – the basics
  • 2.3. Fundamentals first – crown jewels and minimum controls
  • 2.4. What is cyber resilience?
  • 2.4B. Bonus Module: Which cybersecurity framework should you choose?
  • 2.5. Developing a high value cyber resilience strategy
  • 2.5B. Developing a high value cyber resilience strategy (Part 2)
  • 2.6. Assessing your current cyber resilience – getting visibility fast
  • 2.7. Communicating the strategy to get stakeholder buy-in
  • 2.8. Setting up for success and quick wins
  • Week 2: Action Items
  • Featured Weekly Q&A call

Week 3: Leading an enterprise-wide cyber risk aware culture

Develop a cyber-savvy workforce that can promptly detect and prevent advanced phishing attacks. Deliver and measure real behavioural change with smarter culture metrics. Transform cyber security tasks into enjoyable and engaging activities to ensure staff are committed to your strategy. Develop tailored awareness messages based on level or risk and exposure and become the driving force behind a cultural change.

  • Week 3: Introduction
  • 3.1. Developing a cyber savvy workforce
  • 3.2. Delivering and measuring real behavioral change
  • 3.3. Gamification applied cyber awareness to transform mundane
  • 3.4. Segmenting staff according to human risk exposure
  • 3.5. Executive education and their leadership role in driving change
  • 3.6. A CISO case study; global FinTech
  • Week 3: Action Items

Week 4: Building and leading world class cyber function 

Define the role of the CISO in functional design and understand what support will be required from other functions and external consultants. Learn more about the different reporting structures for the CISO role, and how that influences what type of leader you’ll need to be. Walk through some examples of functional designs, exploring their strengths and weaknesses. Understand what skills are required to build a sustainable capability and how to retain your best talent.

  • Week 4: Introduction
  • 4.1. The role of the CISO in functional design
  • 4.2. Establishing a function and building capability
  • 4.3. Functional designs for industry sector, regional coverage and size
  • 4.4. Matching talent and developing skills
  • Week 4: Action Items

Week 5: Stakeholder management

Determine the critical stakeholder set for the CISO role and know which individuals can significantly impact your success within the role. Learn to speak convincingly to varied audiences and to effectively manage their concerns. Become an adept communicator both internally and externally, gaining the presentation skills you need to become successful. Map out your stakeholder relationships and consider how you can positively influence them.

  • Week 5: Introduction
  • 5.1. Who are our stakeholders?
  • 5.2. Building trust, maintaining sustainable relationships
  • 5.3. Effective board and executive communication
  • 5.4. Getting the whole organization engaged
  • 5.5. Communicating with the extended ecosystem
  • Week 5: Action Items

Week 6: Embedding agile cyber governance

Understand the significance of board oversight and executive decision making over cybersecurity transformational programs. Learn to measure what matters, moving away from vain cybersecurity metrics into core measures that deliver board confidence of key capabilities and areas of exposure. Develop cross-functional cyber risk governance committees to provide appropriate executive and operational oversight.

  • Week 6: Introduction
  • 6.1. Why strong cyber risk governance matters now more than ever
  • 6.2 to 6.3. Why is cyber governance still difficult
  • 6.4. Establishing cross functional cyber risk governance committee
  • 6.5. Getting Board Cyber Risk Reporting Right
  • 6.5B. Getting Board Cyber Risk Reporting Right (Part 2)
  • 6.6. The Active Cyber Risk Profile
  • 6.7. Measuring what matters – Board Cyber Risk Metrics
  • 6.8. Measuring what matters – Board Cyber Risk Metrics (Part 2)
  • 6.9. Simulating Plausible Cyber Breach Scenarios
  • 6.10. Cyber Assurance Program
  • 6.11 to 6.14. Tightening Supply Chain Cyber Governance
  • Week 6: Action Items

Week 7: Maintaining resilience, operational excellence

Keep on top of the ever-changing threat landscape by understating threat intelligence and what cyber strategies you’ll need to adopt to remain cyber resilient. Consider the implications of digital environments, outsourcing and insurance on your cyber resilience strategies. Learn how the threat landscape will change with digital innovation and the proliferation of the Internet of Things. Finally, turn your attention to the opportunities to shift cyber from a cost centre to a profit centre.

  • 7.1. Sustaining resilience during constant change
  • 7.2. Keeping up the momentum
  • 7.3. How do we know? Tracking and monitoring
  • 7.4. Keeping on top of the ever changing threat landscape
  • 7.5A. Adapting our cyber strategies to new and emerging threats
  • 7.5A. Adapting our cyber strategies to new and emerging threats (Part 2)
  • 7.5B. The next wave of emerging cyber threats
  • 7.6. Ensuring resilience during major organisational change
  • 7.7. Cyber resilience in mergers and acquisitions
  • 7.8. Continuous testing and learning
  • 7.9. Being prepared for a black swan cyber event
  • 7.10. Preparing for your own cyber exercise
  • 7.11. Running your own cyber exercise
  • Week 7: Action Items

Week 8: Maximizing your impact and influence as a leader 

Continue the momentum within your role by fully operationalizing and sustaining cyber resilience in the second and third years of your program. Consider what the next wave of emerging threats might look like and how you can be better prepared. Rise to the challenge of emerging technologies and embrace their capabilities within your role. Take a look at what additional skills the CISO will need to focus on to prove themselves in tomorrow’s cyber environment.

  • 8.1. Creating an environment built on trust and safety
  • 8.3. Developing a cyber function operating strategy
  • 8.3. Introducing the Cyber Leadership Framework©
  • 8.4. Executive coaching, advancing your skills and career
  • Week 8: Action Items


Darren Argyle

Darren Argyle FCIIS

Chairman and Co-Founder

  • Ranked in the Top 100 Chief Information Security Officers globally in 2017 and 2022, and the top 100 Global IT Security Influencers in 2018
  • Global Head Information and Cyber Security Officer – Standard Chartered Bank. Former CISO of Qantas Airlines.
  • Board member, keynote speaker with over 20 years’ experience in executive positions.

Phil Zongo

CEO and Co-Founder

  • Bestselling author of the The Five Anchors of Cyber Resilience - an executive cyber strategy book.
  • Winner of multiple industry awards, including ISACA International’s 2017 Best Book / Article Award SACA’s for his paper, “The Automation Conundrum.”
  • Featured in multiple channels and publications (ISACA International Magazine, The NZ Business Herald, IT News, The Australian).
  • Named as one of the Top 7 Global Cyber Security Leaders in 2023 by the Security Magazine and ISACA.
Jan Schreuder - Former senior Cybersecurity Partner with a Big 4 firm in Australia and Switzerland for more than 25 years.

Jan Schreuder

COO and Co-Founder

  • Former senior Cybersecurity Partner with a Big 4 firm in Australia and Switzerland for more than 25 years.
  • Over 35 years consulting experience, managing large teams to deliver complex cyber transformational projects.
  • Advisor to several companies, working with senior executives and boards of directors.
  • Named in the IFSEC Top 25 Most Influential Global Cyber Security Professionals in 2022.


What kind of professional should enroll into the program?

We have designed the Cyber Leadership to help aspiring cyber leaders accelerate their path to the C-Suite and thrive in those executives roles. We also work with experienced CISOs seeking to boost their credibility in board rooms or executive committees through sharper strategy design, executive communication, and influencing skills.

Some examples of current jobs you may hold include:

  • A senior IT professional responsible for managing and leading cyber transformation
  • A senior technical cybersecurity professional wanting to break out of functional roles into the c-suite
  • A head of information security or an IT security manager looking for their first CISO role
  • A newly appointed CISO looking for help and support with their first 100-day plan
  • A senior executive accountable for cybersecurity and looking for a strategic approach to managing cyber risk
  • A cybersecurity consultant seeking to enrich and sharpen their conversations with CISOs and executives

What experience is required and are there any prerequisites?

No leadership skills are required to enter the course, but there is an expectation that you have a background and experience in the world of cybersecurity and/or information technology.

If you’re unsure, schedule a call.

Where are you located?

Our headquarters is located right in the heart of the central business district in Sydney, Australia, where Phil Zongo and Jan Schreuder currently reside.

Our chairman Darren Argyle, originally from the United Kingdom, lives in Singapore, where he works as the Global Chief Information Security Risk Officer at Standard Chartered Bank.

Can my employer pay for the course?

Yes — some CLP attendees formally request their employees to fund for their participation in the CLP. You however must familiarize yourself with your company employee training policy in this regard.

To help make your life easier, we have drafted an email capturing most of the information employers often request. You can download it here.

Are the program fees tax deductible?

Whether the program fees are tax deductible will depend on the tax legislation in your country and your personal circumstances. In some countries a tax deduction may be available for some or all of the program fees, for example in Australia self-education expenses may be deductible if the education has a sufficient connection to your current employment. We recommend that you speak to your tax accountant or advisor to determine whether a tax deduction will be available.

What are my payment options / when do I have to pay?

Full payment — via credit card or bank transfer — must be received before the program start date. If you would like to arrange for a payment plan, please speak to your enrolment officer about available options.

How long is the program?

The learning content is self-paced, and we have carefully designed it to fit your busy schedule. We, however, recommend completing the program within the standard eight weeks to maximize the value of weekly collaborations with fellow participants.

What happens if I am unable to complete the program in 8 weeks?

If, for any reason, you are unable to complete the program in the recommended eight weeks, you can request a deferral at no extra cost.

Alternatively, you can ask to be re-enrolled into the next class, should it suit you.

If your employer has paid for your course, you may need to seek their approval first.

How do you deliver the program?

We have designed the CLP to cater for busy cybersecurity and technology professionals. All learning happens online so that participants can watch the pre-recorded modules in their own time, at a pace comfortable for them. That said, we encourage participants to do their best to keep up with the weekly lectures to maximize the value of group interactions. Transcripts for all online videos are also available online for those who prefer reading.

We host highly interactive Zoom calls where participants ask pressing questions, openly share career-defining mistakes and success stories in a safe environment. If you miss any of these calls, you can request a complete voice recording or transcript.

If you have a question specific to Phil, Darren, or Jan at any stage over the eight-week program, you can contact them via WhatsApp or email.

How many hours per week?

Participants should devote an average of 4-5 hours per week to earn their CLP badge.

We estimate participants to allocate their weekly time commitment as follows:

2 hours to go through online lectures, 2 hours to complete the strategy competition project, and 1 hour to attend the Zoom calls.

What time is the Zoom call?

Because of the global reach of our program, we have no preset times for our Zoom calls. Once the enrollment for a specific class is finalized, we organize the weekly Zoom calls, considering various time zones.

How long will I have access to the videos/materials?

Upon completing the CLP, you will have full access to the program content (online lectures and transcripts) for twelve months. Furthermore, you will retain full access to the Cyber Leadership Hub — an online repository of hundreds of high-quality strategy toolkits, playbooks, frameworks, and more — giving you full ammunition to thrive in your cyber leadership role.

How long have you been running the course?

The three co-founders (with combined experience spanning more than 70 years) have been practicing and teaching these proven leadership principles for decades. That said, our first formal CLP cohort graduated in February 2020.

How will people know I’ve completed the program?

Once you have fulfilled the CLP requirements, you will receive a Credly digital badge that you can use to showcase your solid grasp of cyber leadership essentials on LinkedIn or other platforms that matter to you. Credly, trusted by several large global brands, hosts the largest and most connected digital credential network.

Visit their website for more information

Are there many exams, assignments, or tests?

There is no standard exam or test at the end of CLP. To receive their CLP digital badge, however, participants must complete the cyber strategy competition project.

Over the course of the eight weeks, each participant develops a comprehensive cybersecurity strategy with detailed mentorship directly from Phil, Jan, or Darren. During week 7, we select three finalists and invite them to pitch their strategies to the entire cohort during the last Zoom call.

The winner receives a scholarship to Insead’s Leadership Communication with Impact Program, valued at EUR1,950, to further deepen their executive communication and persuasion skills.

Can you guarantee me a CISO role?

The Cyber Leadership Program will equip you with the leadership skills and confidence required to land a CISO interview and nail it. Obviously, no program can guarantee a CISO role. Still, the CLP will give you powerful tools to accelerate your path to the c-suite and thrive, as well as access to the fastest private global network of cyber leaders who share career and business opportunities. 

What if in Week one, I feel the program is not for me?

If you aren't deeply satisfied with the first 30 days of our industry-leading course, simply let us know, and we'll give you a full refund.

Are there still positions available in the upcoming enrolment?

To inquire about upcoming enrollment, please contact our support team.

Tell me about the registration process/costs/how do I get my name added to the list?

For more information regarding the Cyber Leadership Program, please download our course prospectus.

Click here today to speak to one of our enrolment officers, and we can secure your spot.

I have registered. What happens next?

Once you have registered, you will gain access to the course materials that you can peruse before the course commences. You will receive information via your nominated form of contact regarding start dates and scheduled Zoom calls. If you have further questions, schedule a call with one of our friendly consultants. 

How do I access my course? 

The course will be delivered via an online e-learning platform accessible from your desktop or mobile device, wherever you are. Once you have successfully registered, you will receive instructions on how to access the content. 

How many students are in a cohort? Who will be my classmates?

Cohort sizes vary but generally, we like to keep the cohort under 20 participants to provide comprehensive 1:1 support. Your classmates could come from anywhere around the world! You will meet your cohort in the Kick-off Zoom call and begin to build connections. 

When and how often will my cohort meet?

Depending on time zones, there are usually two Zoom sessions per week that are offered. You will meet weekly with those from your cohort that join your nominated Zoom session.

What time do classes meet?

Classes meet via weekly Zoom calls to facilitate learning. Because of the global reach of our program, we have no pre-set times for our Zoom calls. Once the enrollment for a specific class is finalized, we organize the weekly Zoom calls, considering various time zones. 

What if I can’t start the class on the date it’s scheduled to begin?

The program is self-paced and carefully designed to fit in your busy schedule. We recommend completing the program within the standard eight weeks to maximize the value of weekly collaborations with fellow participants. If you are unable to attend any or most of the scheduled Zoom calls, please speak to our friendly consultants to discuss options. We offer deferral and rescheduling enrollment at no extra cost should you need, just reach out to Emily Evans, our Community Management Specialist on the Hub.

What should I do if I’m away for a few days?

As the program is self-paced, you may be able to stay on top of the course work or catch up as required. You can access the course content anytime, anywhere. Please speak to one of our consultants or Emily Evans on the Hub if you will be away during the program and you expect it to impact your learning. 

How can CLP bolster my career options?

The Cyber Leadership Program will equip you with the leadership skills and confidence required to land a CISO interview and nail it. You will gain powerful tools to accelerate your path to the c-suite and thrive, as well as access to the fastest private global network of cyber leaders who share career and business opportunities. For further information on how the CLP can bolster your career, speak to our friendly consultants. 

Who should I contact if I have additional questions?

If you cannot find the answer to your question in these FAQs, please schedule a complimentary call with one of our friendly consultants 



Please complete the form below to get more details about the Cyber Leadership Program
Join the Free Membership of the Cyber Leadership Institute