{"id":17102,"date":"2021-01-27T19:49:15","date_gmt":"2021-01-27T08:49:15","guid":{"rendered":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/"},"modified":"2023-05-31T10:20:18","modified_gmt":"2023-05-31T10:20:18","slug":"ciso-playbook-stakeholder-management-influence-and-persuasion","status":"publish","type":"page","link":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/","title":{"rendered":"CISO Playbook: Stakeholder Management, Influence and Persuasion"},"content":{"rendered":"

CISO Playbook:<\/p>\n

Stakeholder<\/span> Management, Influence, and Persuasion<\/span><\/span><\/strong><\/span><\/h1>\n

Ten highly effective techniques cyber leaders can deploy to enlist the unwavering support of senior executives and the board<\/span><\/p>\n

Throughout this playbook, you will find practical guidelines to identify and implement effective cyber governance strategies to develop a highly focused cyber resilient organization.<\/p>\n

Enter your details below for free membership of the Cyber Leadership Institute to download the playbook.<\/p>\n

If you’re already a member, click here<\/a> to log in or just download the PDF<\/a>.<\/p>\n

\"\"<\/span><\/p>\n

When you download the <\/span>CISO Playbook: <\/strong><\/span><\/span><\/span><\/span><\/span><\/span>Stakeholder Management, Influence, and Persuasion – Ten highly effective techniques cyber leaders can deploy to enlist the unwavering support of senior executives and the board<\/strong>, as a bonus, we will also send you the premium CISO Stakeholder Management Strategy Template<\/strong> to <\/span><\/span><\/span><\/span><\/span><\/span><\/span>help you visualize the importance of stakeholders and stakeholder groups to your success.<\/p>\n

Download your free <\/span><\/span><\/span><\/span><\/span><\/span><\/span>CISO Playbook: <\/span><\/strong>Stakeholder Management, Influence, and Persuasion<\/span><\/strong><\/span> today to help you implement effective cyber governance strategies.<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n

\"\"<\/span>About the AuthorPhillimon Zongo<\/strong><\/p>\n

Phil is an international keynote speaker, multi-award winning virtual CISO and bestselling author of The Five Anchors of Cyber Resilience<\/a><\/span>, a practical cyber strategy book for senior business leaders. He is an official member of Forbes Business Council, an Invitation-Only Global Community for Successful Business Owners and Leaders. He was named one of 2020\u2019s Top 100 Most Influential People of African Descent (New York USA), as well as 2017 winner of ISACA International\u2019s Best Article Award (Chicago, USA). His views have been featured by Forbes, CISCO, NZ Business Herald, Financial Standard, SAP, etc., and named as one of the Top 7 Global Cyber Security Leaders in 2023 by the Security Magazine and ISACA.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"

CISO Playbook: Stakeholder Management, Influence, and Persuasion Ten highly effective techniques cyber leaders can deploy to enlist the unwavering support […]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"acf":[],"yoast_head":"\nCISO Playbook \u2013 Stakeholder Management Influence and Persuasion<\/title>\n<meta name=\"description\" content=\"Learn ten highly effective techniques cyber leaders can deploy to enlist the unwavering support of senior executives and the board\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISO Playbook: Stakeholder Management, Influence and Persuasion\" \/>\n<meta property=\"og:description\" content=\"Ten highly effective techniques cyber leaders can deploy to enlist the unwavering support of senior executives and the board. Throughout this playbook, you will find practical guidelines to identify and implement effective cyber governance strategies to develop a highly focused cyber resilient organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Leadership Institute\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/cyberleadershipinstitute\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-31T10:20:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Playbook-Stakeholder-management.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"620\" \/>\n\t<meta property=\"og:image:height\" content=\"351\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"CISO Playbook: Stakeholder Management, Influence and Persuasion\" \/>\n<meta name=\"twitter:description\" content=\"CISO Playbook:Stakeholder Management, Influence, and PersuasionTen highly effective techniques cyber leaders can deploy to enlist the unwavering support\" \/>\n<meta name=\"twitter:site\" content=\"@C_L_Institute\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/\",\"name\":\"CISO Playbook \u2013 Stakeholder Management Influence and Persuasion\",\"isPartOf\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/CISO-Stakeholder-Management-Strategy-Template-3-1.jpg\",\"datePublished\":\"2021-01-27T08:49:15+00:00\",\"dateModified\":\"2023-05-31T10:20:18+00:00\",\"description\":\"Learn ten highly effective techniques cyber leaders can deploy to enlist the unwavering support of senior executives and the board\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/#primaryimage\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/CISO-Stakeholder-Management-Strategy-Template-3-1.jpg\",\"contentUrl\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/CISO-Stakeholder-Management-Strategy-Template-3-1.jpg\",\"width\":707,\"height\":999},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyberleadershipinstitute.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISO Playbook: Stakeholder Management, Influence and Persuasion\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#website\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/\",\"name\":\"Cyber Leadership Institute\",\"description\":\"Know You're Ready\",\"publisher\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberleadershipinstitute.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#organization\",\"name\":\"Cyber Leadership Institute\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg\",\"contentUrl\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg\",\"width\":512,\"height\":512,\"caption\":\"Cyber Leadership Institute\"},\"image\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/cyberleadershipinstitute\",\"https:\/\/x.com\/C_L_Institute\",\"https:\/\/www.instagram.com\/cyber_leadership_institute\/\",\"https:\/\/www.linkedin.com\/school\/cyberleadershipinstitute\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CISO Playbook \u2013 Stakeholder Management Influence and Persuasion","description":"Learn ten highly effective techniques cyber leaders can deploy to enlist the unwavering support of senior executives and the board","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/","og_locale":"en_US","og_type":"article","og_title":"CISO Playbook: Stakeholder Management, Influence and Persuasion","og_description":"Ten highly effective techniques cyber leaders can deploy to enlist the unwavering support of senior executives and the board. Throughout this playbook, you will find practical guidelines to identify and implement effective cyber governance strategies to develop a highly focused cyber resilient organization.","og_url":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/","og_site_name":"Cyber Leadership Institute","article_publisher":"https:\/\/facebook.com\/cyberleadershipinstitute","article_modified_time":"2023-05-31T10:20:18+00:00","og_image":[{"width":620,"height":351,"url":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Playbook-Stakeholder-management.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"CISO Playbook: Stakeholder Management, Influence and Persuasion","twitter_description":"CISO Playbook:Stakeholder Management, Influence, and PersuasionTen highly effective techniques cyber leaders can deploy to enlist the unwavering support","twitter_site":"@C_L_Institute","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/","url":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/","name":"CISO Playbook \u2013 Stakeholder Management Influence and Persuasion","isPartOf":{"@id":"https:\/\/cyberleadershipinstitute.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/#primaryimage"},"image":{"@id":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/CISO-Stakeholder-Management-Strategy-Template-3-1.jpg","datePublished":"2021-01-27T08:49:15+00:00","dateModified":"2023-05-31T10:20:18+00:00","description":"Learn ten highly effective techniques cyber leaders can deploy to enlist the unwavering support of senior executives and the board","breadcrumb":{"@id":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/#primaryimage","url":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/CISO-Stakeholder-Management-Strategy-Template-3-1.jpg","contentUrl":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/CISO-Stakeholder-Management-Strategy-Template-3-1.jpg","width":707,"height":999},{"@type":"BreadcrumbList","@id":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-stakeholder-management-influence-and-persuasion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberleadershipinstitute.com\/"},{"@type":"ListItem","position":2,"name":"CISO Playbook: Stakeholder Management, Influence and Persuasion"}]},{"@type":"WebSite","@id":"https:\/\/cyberleadershipinstitute.com\/#website","url":"https:\/\/cyberleadershipinstitute.com\/","name":"Cyber Leadership Institute","description":"Know You're Ready","publisher":{"@id":"https:\/\/cyberleadershipinstitute.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberleadershipinstitute.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberleadershipinstitute.com\/#organization","name":"Cyber Leadership Institute","url":"https:\/\/cyberleadershipinstitute.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg","contentUrl":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg","width":512,"height":512,"caption":"Cyber Leadership Institute"},"image":{"@id":"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/cyberleadershipinstitute","https:\/\/x.com\/C_L_Institute","https:\/\/www.instagram.com\/cyber_leadership_institute\/","https:\/\/www.linkedin.com\/school\/cyberleadershipinstitute\/"]}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"authorship-box-avatar":false,"authorship-box-related":false},"uagb_author_info":{"display_name":"anirtac arim","author_link":"https:\/\/cyberleadershipinstitute.com\/author\/cat\/"},"uagb_comment_info":0,"uagb_excerpt":"CISO Playbook: Stakeholder Management, Influence, and Persuasion Ten highly effective techniques cyber leaders can deploy to enlist the unwavering support […]","_links":{"self":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages\/17102"}],"collection":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/comments?post=17102"}],"version-history":[{"count":29,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages\/17102\/revisions"}],"predecessor-version":[{"id":38059,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages\/17102\/revisions\/38059"}],"wp:attachment":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/media?parent=17102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}