Link to SkillBridge's Facebook page Link to SkillBridge's Twitter page Link to SkillBridge's LinkedIn page

The entire organization is responsible for an entity’s security. No role is more important in this chain than the Senior Managers and Executives who set the tone. 


For Executives to successfully lead their organization by example, they must be armed with the knowledge to fully understand the threats they face. Further, they must also posses the tools required to implement the proper actions to combat these threats and reduce the chance of being exploited.


In today’s world, security must be considered part of the overall corporate culture, and embedded in to every facet of the business. Without the proper approach from, and support of senior level decision makers, the entire security posture of the organization is at risk.


Built on a solid understanding of the “Threat Model” concept, SkillBridge’s Management Security Strategy program utilizes interactive discussion and case studies to highlight both good and bad examples of corporate security posture.


Industry trends, competition, corporate policies and procedures, legal, regulatory and compliance issues, technology, and other world and market factors must be considered to fully understand the impact of security on both long term plans and day to day execution.




Security Strategy


These strategy sessions focus on the following questions:


  • Why is security important?
  • Why is it so challenging to implement secure organizations?
  • What benefits come from having secure systems?
  • What is a threat model is and how does it affect the design and implementation of an organization’s security posture?
  • Why must security be in every part of the organization?
  • What skills will your personnel will need to posses in order to perform their jobs securely?
  • Why is testing necessary but not sufficient for security, and how should security testing be performed?
  • What are the current “best practices” for running a secure organization?
  • What are security metrics? How are they managed, and measured? What are the myths?