"This is the only training in the market that teaches Boards, C-Suites, & Investors how to think about their own and their organizations' cybersecurity holistically & execute on it 360°, beyond just relying on tech cybersecurity & the CISO, which solve only 3% of the problem anyway."

- Jonathan H., Chairman of the Board of Directors, Phoenix

For Board Directors, CEOs, Entrepreneurs, Investors, and other Executives... 
...Because You Now Have a Fiduciary Duty to Foster & Oversee a Culture of Cybersecurity

How to Lead Cybersecurely, The Economic Impacts of a Breach, Why Cybersecurity is Mostly Culture & A Step by Step Strategy Checklist 

"How we turned our Founder's $25mm cyberattack into your cybersecurity!"

CUSTOM JAVASCRIPT / HTML
Andrzej Cetnarski
"CEO of the Year - 2020 Cyber" by CEO Monthly Magazine
Chairman, CEO, Founder Cyber Nation Central®
Forbes Contributor - Board Cybersecurity Strategy & Cyber National Security 

"Ultimately, cybersecurity is not about technology [but] about people & culture."
- Jen Easterly

Head of US Department of Homeland Security Cybersecurity Infrastructure Security Agency (DHS CISA)
Former Global Head and Managing Director of Morgan Stanley's Cybersecurity Fusion Center
Cybersecurity is poised to empower every corner of our digital world. As cybercrime overtakes illegal drugs as the #1 crime in the world, there has never been a more crucial time for our leaders to become fluent in cybersecurity as the driver of sustainable & scalable digital growth. It is our leaders' fiduciary responsibility to become the cybersecure-culture standard-bearers they need to be for their organizations & their families.

Hundreds of Leaders Helped and Counting...

...and small and medium enterprises across 6 continents and 15 countries*

*which we'd love to name but cannot for security reasons related to their relatively smaller size.

Boards & Executive Teams Face a New Pandemic...

CYBERCRIME is now the 3rd largest economy in the world and affects SMBs disproportionately

General State of the Market

  • Cybercrime = $6 trillion per year as of 2021
  • 50% of cyberattacks target Small & Medium Businesses (<500 employees & <$1 billion revenue), which make up 99% of US economy
  • Average cost of cyberbreach in 2021 in the US was:
  • $9 million across all enterprises
  • $6.35 across SMBs
Source: JPMorgan, IBM, IMF

Cyberattacks by Business Targeted (2021)

Source: IBM

5 Largest Economies by 2021 GDP/Rev ($trn)

Source: IMF

Avg. Cost of Data Breach in ‘21 ($mm)

Source: IMF

Companies face effective 100% chance of incurring a $3mm financial breach cost in next 2 years

2021 Probabilities of Breach in Next 2 Years

Source: JPMorgan, IBM, IMF

2021 Probability-Adjusted Cost of Breach ($mm)

Source: IBM

Time to Discover a Breach

Source: IBM

Result

Source: Securities & Exchange Commission (SEC)

“Cyber Whaling” – targeting of Executives – is posing an increasingly existential threat to SMBs

Why Is Cyber Whaling You So Effective

  • Directors/Execs a particular & particularly easy target for hackers
  • You hold the keys to the "kingdom." Therefore, cyberattacks on you are deadliest to the organization
  • You are time-poor & insufficiently trained in cyber defense
Source: Inside Out Security

Cyber Whaling Statistics

  • Hackers get 70% of info they want from you in 1 hour of attack
  • Between 2013-2018 alone, hackers:
  • Swindled $12+ billion cash from nearly 79,000 US, UK & European firms by directly exploiting their CEOs/CFOs
  • ​Got another $3.79mm per breach by exploiting execs and employees’ individual vulnerabilities to access their orgs’ data
Source: IBM, SafeAtLast Co.

Even Forbes States...

“[Cyberattacks] can prove particularly effective against whales, CEOs, HNWIs whose every move, voice, tone, tenor are telegraphed for world to see & cyber criminals to exploit.”

Regulators' Wrath Is Increasing...

Boards and Executives are increasingly targeted by regulators for cyber negligence...

…With specific laws like US Gramm-Leach Bliley Act now carrying a prison sentence of up to 5 years for individuals in violation of customer-data-protecting regulation

At the root of these cyber breaches are NOT cyber(in)secure technologies but rather...

Cause of Cyber Breaches

Root of the Problem

Cultures of
Cyber(in)secure Behavior
&
Boards that Allow/Enable 
Them

The threat landscape is expanding further, with digitalization & lucrative nature of cybercrime 

Global Market Size ($bn)

Source: Grand View Research, Cybersecurity Ventures

Means That...

97% of the growing
$5.8 trillion gap between cybercrime & cybersecurity is driven by cyber(in)secure behaviors and the Boards & Executive Teams that allow/enable them

is driven by cyber(in)secure behaviors and the Boards & Executive Teams that allow/enable them

The conclusion...

Culture of Breach-Deterrent Cybersecurity

is your most important defense

Cyber Breach RESPONSE 
will cost you

10x - 40x

Breach PREVENTION

CONCLUSION

Focus on developing a culture of self-focused & organization-focused cybersecurity, starting from the Board & Executive Team down 
or face the potential of spending up to 40x more on breach response

These Board Directors and Executives Missed the Problem And Paid the Price… 

Names of individuals have been changed & photo avatars distorted to protect their identities. Where divulging the company name could meaningfully jeopardize the security of the company, company name was changed. Titles/positions/quotes of individuals are factual and as provided by individuals. All case studies factual.

CASE STUDY A:
MEDOX: A UNICORN HEALTHCARE VENTURE

FROM THE FOUNDER, CHAIRMAN, CEO:

"I was convinced that the tech we were using - and even the best practices around employee behavior we had implemented - were keeping us secure! But these [hackers] not only breached our air-gapped IP (!) by having one of their own pose as an employee WE HIRED (!), they then even followed our employees home and (we think) broke in to gain access to their work files on personal computers, and then even bribed our security guards to find out what employees were coming into the office at what time! It's a nightmare!"

- Erica B., Founder, Chairman of the Board, Chief Executive Officer, Medox

THE STORY:

Erica B.
Founder, Chairman, CEO
Medox

STATE 1: 

Air-gapped IP breached via cyber(in)secure behaviors despite Founder convinced of cybersecurity

STATE 2: 

Had to incur 40x breach prevention training cost on incident response. Failed to act swiftly, giving hackers prolonged access & damage. 

TIMEFRAME:

4-6 months under breach + another 2 of indecision = air-gapped IP stolen

CASE STUDY B:
PATHFINDER: $100 MILLION AUM FAMILY OFFICE INVESTMENT FIRM

FROM HEAD OF THE FAMILY OFFICE:

 "Andrzej, we need the Blueprint! We've been breached! Hackers posing as my father sent to my secretary invoices looking exactly like ours do, with just the bank account slightly different, instructing her to pay them! They must have been studying us for months to get this level of intel on our people, our operations, and our approval processes! "

- Vincent W., Co-Founder, Pathfinder Family Office

THE STORY:

Vincent W.
Co-Founder
Pathfinder Family Office

STATE 1: 

Breached and under attack for 2 months, same 2 months the CEO procrastinated on breach prevention training that could have avoided the breach entirely.

STATE 2: 

Failed to act swiftly, giving hackers prolonged access, resulting in breach response cost = 40x breach prevention.

TIMEFRAME:

2-3 months under breach 

Don’t be them. Don’t procrastinate or downplay risks....

These Executives Saw the Problem & Opportunity, & Have Been Getting the Benefit of a Breach-Deterrent Culture Since

Names of individuals have been changed & photo avatars distorted to protect their identities. Where divulging the company name could meaningfully jeopardize the security of the company, company name was changed. Titles/positions/quotes of individuals are factual and as provided by individuals. All case studies factual.

CASE STUDY 1:
 PHOENIX: A $70MM REVENUE US HEALTHCARE COMPANY
BOARD DIRECTORS & EXECUTIVE TEAM

Client's Average Star Rating for Each Training Module: 9.5 out of 10

FROM THE CLIENT:

"This is the only training in the market that teaches Boards, C-Suites, & Investors how to think about their own and their organizations' cybersecurity holistically & execute on it 360°, beyond just relying on tech cybersecurity & the CISO, which solve only 3% of the problem anyway. The information was excellent, very timely and can be easily and properly used. I was really impressed with how technology was used to deliver the information."

- Jonathan H., Chairman of the Board of Directors, Phoenix

"I really enjoyed the cyber blueprint training. I found the deep-dive analysis of the role of the board in overseeing the physical, digital, and cyber secure pieces of the business – and how they are integrated – to be extremely beneficial as part of the overall Board cybersecurity strategy."

- Calysta F., Chief Financial Officer (CFO), Phoenix

"This is really solid, timely information."

- Yolanda G., Chief Legal Officer (CLO), Phoenix

"I very much enjoyed the program, lots of good information there and am very excited for the rest of the board and management team to work through it as well! Also, with the geopolitical stage being increasingly critical, this training provided key areas for us to consider as a Board and management team as we develop our cyber geopolitical response strategy."

- Barry B., Chief Information Security Officer (CISO), Phoenix

THE STORY:

Cyber Nation Central was approached by...
Barry B.
Chief Information Security Officer
Phoenix

ORIGINAL STATE: 

  • Cybersecurity of the organization was relegated by the Board & C-Suite to strictly the CISO's responsibility
  • CFO & Chief Legal Officer treated it as a technical/safety/risk management issue rather than the corporate strategy and behavioral issue it disproportionately is
  • No one in the company viewed it as an issue of wholistic Board Strategy or geopolitical, regulatory, or wholistic cyber insurance strategy
  • ​Non-CISO Execs did not understand what "cybersecure behaviors" meant or how to practice them

TRANSFORMATION: 

Each Board Director & C-Suite Executive developed their individual Blueprint of Self-Focused (professional, personal, & family) & Organization-focused (Fiduciary) cybersecurity blueprint for a culture of cybersecurity capable of avoiding the $9mm breach. This included a wholistic:
  • Organization-wide Board Cybersecurity Strategy
  • ​Geopolitical Cyber Response Strategy
  • Regulatory Cybersecurity  Policy Response Strategy 
  • Corporate & Individual Cyber Insurance Strategy

TIMEFRAME:

10 hours per Director & Executive

CASE STUDY 2:
CEO OF PARAMOUNT HEALTHCARE, A $100MM HEALTHCARE COMPANY
FORMERLY CEO OF A VENTURE CAPITAL & FAMILY OFFICE PLATFORM
MANAGING DIRECTOR OF A PRIVATE EQUITY COMPANY
BULGE BRACKET INVESTMENT BANKER

Client's Average Star Rating for Each Training Module: 9.0 out of 10

FROM THE CLIENT:

"The Blueprint training helped me realize (and correct) that my self-focused (professional, personal, and family) cybersecurity was weak (and that of my Board Directors even more so) because neither I nor my IT focused on our level of threats any differently than those against our employees.

“This Blueprint helped us build a culture of cybersecurity from the Boardroom down, providing both our Directors & execs an organization-wide cybersecurity strategy & self-focused cybersecurity blueprint. 

“This was a seriously beneficial experience. Thanks CNC!"

- Dominik R., Chief Executive Officer, Paramount Healthcare

THE STORY:

Cyber Nation Central was approached by...
Dominik R.
Chief Executive Officer
Paramount Healthcare

ORIGINAL STATE: 

  • Cybersecurity of executives & Board was treated no differently than that of an average employee, thereby putting the entire org at risk (given the higher threat landscape faced by Directors & Executives)
  • Board was not held to the same standards of cybersecure behaviors as the Executive Team, and Execs were not behaving cybersecurely themselves to begin with

TRANSFORMATION:

Developed an individual Blueprint of  Self-Focused (professional, personal, and family) cybersecurity & a culture of cybersecurity, including a detailed assessment of all threats, mastery of device and behavioral cybersecurity for the professional, personal and family cyber avatars of his entire Board of Directors and Executive Team (as well as family), including end-to-end travel cybersecurity.

TIMEFRAME:

Total of 8 hours of the CEO's time

CASE STUDY 3:
CEO OF ESG ENTERPRISES, A TRANS-ATLANTIC, 100% VIRTUAL, ESG CONSULTING FIRM
FORMERLY BULGE BRACKET WALL STREET INVESTMENT BANKER

Client's Average Star Rating for Each Training Module: 10.0 out of 10

FROM THE CLIENT:

"Recently, I was subject to a disinformation campaign resulting from a cyber breach. I knew I had to take control of my cybersecurity to assure my clients & organization that I was doing all I could not to become a victim again. Without any previous technical training, this training taught me how to upgrade my technology and behaviors across my entire digital presence.

“Going through the training was also quite liberating because I not only learned how to create and drive a culture of cybersecurity in my family and organization, but because I could now walk into any Board or management meeting, or meeting with my CTO, & know exactly what needed addressing.

“My CTO also benefited significantly because he now not only has a more cybersecurely-behaving CEO but also a stronger cybersecurity champion."

- James B., Chief Executive Officer, ESG Enterprises

THE STORY:

Cyber Nation Central was approached by...
James B.
Chief Executive Officer
ESG Enterprises

ORIGINAL STATE: 

Breached by an insider who used illegally-obtained yet innocent information, then added a significant amount of disinformation and ran a highly effective, long smear campaign again the CEO, tarnishing his reputation online, in front of business partners and government agencies.

TRANSFORMATION:

  • Learned clear steps he can take in the future to avoid same kind of cyber breach & disinformation campaign
  • Mastered self-focused cybersecurity, incl. general & executive risks, behavioral & technology best practices, & did so for all of his devices, social media, cloud tech, passwords, authentication, & travel
  • Learned how to drive a culture of cybersecurity authentically in his org while also demanding the same from his business partners & third parties

TIMEFRAME:

7 hours of the CEO's time

CASE STUDY 4:
SENIOR ADVISOR TO THE VICE PRESIDENT OF A CENTRAL AMERICAN COUNTRY
PRIVATE SECTOR AND NON-PROFIT BOARD DIRECTOR

Client's Average Star Rating for Each Training Module: 9.5 out of 10

FROM THE CLIENT:

"Prior to going through the training, I didn't realize that – as a Board Member – I can be a liability and a source of cyber(in)security (at best) and cyber breach and harm (most likely) to the organization I'm advising because of the confidential information I have access to.

“I can say that not only is [the training] not time consuming, it is a very
profitable time. 

“The training instruction is communicated expertly and is excellent.

“The course is engaging, and its format is suitable for people with limited time.

“The training not only helped me rectify my own behaviors & practices but also gave me an entire Board strategy for creating a culture of cybersecurity in my organization, across all Board, executive, and employee stakeholders. And I achieved this transformation despite being a non-technical person!”

- June L., Senior Advisor to Vice President of a Central American country; Board Director

THE STORY:

Cyber Nation Central was approached by...
June L.
Senior Advisor to VP of a Central American country
Private Sector & Non-Profit Board Director

ORIGINAL STATE: 

  • She was bringing her cyber(in)security to the Office of the Vice President of a nation & to her Boards
  • Like most Board Directors, she did not fully appreciate how much her cyber(in) security compromised the security of her stakeholders

TRANSFORMATION:

  • Realized her cybersecurity is as important as her physical security & the main firewall is her, not her CTO or tech
  • Rectified her own cyber behaviors & practices
  • ​Gained access to an entire Board strategy for creating a culture of cybersecurity in her orgs (across all Board, exec, & employee ranks)
  • Was able to develop a cybersecurity-driven culture & build a plan for her family & orgs' key stakeholders, & achieved this despite being a non-technical person!

TIMEFRAME:

8 hours of the Official's time

CASE STUDY 5:
SENIOR OFFICIAL, OFFICE OF THE UNITED NATIONS SECRETARY GENERAL
SENIOR ADVISOR TO THE UN SECRETARY GENERAL

Client's Average Star Rating for Each Training Module: 8.0 out of 10

FROM THE CLIENT:

"I have been searching for an appropriate training product tailored to a senior leader, one that would provide both strategic and practical guidance. I am delighted with my choice, and I strongly recommend it to any senior official or executive with my type of public profile.
 
“Imagine becoming the Chief Executive and receiving a top-secret briefing of technical and behavioral tools you could use to defend against real and potential adversaries. That was this programme, and it truly left no area uncovered.

"The training structure itself was also excellent and the instructor is an excellent communicator who breaks down complex subjects into easily understandable segments."

- Angela Z., Senior Official, Office of the United Nations Secretary General

THE STORY:

Cyber Nation Central was approached by...
Angela Z.
Senior Official, Office of the United Nations Secretary General

ORIGINAL STATE: 

  • Had been concerned about her personal & professional cybersecurity for some time, especially as her public & social media profiles gained prominence
  • Concurrently, a member of her close family with the same name assumed a more prominent role in business, putting her personal & professional data & information at further indirect risk

TRANSFORMATION:

  • Mastered her self-focused cybersecurity, including general & executive risks, behavioral & technology best practices, & did so for all of her devices, social media, cloud technologies, passwords & authentication, & travel
  • Learned how to drive a culture of cybersecurity authentically in her organization and family

TIMEFRAME:

7 hours of the Official's time

Who Needs to Pay Attention?

Board Directors, CEOs, Entrepreneurs, Investors, and other Executives…

  • Who have access to or are charged with the fiduciary duty to protect sensitive data and digital crown jewels, hard-earned success, reputation, wealth, and legacy of their own and their organizations’.
  • If you want to develop a culture of cybersecurity at work and at home but don’t know what that means and what your cybersecurity fiduciary responsibilities really are, much less how to execute them fully. 
  • ​If you want to take control of your own professional, personal, and family cybersecurity 360°.
  • If you suspect that you, not your CTO, are responsible for driving a cybersecure culture.
  • If you’ve perhaps heard members of US Congress point blank tell you that a culture of cybersecurity is your responsibility (while simultaneously passing laws that penalize you more than your CTO in a cyber breach).
  • If you fear that your Board Directors aren’t cybersecure enough – behaviorally and technologically – to withstand an attack on them that targets their access to your organization’s sensitive information.

Whom Is This Not For

Those Board Directors, CEOs, Investors, Entrepreneurs, and other Executives who:

  • Don’t seek to fully understand and/or take their cybersecurity fiduciary duties and responsibilities seriously or protecting their shareholder value and legacies seriously. 
  • ​Don’t want to own up to a culture of cybersecurity starting at the top, with them, and who believe that it’s their CTO – not them – who should be the cybersecure-culture driver for their organization. 
  • ​Choose to ignore the risk of their spouses and kids being targeted as a way to breach the executive and – through the executive – the organization.
  • ​Realize the problem the $6trn cybercrime poses to them but procrastinate on taking action that would save their organization from an impending breach.
  • ​Trivialize the possibility of getting breached, despite the 33% chance of an SMB getting breached.  

The Core Concept

It’s possible to buy the best, most cybersecure enterprise tech & onboard the top CISO. But with 97% of cyber breaches caused by cyber(in)secure behaviors & social engineering rather than tech, Boards need to realize that…

And given that cybersecurity is no longer an issue of even just tech & behaviors but is rather also an issue of….

As CEO of Cyber Nation Central, 
Why Am I So Focused on Your Cybersecurity...

Because years ago, my own venture was shut down by a cyberattack that targeted me, my Board 

Directors and Executives, and because, even though we weren’t negligent and in fact ran our company at the highest level of technological cybersecurity practiced in the private sector – unlike THEN – regulations NOW stipulate imprisonment of up to 5 years for any Director convicted of cybersecurity negligence.

And if a Board as sophisticated as ours – with CEOs of major corporations on our Board – was successfully targeted this way, any Board is at risk. We saw our venture disintegrate within a couple of months of the breach the same way that – as has been estimated – 60%+ of SMBs go out of business within 6.5 months of a breach.

We thought we were cybersecure because our technologies were. Sadly… neither the private sector, nor I, my Board, Executive Team, or Investors at the time knew that cybersecurity is only 3% technology and 97% cybersecure behaviors and a culture of cybersecurity from the Board down.

I wish I had a solution then that taught us how to achieve that culture of cybersecurity and behaviors at the Board and Executive level. Losing my venture made me angry, but I saw it as a call to action. And not seeing a robust solution in the market that helps Boards and Executive Teams create and maintain a 360° culture of cybersecurity that actually stands a chance of deterring a breach, I created the Executive Cybersecurity Blueprint™ to deliver precisely that.

Hi, I’m Andrzej Cetnarski. I’m a national security and cybersecurity strategist, former tech & defense 

UBS investment banker, serial global entrepreneur, Forbes cyber defense contributor, co-Chairman of the American’s Future Series International Cybersecurity Innovation Summit, and alumnus of Harvard, Wharton, UPenn-Lauder, and University of Chicago.

I’m also the creator of Cyber Nation Central, a cyber defense ecosystem bringing you breach prevention, incident response, cybersecurity thought leadership, and cybertech innovation.

To be a successful Board Chairman, Director, CEO, Entrepreneur, or Investor, I realized that:

  • You… not your CTOs or CISOs… must know how to be cyber-armed:
  • Not just technologically but also behaviorally
  • ​Not just at the average employee’s level but at the level of threats facing you
  • ​Not just at work, but at home because your personal life is now used to breach you at work.
  • ​Not just at the individual level but at a cybersecurity fiduciary duties level as well.
  • To authentically create and lead a culture of cybersecurity, you must first live it yourself:
  • As an individual 
  • As a fiduciary
  • Your CTO cannot:
  • Behave cybersecurely for you
  • Discharge your cybersecurity fiduciary duties for you
  • ​Lead a culture of cybersecurity for you.

And to authentically create and lead a culture of cybersecurity, you, your Board, and each of your Executives must first live it yourselves. Because if you don’t, your CTO cannot behave cybersecurely for you or your employees and cannot lead a culture of cybersecurity – that’s your job.


Over the past five years, I’ve helped hundreds of leaders globally take control of their cyber defenses. And I would like to help you……


While losing my company made me angry, I saw it as a call to action. Not seeing a robust solution in the market that helps Boards and Executive Teams create and instill 360° cultures of cybersecurity, while building Cyber Nation Central, I created the Executive Cybersecurity Blueprint™ to deliver precisely that.

Andrzej Cetnarski, Chairman & CEO, Cyber Nation Central®

So How Do You Achieve & Maintain a Culture of Cybersecurity Capable of Avoiding the $9mm Cyber Breach?

There are 3 Parts to this, and they divide into 6 Activity Steps:

(click to enlarge)

Let’s review each of the 3 Parts and their 6 Activity Steps in more detail:

Part I: 
Get Trained & Develop Your Board Cybersecurity Blueprint: 

Train your entire Board & Executive Team so you operate/"sing" from the same proverbial "song sheet" and can bring this culture into your employee ranks

Part I: Get Trained

Step 1: Assess Your Threats 

OLD WAY

  • Assess your cyber risks usually:
  • By outsourcing assessment to your CTO
  • By assessing only tech weaknesses, omitting behaviors
  • At average employee level vs your executive level
  • Downplay risks & procrastinate on response
  • ​Not assess or even understand your risks much less prioritize your response to each

OLD RESULT

  • Continuously and fully expose yourself to a breach despite cybersecure tech
  • ​At some point catch hackers’ attention

NEW WAY

  • Understand the threats you, your Directors & Execs face in (not just) your Professional (but also your) Personal and Family lives 
  • ​Understand those threats’ financial, operational, emotional, and reputational costs if they materialize, and 
  • ​Prioritize your response urgency against each threat

NEW RESULT

  • All employee threats covered (they’re just a subset of yours)
  • ​97% of cyber threats facing your org via cyber(in)secure behaviors & 3% resulting from cyber(in)secure tech covered
  • Solid foundation built for authentically leading a culture of cybersecurity that parallels your CISO’s efforts
  • ​Together, you now stand a chance of avoiding a breach!

CRITICAL PATH INSIGHT

By understanding and mitigating cyber risks faced specifically by members of your Board and Management team in (not just) their Professional (but also their) Personal and Family lives, you will have also:
  • Covered all your employee specific risks (because they’re vastly just a subset of your Board & Executive risks).
  • ​Covered the 97% of cyber risks facing your organization via cyber(in)secure behaviors, thus creating “from-the-source” breach deterrence against the $6 trillion cybercrime economy and hackers looking to make your Executives and your organization the next victim.
  • ​Built a solid foundation for authentically leading a culture of cybersecurity that parallels your CISO’s efforts.
  • ​Seriously mitigated the remaining 3% of cyber risks caused by your cyber(in)secure technologies because – now – your Board, Management, and employees know how to behave cybersecurely with those technologies, thereby also seriously aiding your CISO’s hard work to cybersecure your enterprise network infrastructure. Together, you know stand a chance of avoiding a breach!

Part I: Get Trained

Step 2. Master Your Self-Focused Cybersecurity 
So You Can Drive That Culture Authentically 

OLD WAY

Directors and Executives would:
  • Not equate the need for their own individual cybersecure behaviors and tech best practices (much less their families’) as a necessity for driving the cybersecurity of their organizations.
  • ​Would buy piecemeal solutions like an anti-virus, firewall, VPN, mistakenly thinking they sufficiently cybersecured them, or they’d manage their passwords in Excel or on a piece of paper, or they’d mistakenly think their CTO would keep them secure professionally, or that their personal and professional cybersecurity were the same thing when they absolutely are not.

OLD RESULT

  • But how can you drive a culture of cybersecurity if you yourself are not practicing it, right (?), especially at a time when remote work exposes your organization to your and each of your Executives and employees’ cyber(in)secure home environments? You can’t… Right?
  • ​Not only waste money but risk a breach because real cyber threat deterrence would never be reached, leaving you and your organization cyber(in)secure, an easy target for hackers, and therefore a risk to you and your legacy, your family, and organization. 

NEW WAY

Instead, you and your Directors and Executives ought to:
  • Understand the full extent of your 3 cyber avatars – professional, personal, & family – & how these fit into the organization’s broader cyber avatar.
  • Take 360 control of these three avatars’ cybersecurity
  • ​Drive this self-focused culture of cybersecurity throughout your organization.

​This involves understanding of 6 Areas related to it:

AREA I
Organization's Cybersecurity Composition

Understand what makes up your organization's cybersecurity and how you fit into it

1.

Organizational Cybersecurity =

2.

= Enterprise Tech Cybersecurity +

3.

+ People Cybersecurity (PC), where

4.

PC = (General Employee + 

5.

+ Board/Executive +

6.

+ Third Party) Cybersecurity

AREA II
Your Directors/Executives' 3 Self-Focused Cyber Avatars*

* Not including the 4th - Fiduciary - Avatar, covered in Step 3.1-3.4 below.

Understand the three Avatars of your Board/Executive (and employee) cybersecurity

AREA III
Your Organization's Coverage Gaps

Become acutely aware of what your organization does and does not cover for you in terms of (a) cybersecurity and (b) cyber insurance because there are significant gaps that expose your organization and you individually to unmitigated risk and even imprisonment

AREA IV
Your Detailed Cyber Avatar Components

Understand what your "Self-Focused (Professional, Personal, Family) Cyber Avatar" is actually composed of and the 6 Sub-Steps you need to follow towards cybersecuring it

AREA V
Your Cyber Avatar Sub-Components

Taking control of each of these 6 Steps' cybersecurity means you must analyze & understand:

  • What General & Executive Risks you face in each category step.
  • What Cybersecure Behaviors and Strategies must you practice in this category. And
  • What Cybersecure Tech Devices do you need to obtain or rid yourself of and what your Best Practices with them ought to be.

AREA VI
Interaction Within Your Avatar Sub-Components

In order to take control of your Self-Focused Cybersecurity, you must finally understand the interaction of your devices and how you need to cybersecure that Device Interconnectivity while at home and while on the move, traveling abroad or at home. 

NEW RESULT

Anything short of this Avatar being cybersecured… and you stand no chance against hackers

CRITICAL PATH INSIGHT

The only way to create a blanket of cybersecurity around you and thus transition you into an authentic driver of a culture of cybersecurity in your organization (and family) is to fully:
  • Understand your Cyber Avatar and what in it requires securing. 
  • ​Then learning how to cybersecure it. And, finally,
  • ​Actually executing on the lessons learned. 
Top-down vs. bottom-up.
Focus moves to YOU (and what you require holistically to be cybersecure) and moves away from mistaken over-reliance on your CISO or on piecemeal solutions like anti-virus or VPN, which by themselves do not cybersecure you.

Summary of the VI Areas: So these are the 6 Areas. And as each of your Board Directors and Executives authentically learns how to develop and implement these 6 Areas and underlying 6 Steps of your Cyber Avatar in your people culture, you’ll not only gain a culture of cybersecurity but a scalable one at that, from your Board down, not just your CISO.

Part I: Get Trained

Step 3: Take Control of Your Organization-Focused Cybersecurity Fiduciary Duties

Let's review each of these 4 Sub-Steps in tandem...

Part I: Get Trained

Step 3.1: Develop Your Org-WideBoard Cybersecurity Strategy

OLD WAY

Board mistakenly relies on CISO for cybersecurity strategy and at best provides insufficient input (or even buy-in) and, at worst, provides none because….

Board uninformed/underinformed on proper cybersecurity-focused:
  • Strategy
  • Execution budget, or even 
  • ​Compliance requirements, much less their…
  • Individual roles in authentically fostering a culture of cybersecurity, or their own...
  • ​Individual, very real cybersecurity fiduciary duties.

OLD RESULT

An incomplete bottom-up strategy of the CISO, that completely omits the fact that:
  • Cybersecurity is an issue of:
  • Corporate – not just IT – strategy
  • Technology innovation and regulatory policy response strategy, not just compliance
  • Competitive market positioning, not just IT compliance
  • Cybersecurity is not only a fiduciary issue but 100% a Board issue and therefore an Executive Team-wide issue.

NEW WAY

Board Cybersecurity Strategy must be driven by Boards holistically and needs to be informed by and cover 4 issues:
  • Understand the costly impact of an insufficient Board Cybersecurity Strategy
  • Make sure your Strategy covers the 8 Areas of Board & Executive Oversight
  • ​Understand YOUR OWN by-Group, by-Individual, and by-Topic Cybersecurity Fiduciary Duties and execute on them via clearly defined Checklists
  • ​Understand and oversee similar Group-, Individual-, and Topic- specific Checklist adherence for EACH of your Directors and Executives.

NEW RESULT

Only this approach:
  • Delivers a wholistic Board-level cybersecurity strategy while keeping individual Directors and Executives clear on collective and individual fiduciary duties
  • Keeps Corporate Strategy and Cybersecurity Strategy in lock-step
  • Creates a natural push-pull Board-CISO strategy, w/ both strategies fully informing each other
  • ​Prepares the organization for breach deterrence & avoidance of financial & imprisonment breach consequences

CRITICAL PATH INSIGHT

A Board Cybersecurity Strategy begins with taking full responsibility over not just cybersecurity of the organization but over the healthy integration and growth of the Physical, Digital, and Cybersecure Avatars of the organization. 

To accomplish that, all Members of the Board as well as CEO, members of Executive Team, and CISO/CIO/CTO must be clear on each of their cybersecurity-driven areas of fiduciary duties and responsibilities – (1) organization-wide, (2) by group/area, (3) by-individual, and (4) by-risk-topic – and have an all-hands-on-deck Board-down (as much as CTO-up) cybersecurity strategy developed and lived by the entire organization.

Part I: Get Trained

Step 3.2: Develop Your Organization’s Geopolitical Cyber Response Strategy

OLD WAY

Often ignore:
  • Holistic geopolitical strategy, instead reactively responding to news, cyber terrorist attacks, corporate espionage campaigns or regulations
  • Geopolitics altogether, due to lack of time, awareness, or budget.

OLD RESULT

Playing constant catch-up to global, nation-state cyber threats or being at their mercy.

NEW WAY

Your Board can no longer make strategy, policy, or technology innovation choices that ignore global geopolitical pressures that expose you to nation-state-level cyberattacks. You must therefore:
  • Learn how to assess geopolitical risk to you & your organization.
  • Understand the geopolitical players, the passive and active risks they expose you to, and what you need to do about it.
  • Assess your’ government’s role in your cybersecurity calculus.
  • ​Develop relationships w/ government agencies & law enforcement that have a hand in your cyber defense against foreign adversaries.
  • ​Assess geopolitical risks to your Board/Exec travel cybersecurity.

NEW RESULT

Your Board/Execs no longer reactive to geopolitical cyber threats.

CRITICAL PATH INSIGHT

In order to fully discharge your Board and Executive fiduciary duty of protecting your organization, your employees, and your legacy from cyber threats, your Board, Executive and CISO/CIO/CTO cybersecurity strategy must be properly informed by the correct geopolitical risk calculus and a corresponding response strategy.

Part I: Get Trained

Step 3.3: Develop Your Organization's Regulatory Cybersecurity Policy Response Strategy 

OLD WAY

Boards would often ignore this kind of holistic regulatory cybersecurity policy response strategy, instead finding itself reactively responding to news or regulations too little too late.

OLD RESULT

  • Not staying ahead of regulations (as is a Board’s duty).
  • Often completely failing to stay ahead of what matters much more: HACKERS who can cost you the entire company.

NEW WAY

Boards must develop a proactive strategy that follows 4 principles:
  • Understand federal, state, local, int’l laws & regs so you avoid fines.
  • Understand lawmakers behind these so you whom to lobby and can predict regulatory winds.
  • Understand industry strategy best practices, standards, frameworks to stay ahead of and deter hackers and regulators.
  • Develop a simple strategy for complying w/ regulations, using best industry practices & frameworks to effectively predict changes.

NEW RESULT

Board discharges its fiduciary duty of protecting your org against adverse effects of regulation, maximizes its potential to capitalize on positive regs, & optimizes its toolkit for staying ahead of competition and deterring hackers.

CRITICAL PATH INSIGHT

Your regulatory cybersecurity policy response strategy can no longer be reactive but must instead proactively: 
  • Understand federal, state, local, and international laws and regulations you are subject to complying with so you avoid fines that include imprisonment.
  • Understand the lawmakers behind these so you not only know whom to lobby if necessary, but – based on the lawmakers involved and innovation in cybercrime – can proactively and better predict where the regulatory winds are blowing.
  • ​Understand industry regulatory cybersecurity policy response strategy best practices, standards, and frameworks (general and your industry-specific ones).
  • Develop a simple, to-the-point strategy for helping you comply, use best practices, and predict.
It’s your Board’s job to ensure this strategy exists.

Part I: Get Trained

Step 3.4: Develop Your Organization’sCorporate & Individual Cyber Insurance Strategy 

OLD WAY

In the past, Boards and Executives would:
  • At worst, not get cyber insurance or get it thinking it will cover all breach costs (it will never cover the opportunity cost of time lost in an operational shutdown, the emotional angst and reputational damage caused by a breach, or full financial costs).
  • Get a seemingly comprehensive corporate cyber insurance policy, yet one that has two huge holes:
  • No corporate policy sufficiently covers you individually as an officer of the company.
  • No corporate policy covers you at all as a private citizen or as a family.

OLD RESULT

You get breached and realize that:
  • Only a portion of the financial breach costs are covered or that the insurer’s exclusionary language makes validates non-payout, sticking you w/ full cost.
  • The operational, emotional, reputational costs are not only not covered, but dwarf the financial costs in magnitude and impact, paralyzing your people & ops, or shutting your organization down altogether.
  • ​Your ransom payment isn’t covered by insurance, leaving you w/ both breach cleanup and ransom bills, on top of regulatory wrath for paying the ransom to begin with. And you still have no access to your data b/c hackers lied about giving it back upon payment.

NEW WAY

Before getting coverage, develop a Strategy that covers:
  • Your org AND individual Directors/Officers.
  • Financial, operational, emotional, reputational costs.
  • How to work w/ law enforcement to prevent non-payout.
  • How to deal with exclusionary language.
  • ​Answers to questions like:
  • How to optimize D&O, CGL, Cyber Ins. overlaps?
  • What coverage do we need? What should it cost?
  • ​How can we cover D&O individual negligence?
  • ​W/ ransom attacks rising, how is coverage changing?
  • ​How do I cover corporate policies’ exclusion of my personal & home life despite my work from home?
  • ​What should Personal Cyber Insurance cover?

NEW RESULT

You gain a cyber insurance strategy that covers your org & each D&O individually, and shows you how to:
  • Deal w/ exclusionary language.
  • Cover most financial breach costs.
  • Address operational, emotional, and reputational costs suffered in the breach.
  • ​Choose the right insurer & cyber insurance policies – corporate and individual.
  • ​Work with law enforcement so you know what hackers you should deal with how.
  • ​Reconcile the interplay of your different insurance policies (General Liability, D&O, cyber insurance) so you’re getting your coverage needs optimized. 

CRITICAL PATH INSIGHT

Developing an appropriate cyber insurance strategy involves answering all of the above questions and, among others:
  • Being aware of the serious limitations of cyber insurance around coverage of financial, operational, emotional, and reputational costs of breach.
  • ​Ensuring that your prevention training is strong enough so you ideally never discover these serious limitations. 
  • ​Treating cyber insurance as only one tool in your overall cyber defense arsenal.
  • ​Knowing the gaps in corporate cyber insurance policies that expose you legally and personally as an executive, and understanding what adequate individual cyber insurance coverage you ought to purchase to soften those gaps’ negative outcomes in a breach.
  • ​Knowing and watching insurers’ exclusionary language like a hawk to prevent their policy payout avoidance.
  • ​Before paying ransom, consulting with your insurer and appropriate law makers/agencies first to make sure your ransom payment is legally allowed and covered by insurance, otherwise suffering the voidance of your policy and causing regulators’ wrath. 
  • ​Knowing who needs to be in your government response rolodex.
It’s your Board’s job to ensure this strategy exists.

Part I: Get Trained

Step 4: Implement Steps 1-3 Into Your Own Personalized, Executable Cybersecurity Blueprint 

OLD WAY

This idea is completely new in the market because there has never existed a 360° approach to:
  • Creating a culture of cybersecurity, or even… 
  • Cybersecuring an organization by having each individual employee (much less Director or Executive) follow a personalized…
  • SELF-focused (professional, personal, or family) and… 
  • ORGANIZATION-focused (fiduciary) cybersecurity blueprint.

OLD RESULT

The result has therefore been Boards and Management teams that were:
  • Neither drivers of a cybersecure culture for the organization, for their families, 
  • Nor an example of one themselves:
  • As individuals,
  • Professionally, or
  • ​In their private lives...
...thus (unintentionally but nonetheless destructively) promoting a culture of cyber(in)security.

NEW WAY

With your personalized Cybersecurity Blueprint, you have a clear & full dashboard for you & each of your stakeholders on:
  • Your individual cybersecurity (as professionals & private citizens), which will strengthen your org cybersecurity.
  • Your collective people cybersecurity (as Board, Execs, Audit Committee, Family), which aids your org security. 
  • Your org cybersecurity (via Fiduciary, Geopolitical, Reg Policy, & Cyber Insurance Dashboards), aiding your CISO.
This will in turn provide your organization with not just…
  • A culture of cybersecurity and 
  • 360° individual cybersecurity, but with 
  • ​Real organization-wide cyber breach deterrence, &
  • Compliance with regulations & avoidance of fines.

NEW RESULT

If you also ensured that your employees live the Self-Focused part of such a blueprint, just imagine…

… if each of your Directors, Officers, and employees followed such a blueprint of their own, wouldn’t this create a culture of cybersecurity that would make your organization infinitely safer than now…?

… thus helping you create serious breach deterrence against the $9mm financial price tag of a breach, the operational, emotional, reputational headaches of a breach, & avoid potential individual Director/Exec jail time for negligence? Wouldn’t you feel safer then?

CRITICAL PATH INSIGHT

To authentically instill a culture of cybersecurity in your organization and avoid fiduciary-duty-breach-caused imprisonment of individual Directors and Officers as well as the $9mm average price tag of a breach, each of your Board and Executive stakeholders should:

1.     Have and live by their own version of an Executive Cybersecurity Blueprint, covering their:
  • ​Self-focused (professional, personal, and family) areas of cybersecurity, including their higher-than-average-employee’s threat landscape. And
  • Organization-focused areas of cybersecurity, including individual and collective/group roles and responsibilities, as well as a comprehensive Board-level strategy, from:
  • ​Board Cybersecurity Strategy to… 
  • Geopolitical Cyber Response Strategy, to… 
  • ​Regulatory Cybersecurity Policy Response Strategy, & finally… 
  • ​Cyber Insurance Strategy for Corporate & Individual Coverage.
2.     Ensure your employees live a similar (even if scaled down) version of such a blueprint, especially the self-focused cybersecurity blueprint.

Just imagine: if each of your Directors, Officers, and employees followed such a cybersecurity blueprint of their own, wouldn’t this culture of cybersecurity make your organization infinitely safer than now, thus helping you avoid individual Director/Officer imprisonment for negligence, the $9mm financial price tag of a breach, and the operational, emotional, and reputational headaches of a breach?

Part II: Stay Current
By Getting & Maintaining Access to Expert Knowledge

Part II: Stay Current

Step 5: Keep Your Cybersecurity Blueprint Up To Date 

Keep your newly-forged cyber acuity and self-focused and organization-focused cybersecurity blueprint up to date so you stay current with the exponentially advancing cybercrime landscape

OLD WAY

In the past, we didn’t have a good way for Boards & Exec Teams to stay sufficiently current on their cybersecurity.

Any “get-up-to-speed” kind of training or “continuing education” thereafter that a Board or Executive Team would go through would have serious gaps in it vis-à-vis areas it needed to cover…

…as evidenced by the fact that hackers (a $6 trillion economy as of 2021) are $5.8trn ahead of the $182bn cybersecurity solutions market (as of 2021) and companies keep getting breached.

OLD RESULT

A Board and a Management team that:
  • Is neither a driver of a cybersecure culture for the organization, for their families, nor a consistent example of one themselves as individuals professionally or in their private lives.
  • Is lax in its continuous cybersecure-culture-optimization efforts and therefore by default promotes a culture of cyber(in)security.
  • ​Does not fulfill its fiduciary responsibility against the rising threat of cybercrime.

NEW WAY

Stay current on the ever-changing...

Step 5.1

...Board & Executive Fiduciary Duties & Responsibilities

Step 5.2

...Cyber Regulations, Policies, Standards, & Compliance Requirements

Step 5.3

...Cyber Insurance Gaps, Exclusions, & Policy Optimization Strategies

Step 5.4

...Cybersecure Behaviors, Technologies & Their Best Practices

NEW RESULT

Access to such a knowledge bank is the only way to achieve a continuous, consistent, clearly-deterrent cyber defense posture for you as an individual, for your Board, Executive Team, and your entire organization. 

CRITICAL PATH INSIGHT

With cybercrime-driven and therefore ever-changing nature of:
  • Cybersecure technologies; 
  • ​Cybersecure behavioral best practices; 
  • Cybersecurity laws, regulations, frameworks, and standards; as well as 
  • ​Cyber insurance practices; and therefore
  • ​Resulting fiduciary duties and responsibilities you as a Board of Directors and Executive Team need to follow…
…you require specialist knowledge to keep current on these issue areas…. Knowledge unlikely resident within your team.

As a fiduciary, you must secure access to an ongoing cybersecurity strategy and tactical thought leadership knowledge bank that will keep you and your team current on the ever-changing nature of these issue areas.

Your executive cybersecurity blueprint (for yourself individually, for your family, and for your organization), its cyber breach deterrence, your culture of cybersecurity, and thus your very avoidance of the $9mm cyber breach and increasing risk of negligence-caused imprisonment all depend on you doing so.

Part III: Maintain Access to External Experts

Part II: Maintain Access to External Experts

Step 6: Hire External Cyber Defense Experts Where Necessary

Partner with & hire the right external Cyber Defense Experts ready & capable to fill in when & where your problem awareness, expertise, time, or budget for internal resources are lacking. 

OLD WAY

Previously, you’d pay thousands of dollars per consulting hour, and you’d still not get the result you needed because Board-level cybersecurity expertise didn’t really exist…

OLD RESULT

…which is why cybercrime has reached $6trn/year & Boards continue to fail creating & maintaining cultures of cybersecurity, thus keeping their organizations at risk of hackers & the $5.8trn cybercrime vs. solutions gap.

NEW WAY

Surround yourself with both strategy & IT cybersecurity experts with both private & government sector expertise that can address complex questions as they arise during your cultural transformation & its ensuing optimization. Make sure they:
  • Not only speak Board-level and CISO-level cybersecurity strategy & tactical execution but also self-focused & org-focused cybersecurity, incl. cybersecurity fiduciary advisory.
  • Are experts in prevention, incident response, & can help you integrate cyber regulatory policy, geopolitical, cyber insurance, & Board strategy into your corporate strategy & vice-versa.
  • Are proven as a Managed Security Services Provider (MSSP).
  • ​Aren’t just “technology-speak” fluent but can translate what’s most important into Board strategy & fiduciary language.

NEW RESULT

You get regular Board and Executive cybersecurity consultations from experts that not only speak Board-level and CISO-level cybersecurity strategy and tactical execution but who can easily translate cybersecurity tech “speak” into “Board speak” and simultaneously cover your self-focused and organization-focused cybersecurity – including cybersecurity fiduciary advisory for your fiduciary duties – and then also cover whatever questions came up as you implement your cybersecure culture and its strategies and tactics in your organization.

CRITICAL PATH INSIGHT

To round out your internal capabilities and keep your Board-level cybersecurity strategy, culture of cybersecurity, and self- & organization-focused cybersecurity blueprint optimized, and to address complex questions as they arise during your cultural transformation and its ensuing optimization, strongly consider securing as-needed access to private- and government-sector-experienced cybersecurity strategists and tactical experts who:
  • Not only speak Board-level and CISO-level cybersecurity strategy and tactical execution but who can easily cover your self-focused and organization-focused cybersecurity needs – including cybersecurity fiduciary advisory for your professional situation 
  • Aren’t just experts in prevention but also in incident response and can expertly help you integrate cybersecurity Board strategy, regulatory policy and geopolitical strategy, and cyber insurance strategy into your corporate strategy and vice-versa. 

Activity Step Summary

As you can see, the steps you need to fulfill in order to develop a breach-deterrent blueprint for a culture of cybersecurity capable of avoiding the $9mm cyber breach fall into 3 Parts & 6 Steps.

Market Options to Achieve This 

Market Options towards creating and maintaining a breach-deterrent blueprint for a culture of cybersecurity capable of avoiding the $9mm cyber breach...

OPTION 1:
Attend MIT/ Stanford-Type Online Cybersecurity Training Course 
OPTION 2:
Hire Big 5 Consulting Advisory Firm (e.g., McKinsey, BCG, Bain)
OPTION 3: Subscribe to Industry Databases
(e.g., Gartner, Forrester Research)
OPTION 4:
Subscribe to Cyber Nation Central’s Executive Cybersecurity Blueprint™
1) Training: get trained on achieving your Breach-Deterrent Blueprint of Self-Focused & Organization-Focused Cybersecurity and a Culture of Cybersecurity
2) Access to Ongoing Thought Leadership: get ongoing, up-to-date thought leadership to help you with maintaining that Breach-Deterrent Blueprint
3) Ongoing Advisory: gain as-needed access to high quality advisory/consulting for optimizing your Breach-Deterrent Blueprint to your own personal, continuously-changing situational dynamics so you can consistently make the most optimal decisions about your self- and organization-focused cybersecurity, including (i) corporate, (ii) regulatory policy, (iii) geopolitical, and (iv) cyber insurance strategy.
Your/Your Team’s Time Required for Solution Provided
Pricing (based on 8 Board Directors & 8 Executives; total 16)
$48K-$128K
$500K-$2mm
$480K
Overall Ability to Deliver on Scope

Whom Is This For?

Board Directors, CEOs, Entrepreneurs, Investors, and other Executives…

  • Who understand that:
  • Learning how to behave cybersecurely as professionals and in their private life and then 
  • ​Bringing that culture into the organization... 
… is the only way to lead a culture of cybersecurity authentically; and
  • Who realize they have a fiduciary duty over creation, fostering of, and oversight over a culture of cybersecurity in their organizations in order to even stand a chance of avoiding the $9mm financial price tag of a cyber breach, much less also the operational, emotional, and reputational cyber breach fallout…
  • But who are struggling with: 
  • What “behaving cybersecurely” even means against the ever-expanding hacker innovation curve – as professionals, private citizens, and families, and
  • How to create and oversee that culture of cybersecurity in their organizations most effectively & efficiently.

Client Case Studies

Again, hundreds of executives all over the globe – from corporate CEOs, Board Chairmen and Directors, to Venture and Private Equity Investors, as well as UN and government officials and executives – have entrusted us with their, their Boards, Executive Teams, and broader stakeholder groups’ transformations from cyber(in)secure to cybersecure-culture drivers, achieving serious cyber breach deterrence for themselves and their organizations, with Boards and Executive Teams that serve as authentic examples of cybersecurity themselves.

Our Clients Represent:
  • Countless Organizations*, including: Soros Foundation, Citi, Hewlett Packard, United Nations, Harvard University, Harvard Business School (HBS), New York University (NYU), The Wharton School, US National Security Agency (the NSA), Imperial College, UBS, Bank of America, University of Chicago, and countless others we cannot name for security reasons, including a majority with revenue <$100mm per year. 
  • Many Disparate Industries: Healthcare, Defense, National Security, Finance, Investment Banking, Family Office, Venture Capital, Private Equity, NGO, Law, among others.
  • ​All the Major Continents: North America, Asia & Eurasia, Europe, Australia & New Zealand, Latin America, and Africa.
*Those we are allowed to name (due to security reasons)
Here is what just a few Clients have had to say about their experience…

*Names of individuals have been changed & photo avatars distorted to protect individuals’ identities; all case study content and individuals’ titles/positions are official and provided entirely by the individuals.

CASE STUDY 1:
PHOENIX: A $70MM REVENUE US HEALTHCARE COMPANY
BOARD DIRECTORS & EXECUTIVE TEAM

Client's Average Star Rating for Each Training Module: 9.5 out of 10

 Barry inquired about the Executive Cybersecurity Blueprint™ because like many:
  • CEOs, his “CEO [had been] uninvolved in cybersecurity, fully delegating it to [Barry], and wasn’t interested in getting involved,” said Barry. In fact, according to Barry, his CEO “described himself as not very tech-aware,” despite the company employing a lot of technology servicing its customers.
  • CFOs and Chief Legal Officers of companies, Barry’s CFO and CLO thought that “the best solution to a cyber breach is a good cyber insurance policy,” and they were in the process of trying to get one when Barry learned from Andrzej about the many shortcomings of that conclusion and instead asked for Andrzej’s help in communicating to both his CFO and CLO the fulness of strategy that needed to take place instead.
  • ​Chairmen/women of the Board, his Chairman, on the other hand, “did not like using technology and was reluctant to even get on a Zoom call with the team,” not realizing that his “off-the-grid” approach exposed the company to many types of cyberattacks, not the least of which were social engineering attacks that prey on off-the-grid victims like him by impersonating them in the digital world as if it was the victim himself, thus duping the audience (e.g. a CFO who believes the request is coming from the real Chairman, not a hacker) into doing what the hacker wants.
Furthermore, when the call with Barry, the CEO, CFO, and CLO happened…:
  • The CEO opened the call with a statement “I’m on this call really only because my VP of Security wants me to be on it. I’m not a cybersecurity guy,” clearly implying his misinformed view of what cybersecurity entails (many CEOs are in this position), or that it is even his “problem,” unaware that it is in fact the CEO’s fiduciary duty, one whose breach is punishable even by imprisonment in certain situations.
  • The CFO asked “what does it mean to act cybersecurely?,” further unaware (as most are) that 97% of cybersecurity breaches happen because of cyber(in)secure behaviors and also unaware of the extensive cybersecurity fiduciary duties a CFO has (even if the CFO’s Board and CEO don’t require its fulfillment).
  • ​The CLO, on the other hand, was unaware of the very regulatory policies being passed that were driving the organization’s legal, financial, fiduciary duty, compliance, and operational health. Many CLOs have this problem, especially in small and medium enterprises, because the rate of regulatory change is just so much faster nowadays, given the magnitude of the problem.
  • ​All of these were about to change…as the company was considering signing on with the Blueprint.
It was clear Barry was struggling (like many CISOs in his shoes) with getting buy-in from his Executives and Board to make cybersecurity have the cultural presence in his organization that it needed to. He understood that he needed to deliver a top-down Board cybersecurity strategy to his organization (rather than just a bottom-up one coming from IT) but needed help communicating this urgency to his team.

FROM THE CLIENT:

"This is the only training in the market that teaches Boards, C-Suites, & Investors how to think about their own and their organizations' cybersecurity holistically & execute on it 360°, beyond just relying on tech cybersecurity & the CISO, which solve only 3% of the problem anyway. The information was excellent, very timely and can be easily and properly used. I was really impressed with how technology was used to deliver the information."

- Jonathan H., Chairman of the Board of Directors, Phoenix

"I really enjoyed the cyber blueprint training. I found the deep-dive analysis of the role of the board in overseeing the physical, digital, and cyber secure pieces of the business – and how they are integrated – to be extremely beneficial as part of the overall Board cybersecurity strategy."

- Calysta F., Chief Financial Officer (CFO), Phoenix

"This is really solid, timely information."

- Yolanda G., Chief Legal Officer (CLO), Phoenix

"I very much enjoyed the program, lots of good information there and am very excited for the rest of the board and management team to work through it as well! Also, with the geopolitical stage being increasingly critical, this training provided key areas for us to consider as a Board and management team as we develop our cyber geopolitical response strategy."

- Barry B., Chief Information Security Officer (CISO), Phoenix

THE STORY:

Cyber Nation Central was approached by...
Barry B.
Chief Information Security Officer
Phoenix

ORIGINAL STATE: 

  • Cybersecurity of the organization was relegated by the Board & C-Suite to strictly the CISO's responsibility
  • CFO & Chief Legal Officer treated it as a technical/safety/risk management issue rather than the corporate strategy and behavioral issue it disproportionately is
  • No one in the company viewed it as an issue of wholistic Board Strategy or geopolitical, regulatory, or wholistic cyber insurance strategy
  • ​Non-CISO Execs did not understand what "cybersecure behaviors" meant or how to practice them

TRANSFORMATION: 

Each Board Director & C-Suite Executive developed their individual Blueprint of Self-Focused (professional, personal, & family) & Organization-focused (Fiduciary) cybersecurity blueprint for a culture of cybersecurity capable of avoiding the $9mm breach. This included a wholistic:
  • Organization-wide Board Cybersecurity Strategy
  • ​Geopolitical Cyber Response Strategy
  • Regulatory Cybersecurity  Policy Response Strategy 
  • Corporate & Individual Cyber Insurance Strategy

TIMEFRAME:

10 hours per Director & Executive

CASE STUDY 2:
CEO OF PARAMOUNT HEALTHCARE, A $100MM HEALTHCARE COMPANY
FORMERLY CEO OF A VENTURE CAPITAL & FAMILY OFFICE PLATFORM
MANAGING DIRECTOR OF A PRIVATE EQUITY COMPANY
BULGE BRACKET INVESTMENT BANKER

Client's Average Star Rating for Each Training Module: 9.0 out of 10

FROM THE CLIENT:

“The more headlines I read about cybersecurity breaches of companies, the more concerned I’ve become that, any day, my company could become a target. Since I am the CEO, I actually have access to the most sensitive information and passwords and I am the steward of our culture.

I knew that my own individual cybersecurity was weak (and that of my Board Directors even more so) because neither I nor anyone from my company was focused on it. 
"Unfortunately, it did not even occur to my company’s CTO and IT department to focus on our C-suite level cybersecurity any differently than the rest of the employees. While our CTO was focused on cybersecurity of the company’s networks and our overall employee base, I knew that I had to focus on my, my Board’s and Executive Team’s individual – professional and personal – vulnerabilities so that, at the most basic level, no one could use our activities – digital or physical – to gain a digital backdoor into our company, and so that we’d actually learn how to lead by example and from there create a culture of cybersecurity in the entire organization. But to do that, I had to instill a culture of cybersecurity at these highest ranks first.

“I think this Blueprint is critical for all C-suite executives, Board members, and anyone else who controls significant resources of their own or their employers. Hackers try to exploit the person and company that is the weakest link and one that requires the least amount of resources to penetrate for the highest financial return. Because we are time-strapped and often short on knowledge of best practices when it comes to cybersecurity, we executives are easy prey. I want hackers to stay as far away from me as possible simply because I make it too difficult for them to target me; I’d rather they find someone else to be that weaker link. Anyone who completes this Blueprint and implements its straightforward recommendations will NO LONGER be the weakest link and easy target for cybercrime.

“Prior to going through the Executive Cybersecurity Blueprint™, I thought that I would need to hire very expensive cybersecurity experts to evaluate my individual cybersecurity and teach us how to instill a culture of cybersecurity in our organization, similar to the costs of cybersecurity for my company’s IT networks. However, the Blueprint not only taught me, my Board and Executives how to make the assessment and implement improvements ourselves, for a fraction of the price of consultants (and in barely a weekend of our time), but also had the added benefit of teaching us the behaviors we all needed to adopt – and which no one else could live for us – and it gave us a full Board strategy for cybersecurity, including all oversight responsibilities for members of our Board and management team. It even gave us a full geopolitical, regulatory, and cyber insurance strategy so all we needed to do was execute. Through the Blueprint, I gained a heightened sense of awareness. I had not realized, prior to going through this training suite, that taking some simple steps to improve my professional, personal, and family cybersecurity could have the significant benefits that it does, not only for me and my family, but for my entire organization’s cyber defense posture.

“As just one example, the Executive Cybersecurity Blueprint™ immediately changed how I use my mobile phone and gave me best practices on how to travel globally while keeping my sensitive information safeguarded. I also really liked how expansive even the definition of “travel” was, covering even around-town travel and travel into government offices in friendly & less friendly countries. In the last year alone, I’ve had many times where I’ve found myself in a travel situation where, knowing what I now know, my cybersecurity could have been significantly improved by my current knowledge. And that's before the COVID pandemic makes remote work and dependence upon digital activities even more so a hacker's heaven!

“This Blueprint is simply a game-changer in organizations’ cybersecurity and building cultures of cybersecurity from the Boardroom and Executive Suite down. It’s also a game-changer in executives’ self-focused professional, personal, and family cybersecurity (and therefore, again, in our organizations’ cybersecurity). It’s truly a serious differentiator from the market.”

- Dominik R., Chief Executive Officer, Paramount Healthcare

THE STORY:

Cyber Nation Central was approached by...
Dominik R.
Chief Executive Officer
Paramount Healthcare

ORIGINAL STATE: 

  • Cybersecurity of executives & Board was treated no differently than that of an average employee, thereby putting the entire org at risk (given the higher threat landscape faced by Directors & Executives)
  • Board was not held to the same standards of cybersecure behaviors as the Executive Team, and Execs were not behaving cybersecurely themselves to begin with

TRANSFORMATION:

Developed an individual Blueprint of  Self-Focused (professional, personal, and family) cybersecurity & a culture of cybersecurity, including a detailed assessment of all threats, mastery of device and behavioral cybersecurity for the professional, personal and family cyber avatars of his entire Board of Directors and Executive Team (as well as family), including end-to-end travel cybersecurity.

TIMEFRAME:

Total of 8 hours of the CEO's time

CASE STUDY 3:
CEO OF ESG ENTERPRISES, A TRANS-ATLANTIC, 100% VIRTUAL, ESG CONSULTING FIRM
FORMERLY BULGE BRACKET WALL STREET INVESTMENT BANKER

Client's Average Star Rating for Each Training Module: 10.0 out of 10

FROM THE CLIENT:

“Recently, I experienced the manipulation of my identity and a disinformation campaign as part of a fraudulent scheme resulting from a cyber breach by an “insider.” This happened partly because I had inappropriately and via inappropriate means shared my email access with a partner, all of which was 

further exploited by threat actors working with the partner. I became aware
that emails sent from my account were used to portray me adversely so that this partner could claim a government benefit while significantly tarnishing my reputation online, at government agencies and to family, friends and colleagues. Once I changed my password, I discovered this fraudulent scheme continued by spoofing my email. As it turns out, none of this would have happened had I gone through the Executive Cybersecurity Blueprint training prior.

“I hear that such schemes are taking place more frequently. With the threat landscape constantly evolving, I knew that my then-current behaviours and technologies stood no chance in providing me with the kind of robust defense I’d need against a future cyber event and identity manipulation like the one I had experienced, and that I need to seriously upgrade those behaviours, technologies, and how I use those technologies. I knew I had to take control of my cybersecurity – for myself and so I can drive that kind of a culture in my organization, since I’m also at the helm of a virtual organization with colleagues on two continents.

“The Blueprint taught me steps I could have easily taken to avoid what had happened to me, and so much more.

“As I also have a family, I needed to make sure this kind of identity manipulation did not affect my reputation or that of my family’s in the future. And, as a leader working on corporate initiatives for leaders at client organisations remotely, I wanted to assure my clients and my organisation that I was doing all that I could not to become a victim again and instead protect myself and them, since I might inadvertently become a gateway to them for future bad actors targeting me and trying to target them through me.

“Without any previous technical training, through this Blueprint, I learned to upgrade my technology and behaviors across my entire digital presence. I was able to achieve peace of mind that I was maximizing my ability to develop a posture of cyber threat deterrence!

“The Blueprint also made me realize that I am indeed the first and the last line of defense against cyber threats (not my CTO, my cybersecure devices, or middlemen IT firms) and so it was totally on myself to change my behaviours.

“My biggest concern before going through the Blueprint training was that I would need to become an expert in cybersecurity in order to know how to fully take control of my individual (professional, personal and family) cybersecurity or to develop a culture of cybersecurity in my organization. Instead, the Blueprint made it simple, teaching me how to do so in less than 7 hours of video training (plus another day I chose to devote to really implement everything and take advantage of the Blueprint’s protocol and database resources).

“Going through the Blueprint was actually liberating, because I not only became a driver of a cybersecure culture for myself, my family, and my organization, but because I could now walk into any Board or management meeting, or meeting with my CTO, and know exactly what needed to be talked about.

“In a way, a CTO also benefits from someone like me going through this training as much as I did because now, his or her job of executing on the overall organization’s cybersecurity is that much easier – they now have “informed buy-in” from the very top.

“The training also enabled me to create a clear personalized blueprint of my own for fully upgrading my behaviors and my devices’ hardware and software to the most secure ones, to use the most effective password and authentication systems, and to update my behaviours to cybersecure ones and create the same blueprint for my executives and employees. I was able to finally get peace of mind as I took control of my cybersecurity. And without feeling anxious… because I knew I was being coached by the best executive cybersecurity advisors in the business (just listen to Andrzej’s story! He understands first-hand what it takes.)

“I found the training instructors to be deeply knowledgeable, personable and passionate about enabling executives to take control of our cybersecurity, and always straight to the point and available to address any concerns. The training is designed in simple, stepwise modules with summaries before and after each module, which helped me not only schedule the training at my pace but also retain the practical knowledge easily.

“The feeling I had when I completed the full Blueprint training was: “I can do this! I can not only take control of my own individual professional, personal, and family cybersecurity but I now also know how to develop that kind of a culture in my organization from the ground up and sustain it! I now want all my Board Directors, execs, and senior managers to go through this training!””

- James B., Chief Executive Officer, ESG Enterprises

THE STORY:

Cyber Nation Central was approached by...
James B.
Chief Executive Officer
ESG Enterprises

ORIGINAL STATE: 

Breached by an insider who used illegally-obtained yet innocent information, then added a significant amount of disinformation and ran a highly effective, long smear campaign again the CEO, tarnishing his reputation online, in front of business partners and government agencies.

TRANSFORMATION:

  • Learned clear steps he can take in the future to avoid same kind of cyber breach & disinformation campaign
  • Mastered self-focused cybersecurity, incl. general & executive risks, behavioral & technology best practices, & did so for all of his devices, social media, cloud tech, passwords, authentication, & travel
  • Learned how to drive a culture of cybersecurity authentically in his org while also demanding the same from his business partners & third parties

TIMEFRAME:

7 hours of the CEO's time

CASE STUDY 4:
SENIOR ADVISOR TO THE VICE PRESIDENT OF A CENTRAL AMERICAN COUNTRY
PRIVATE SECTOR AND NON-PROFIT BOARD DIRECTOR

Client's Average Star Rating for Each Training Module: 9.5 out of 10

FROM THE CLIENT:

“I decided to subscribe to the Executive Cybersecurity Blueprint™ Training Suite because I am aware that cyber risks have increased as our digital activity increases. And I am clear that I do not know enough about those risks neither about the best solutions.

“As much as I wanted to improve my cyber security, I was concerned that the
training would consume a lot of my time, which like most people's, is scarce. After going through the training, I can say that not only is it not time consuming, but it is a very profitable time, which I am glad to have dedicated to strengthening my knowledge in this area and incorporating best practices.

“During the training, there was a moment of epiphany: I understood that my cyber security is as important as my personal security. And I also understood that the real firewall is me, rather than the devices and software that I use, or even my CTO. That is, implementing best practices, which certainly involves adopting the best technology but is highly driven by my behaviors, is the optimal way to protect my digital avatar.

“On the other hand, prior to going through the Blueprint training, I didn’t realize that (and certainly how much so) as a Board Member, I can be a liability and a source of cyber(in)security (at best) and cyber breach and harm (at worst) to the organization I’m on the Board of because of the organization’s confidential information I have access to. If I get breached and the confidential files get stolen, I’m a source of harm for the organization and for myself. If my digital security practices are not the best, I can compromise the security of those stakeholders.

“This Blueprint not only helped me rectify my own behaviors and practices but also gave me an entire Board strategy for creating a culture of cybersecurity in my organization (across all Board, executive and employee ranks). After the training, I was actually able to build a cybersecurity plan for my family and key stakeholders in my organization. I truly believe I became the standard bearer – an authentic example – of cyber-safe culture for myself, my family and my organization and am grateful that the Blueprint helped me develop a cybersecurity-driven culture in my organization and family, and allowed me to achieve this transformation despite being a non-technical person!

“The training instruction is communicated expertly and is excellent. The course is engaging and its format is suitable for people with limited time. The information is very clear and valuable.

“I really liked that the training is accompanied by citations that serve to validate the learning, and I loved the format structure and organization of information into digestible Modules that have a consistent structure across Modules, making information easy to understand, with every major subject treated separately in a concise and direct way. And the Executive Summaries of each Module are an extremely valuable material to have on hand and consult at any time.

Also, I believe that at least 60% of the information I learned in the Blueprint is genuinely something that I (not my CTO or even assistant) need to implement myself. And while Andrzej and the instructors made a very clear case as to why executives themselves need to go through this training themselves (and not outsource to a CISO, CTO or assistant), experiencing it myself proved to me that my time as a Board Director was indeed well-spent (and I know my CTO was grateful I spent it!). The instructors provided all the knowledge and tools necessary in the Blueprint to empower us as individuals on how to do it ourselves, and I really think I can handle it on my own now.

“Overall, when I purchased the Blueprint training, I didn’t really know what I bought... and found out that what I bought was superb!

“After the Blueprint training, I have implemented a series of measures that I learned thanks to Andrzej and the Executive Cybersecurity Blueprint™ team at Cyber Nation Central®, which make me feel safer in my online activity.

“I most definitely recommend the Executive Cybersecurity Blueprint™ to anyone who wants to strengthen their own cybersecurity and that of their family members, Board Directors, Executives, or other key stakeholders. This training really empowers executives to transform themselves and their teams into cybersecure-culture standard bearers for their families and organizations at a time when cybercrime is getting the best of all of us!”

- June L., Senior Advisor to Vice President of a Central American country; Board Director

THE STORY:

Cyber Nation Central was approached by...
June L.
Senior Advisor to VP of a Central American country
Private Sector & Non-Profit Board Director

ORIGINAL STATE: 

  • She was bringing her cyber(in)security to the Office of the Vice President of a nation & to her Boards
  • Like most Board Directors, she did not fully appreciate how much her cyber(in) security compromised the security of her stakeholders

TRANSFORMATION:

  • Realized her cybersecurity is as important as her physical security & the main firewall is her, not her CTO or tech
  • Rectified her own cyber behaviors & practices
  • ​Gained access to an entire Board strategy for creating a culture of cybersecurity in her orgs (across all Board, exec, & employee ranks)
  • Was able to develop a cybersecurity-driven culture & build a plan for her family & orgs' key stakeholders, & achieved this despite being a non-technical person!

TIMEFRAME:

8 hours of the Official's time

CASE STUDY 5:
SENIOR OFFICIAL, OFFICE OF THE UNITED NATIONS SECRETARY GENERAL
SENIOR ADVISOR TO THE UN SECRETARY GENERAL

Client's Average Star Rating for Each Training Module: 8.0 out of 10

FROM THE CLIENT:

“For many years now I have been concerned about my personal and professional cybersecurity, but that concern significantly increased in the last few years as my public and social media profiles increased. Concurrently, a member of my close family with the same name recently assumed a more

 prominent and visible role in their business, putting my personal and
professional data and information also at indirect risk. Consequently, I have been searching for an appropriate training product tailored to a senior leader, one that would provide both strategic and practical guidance. I am delighted with my choice of Cyber Nation Central®’s Executive Cybersecurity Blueprint™ and I strongly recommend it to any senior official or executive with my type of profile or situation.

“Getting into the details, there were several highlights of the programme, which I'd like to share with prospective applicants:

“Firstly, while I already had a reasonably good level of non-technical knowledge about cyber-security risks, the training was a deep-dive into several technical areas which I had previously never known or considered. Imagine becoming the Chief Executive of a non-Governmental organization or a senior Minister in Government and receiving a top-secret briefing of technical and behavioral tools you could use to defend against real and potential adversaries. That was this programme.

“Secondly, prior to the programme I was already taking a range of practical measures to protect my cyber-security, some of which you'll be familiar with (two factor authentication, using complex passwords, etc.). However, even in these known areas I realized I wasn't following best practices, nor was I using the latest recommended technology. For example, the cloud and passwords and authentication modules were extremely robust vis-à-vis my to-date knowledge and they taught me a great deal, as did the other modules. Following the training, I was able to address several of these gaps.

“Thirdly, the training structure itself was excellent. The instructor is an excellent communicator who breaks down complex subjects into easily understandable segments. The platform for delivering the materials was user friendly (combination of video, text and colour-briefing packets). Each module included quizzes and self-testing to ensure understanding.

“Finally, I thought the price was very reasonable, compared to the short- and long-term benefits. I left with a number of tangible ways to improve my cybersecurity and that of my immediate professional and personal circles (and therefore myself also).

“This Blueprint is exactly what I needed to prepare for my nation-wide political campaign from a 360° cybersecurity perspective. At ~6 hours of video (excluding its very helpful print protocols and other materials), the training truly left no area uncovered and no information that I wished it covered and it didn’t – it had everything that was needed to build a robust cybersecurity blueprint for any leader.

“Truly grateful to have continued access to this resource, especially during these uncertain times where cyber breaches abound!”

- Angela Z., Senior Official, Office of the United Nations Secretary General; Senior Advisor to the UN Secretary General

THE STORY:

Cyber Nation Central was approached by...
Angela Z.
Senior Official, Office of the United Nations Secretary General

ORIGINAL STATE: 

  • Had been concerned about her personal & professional cybersecurity for some time, especially as her public & social media profiles gained prominence
  • Concurrently, a member of her close family with the same name assumed a more prominent role in business, putting her personal & professional data & information at further indirect risk

TRANSFORMATION:

  • Mastered her self-focused cybersecurity, including general & executive risks, behavioral & technology best practices, & did so for all of her devices, social media, cloud technologies, passwords & authentication, & travel
  • Learned how to drive a culture of cybersecurity authentically in her organization and family

TIMEFRAME:

7 hours of the Official's time

Benefits and Outcomes

What you can expect when your Board & Executive Team subscribe to Executive Cybersecurity Blueprint™ is…

  • First, you’ll master executive-level-cybersecurity-threat detection for yourself and your family and you’ll know what cybersecure behavior really means so hackers cannot easily get to you or your family.
  • Second, you’ll get access to training that:
  • Brings you NSA expertise and offers your team 360° technology, behavioral, strategy, geopolitical, regulatory, and insurance cybersecurity training that covers your professional, personal, and family cybersecurity.
  • ​Helps you understand and optimize your roles as fiduciaries of your three organizations: (1) the Physical, (2) the increasingly Digital, (3) the Cybersecure.
  • ​Helps your Board integrate Corporate, Technology Innovation, and Regulatory Policy Strategy.
  • Third, you will finally know what it means to develop a culture of cybersecurity, how to do it, and you will actually have created it at a fraction of the price a top consulting firm would charge you yet still not deliver the outcome.
  • Fourth, your CISO will praise you daily because you’ll now be their partner and certainly not of an obstacle. 
  • Fifth, you’ll now attend Board meetings knowing fully what your cybersecurity strategy should be and how to consistently oversee its optimization.

Why Is This Offering Unique?

This is the ONLY Course In the Market That:

1. Covers 360° of Your Cybersecurity as an Executive AND Provides You With an Actual Blueprint for What Your Cybersecurity Should Look Like

This course takes a holistic approach to your cybersecurity, considering the entire cyber-profile across your organization, family, and personal life - known as your cyber avatar. It will cover every major component of your cyber avatar's digital security.
 
Furthermore, this is blueprint is practical and easily implementable. It teaches you how to safeguard every aspect of being an Executive, including the risks, best practices to mitigate them, which tech devices are our gadget winners, and how your improved, more cybersecure behaviors will protect yourself, your family, your Executive Team, and your Board Members.

2. Focuses on the Cybersecurity of Executives - Specifically that of Organizational Leaders, Executives as Private Citizens, and Families of Executives.

Executives face a more drastic, dangerous threat landscape in comparison to the average employee. They hold the Digital Crown Jewels of the company, and as the variety of tools with which hackers can attack you increases, so too does the Executive's risk. Despite this, current cybersecurity measures and overall Executive knowledge of best practices to avoid breaches and attacks hardly improved in the last decade. 

After a security breach, Executives are left frantically scouring the market for a job or position, having to shoulder the burden of an eroded brand and reputation, tremendous financial loss, or even death. It's the Executives themselves, not their CTOs, that are responsible for learning how to establish cybersecure cultures at their organizations AND their families.

3. Analyzes the Cybersecurity of Travel in Critical Detail

Our definition of travel goes deeper than ANY OTHER in the market. Rightly so as the cybersecurity risk of each is immense!
It includes:
  • Travel around the office: Even as you travel from one Wi-Fi access point to another, your travel exposes you to huge risks!
  • Travel around town: In elevators, chauffeured cars, restaurants, and hopping from meeting to meeting.
  • ​Domestic travel in your own country: Facing threats government & private sector turns a blind eye to.
  • ​Travel at airports, in airport lounges, on planes: For each, we consider "threat actors" spying on you - known & unknown.
  • ​International Travel to all countries- both allies and adversaries: Where your cybersecurity risks increase exponentially
  • ​To government buildings: Foreign or domestic each fraught with their own specific risks.
4. Analyzes Executives Cybersecurity through the Lenses of Geopolitics
Regardless of where you are- China, the US, or elsewhere, the geopolitical relationship between the nation you are in and your home country greatly affect your cybersecurity - in some cases that is the driving factor for a cyber attack!

Be it in Russia or America, this course provides you with a truly global lens through which you will learn to be cybersecure- no matter where you are from, where you live, or where you plan to travel.
5. Is For Executives By Executives
The realm of cybersecurity is often too overloaded with technical jargon that diminishes the crux of your best interests - securing your fiduciary and organizational responsibilities as an Executive. This blueprint will teach you how to eliminate risks while still maintaining a proper level of technical undertones, but simplifying necessary content to make sure you make the most of this course.

Having worked with the US Congress, governments around the world, and private sector organizations, we bring the highest levels of technical expertise. At the same time, we take a practitioner’s view of the knowledge and implement easy-to-follow lessons to teach you what you need to know to ensure you, your family, Executive Team, and Board Members are truly cyber secure.

6. Factors into the Cybersecurity of Board Members into YOUR Overall Risk, and Provides Tactical Strategies to Neutralize These Threats!

Board Members being organization outsiders with top-secret access to your organization's sensitive information present the biggest cybersecurity threat. They are rarely even subject to the same cyber security protocol that your average employees or even Executives face. Having been Chairman and CEO himself, Andrzej's firsthand expertise seeing internal cyber espionage allows him to specifically consider Board risks with keen accuracy to neutralize cybersecurity risks.

7. Is Anchored Around Executive-Specific Risk Analysis, NOT Just General Cybersecurity Risks

Each module of this course lays out general and Executive-specific risks and analyzes cyber threat landscapes pertinent to Executives. By paying close attention to what is outlined, you'll understand how to protect yourself from behaviors that may leave you jobless, financially insecure, in legal trouble, or worse.
8. Is Focused on the Tactics and Strategies That a Time-Strapped Executive Needs
This course offers seven critical-information-focused Modules, each less than 30 minutes long. They include the Best Practices of each area of your cybersecurity and Tech Device & Gadget Winners we strongly recommend, protecting your Cyber Avatar with 360° cybersecurity.