This curriculum spans the technical, procedural, and coordination challenges seen in multi-workshop security programs across global enterprises, reflecting the sustained effort required to align governance, development, cloud operations, and third-party risk management with real-world organisational constraints and cross-functional workflows.
Module 1: Security Governance and Risk Assessment Frameworks
- Establishing board-level risk appetite statements that align with regulatory obligations in multi-jurisdictional operations.
- Selecting and tailoring ISO 27001 or NIST CSF controls based on organizational maturity and audit readiness requirements.
- Conducting third-party risk assessments for cloud service providers with shared responsibility model implications.
- Defining escalation paths for high-severity vulnerabilities that intersect legal, compliance, and technical teams.
- Integrating threat modeling outputs into annual risk assessment cycles for infrastructure and application portfolios.
- Managing scope conflicts between internal audit mandates and operational security team priorities during control validation.
Module 2: Identity and Access Management at Scale
- Implementing just-in-time (JIT) privilege elevation in hybrid environments with legacy system dependencies.
- Negotiating access review cycles with business unit owners who resist frequent recertification demands.
- Designing role-based access control (RBAC) hierarchies that minimize role explosion while preserving segregation of duties.
- Integrating identity providers across M&A-acquired entities with conflicting directory schemas and authentication protocols.
- Enforcing conditional access policies for remote contractors without disrupting productivity toolchains.
- Handling orphaned service accounts during application decommissioning in regulated environments with audit trail requirements.
Module 3: Secure Software Development Lifecycle Integration
- Embedding SAST/DAST tooling into CI/CD pipelines without introducing unacceptable build latency.
- Defining severity thresholds for static analysis findings that trigger pipeline breaks versus warnings.
- Managing false positive triage workflows with development teams under release pressure.
- Requiring threat modeling documentation for new features without creating bottlenecks in agile sprints.
- Enforcing third-party library vetting processes for open-source components with known CVE exposure.
- Coordinating security gate approvals across application owners, architects, and release managers during critical deployments.
Module 4: Cloud Security Architecture and Configuration
- Designing network segmentation in AWS VPCs or Azure VNets that balance micro-segmentation benefits with operational overhead.
- Enforcing encryption of data at rest across managed services where customer-managed keys introduce availability risks.
- Monitoring configuration drift in Infrastructure-as-Code templates using drift detection tools and policy-as-code engines.
- Responding to public storage bucket exposure incidents caused by developer misconfigurations in pre-production environments.
- Implementing centralized logging and monitoring for multi-cloud workloads with inconsistent native logging formats.
- Negotiating security control ownership between cloud platform teams and application teams in shared service models.
Module 5: Incident Response and Threat Intelligence Operations
- Activating incident response playbooks for ransomware events while preserving forensic integrity across virtualized environments.
- Coordinating communication between legal, PR, and technical teams during breach disclosure timelines governed by GDPR or CCPA.
- Validating threat intelligence feeds against internal telemetry to reduce alert fatigue from false correlations.
- Conducting tabletop exercises that reflect actual adversary tactics observed in the organization’s sector.
- Managing containment actions that may disrupt critical business operations during active compromise investigations.
- Documenting incident root causes in a format usable for both technical remediation and executive reporting.
Module 6: Data Protection and Privacy Engineering
- Implementing data classification schemas that are enforceable through automated tagging and policy enforcement.
- Designing tokenization or masking strategies for production data used in non-production environments.
- Mapping personal data flows across systems to support data subject access request (DSAR) fulfillment under tight SLAs.
- Enforcing data retention policies in distributed databases where deletion must comply with legal hold requirements.
- Integrating data loss prevention (DLP) tools with collaboration platforms without blocking legitimate business communication.
- Assessing privacy risks in AI/ML models trained on datasets containing personally identifiable information.
Module 7: Security Automation and Orchestration
- Developing SOAR runbooks for phishing containment that account for email platform API rate limits and mailbox access permissions.
- Validating automated remediation actions (e.g., host isolation) against potential impact on high-availability systems.
- Integrating vulnerability scanner outputs with ticketing systems using bi-directional status synchronization to prevent stale tickets.
- Managing credential storage and rotation for automation scripts that access security and IT management APIs.
- Designing escalation paths for automated alerts that fail to resolve within defined time thresholds.
- Measuring automation efficacy through mean time to detect (MTTD) and mean time to respond (MTTR) metrics across incident types.
Module 8: Third-Party and Supply Chain Risk Management
- Conducting technical security assessments of software vendors during procurement without access to source code or architecture diagrams.
- Enforcing contractual security requirements for subcontractors used by primary vendors in managed service arrangements.
- Monitoring software bill of materials (SBOM) disclosures for critical applications following Log4j-style vulnerabilities.
- Responding to third-party breaches that impact shared customer data while maintaining business continuity.
- Validating security control implementation in offshore development centers through remote assessment techniques.
- Managing patch deployment timelines for vulnerabilities in commercial off-the-shelf (COTS) software with vendor support dependencies.