Course Detail

Chief Security Officer Duration: 1 Week/s

Course Information

  • Course Price £4895 Plus VAT
  • Location UK Courses
  • Course Code CSO
  • Course Date 17 Aug - 21 Aug 2026

Course Objectives
The role of the Chief Security Officer (CSO) has evolved dramatically.
No longer focused only on guards, gates, and gadgets, today’s CSO must integrate digital, physical, and organisational security into a coherent strategy that protects critical assets, safeguards people, and enables the business to innovate with confidence.
Cyber threats, ransomware, data breaches, violent incidents, geopolitical risks, insider threats, and supply chain vulnerabilities now intersect in complex ways.

Boards, regulators, customers, and employees expect security leaders to anticipate these risks, respond effectively to incidents, and build resilient organisations.
At the same time, heavy-handed security practices can frustrate users, slow transformation, and undermine trust if not designed with culture and operations in mind.
This intensive 5-day programme is designed for CSOs and senior security leaders who want to build a security-aware culture and drive security transformation across digital, physical, and organisational domains.

It positions security as a strategic enabler, not just a cost centre or compliance obligation.
Through case studies, simulations, and structured exercises, delegates will learn how to align security with business objectives, design integrated governance, engage stakeholders, shape behaviour, and lead programmes that measurably strengthen security posture and resilience.
Participants will leave with a practical Security Culture and Transformation Action Plan tailored to their organisation’s risk profile, maturity, and strategic ambitions.


Who should attend?
Senior leaders overseeing integrated security functions that span cyber, information, physical, and personnel security. Chief Information Security Officers, Heads of Cyber Security, and information security managers supporting digital transformation and data protection. Heads of physical security, facilities, health and safety, and operational risk in complex environments such as campuses, critical infrastructure, and industrial sites. Leaders responsible for protecting people, premises, and assets in conjunction with digital security controls. Chief Risk Officers, compliance leaders, and business continuity managers integrating security into enterprise risk management and resilience planning. Security and risk leaders in government, defence, energy, transport, healthcare, financial services, and other regulated sectors. Security, cyber, and risk managers identified as future leaders who want to develop the strategic and cultural dimensions of the CSO role. Individuals stepping into roles with broader responsibility for security governance, culture, and transformation programmes.



Course Overview

The Modern CSO and the Strategic Security Agenda

  • Delegates will explore the evolving role of the CSO and how security contributes to strategy, digital transformation, and stakeholder trust.

  • Participants will examine major threat trends and case examples where security leadership has made a critical difference.

  • They will clarify expectations from boards, regulators, customers, and staff regarding security leadership and culture.

  • Security Governance, Risk, and Alignment with Business Objectives
  • Delegates will review governance models for security, including committees, reporting lines, and integration with risk and audit.

  • Participants will examine how to define risk appetite, prioritise security investments, and align controls with critical business processes.

  • They will learn how to present security risks and proposals in board- and executive-friendly language.

  • Building a Security-Aware Culture and Influencing Behaviour
  • Delegates will explore the behavioural and cultural drivers of security, including attitudes, norms, and everyday practices.

  • Participants will review methods for assessing security culture and identifying root causes of insecure behaviours.

  • They will learn how to design awareness, training, and engagement initiatives that move beyond compliance to genuine behaviour change.

  • Digital and Cyber Security for Senior Leaders
  • Delegates will review key concepts in cyber and information security, including identity and access management, network security, data protection, and cloud risks.

  • Participants will examine high-impact cyber threats such as ransomware, phishing, and insider misuse, and their business implications.

  • They will learn the questions leaders should ask about digital security controls, incident readiness, and third-party dependencies.

  • Physical Security, Insider Threat, and Converged Security Operations
  • Delegates will examine physical security risks including unauthorised access, workplace violence, theft, and disruption of critical operations.

  • Participants will explore insider threat scenarios where human, physical, and digital vulnerabilities intersect.

  • They will review approaches to converged security operations centres (SOCs) and integrated monitoring across digital and physical domains.

  • Incident Response, Crisis Management, and Organisational Resilience
  • Delegates will explore frameworks for incident response and crisis management that integrate security, IT, communications, and leadership roles.

  • Participants will examine case examples of major incidents, focusing on preparation, decision-making, and communication under pressure.

  • They will learn how to conduct post-incident reviews that support recovery, learning, and long-term resilience.

  • Third-Party, Supply Chain, and Ecosystem Security
  • Delegates will review risks arising from suppliers, partners, managed service providers, and other third parties.

  • Participants will examine practical approaches to assessing, monitoring, and improving third-party security posture.

  • They will consider contractual, governance, and relationship levers for strengthening security across the extended enterprise.

  • Road Mapping Security Transformation and Measuring Impact
  • Delegates will bring together programme insights to design a security culture and transformation roadmap over the next 12–24 months.

  • Participants will explore maturity models, metrics, and dashboards that demonstrate progress and support leadership decisions.

  • They will leave with a personal Security Culture and Transformation Action Plan and a 90-day implementation focus.


  • Course Materials

    Course notes, handouts