Contact Sales
Contact Sales
AI SKILLSMajor updates

LDR520: Emerging Trends for Cyber Leaders: AI and Cloud

LDR520Cybersecurity Leadership
  • 5 Days (Instructor-Led)
  • 30 Hours (Self-Paced)
Course authored by:
Jason Lam
Jason Lam
LDR520: Cloud Security for Leaders
Course authored by:
Jason Lam
Jason Lam
  • 30 CPEs

    Apply your credits to renew your certifications

  • In-Person, Virtual or Self-Paced

    Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months

  • Advanced Skill Level

    Course material is geared for cyber security professionals with hands-on experience

  • 13 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Drive enterprise resilience and innovation by shaping AI adoption strategy, modernizing cloud security foundations, and preparing for post-quantum disruption.

Course Overview

LDR520: Emerging Trends for Cyber Leaders: AI and Cloud empowers leaders to navigate the complex, interconnected risks of AI and cloud transformation. You will master AI security by establishing robust governance frameworks and building practical implementation roadmaps to defend against modern threats. The course then establishes a critical foundation in cloud security, covering everything from identity and infrastructure protection to advanced data operations and multicloud governance. Finally, you will look ahead to post-quantum cryptography and apply all learned concepts in a comprehensive, executive-level capstone exercise.

What You'll Learn

  • Build and defend the AI security business case
  • Identify and mitigate AI-specific vulnerabilities
  • Design and execute AI implementation roadmaps
  • Establish secure cloud foundations
  • Protect cloud data and operations
  • Prepare for post-quantum cryptographic transitions

Business Takeaways

  • Reduce AI security incidents and associated costs
  • Avoid regulatory penalties and insurance premium increases
  • Prevent catastrophic deepfake and AI-enhanced fraud losses
  • Future-proof cryptographic infrastructure
  • Accelerate secure cloud adoption
  • Enhance board-level strategic decision making

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in LDR520: Emerging Trends for Cyber Leaders: AI and Cloud.

Section 1AI Strategic Imperatives: Governance and Threat Assessment

This section builds the business case for AI security and establishes governance foundations through NIST AI RMF, EU AI Act, and ISO 42001. Practical governance structures and global regulatory perspectives lead into the Executive Playbook, equipping leaders with influence strategies, resistance management, and stakeholder communication for transformation.

Topics covered

  • AI business case, fundamentals, and Shadow AI risk
  • NIST AI RMF, EU AI Act, and ISO 42001 frameworks
  • Governance structures, oversight models, and third-party risk
  • Executive Playbook for influence and transformation
  • US, EU, and global regulatory strategy and emerging AI risks

Labs

  • Governance framework design and compliance mapping
  • Stakeholder mapping and resistance diagnostics
  • Governance communication and engagement strategy

Section 2AI Defense and Enterprise Implementation

This section shifts from governance to operational security across three pillars. Safety and Assurance covers bias detection with hands-on auditing. System Security explores OWASP LLM Top 10 vulnerabilities and adversarial attacks. Threat Landscape examines AI-enhanced attacks, while AI-Enabled Defense builds SOC capabilities and investment roadmaps.

Topics covered

  • Bias detection, fairness metrics, and oversight risks
  • OWASP LLM Top 10 and adversarial attack techniques
  • AI-powered phishing, deepfakes, and automated exploitation
  • MITRE ATLAS and AI-specific threat intelligence
  • AI-enabled SOC capabilities and investment strategy

Labs

  • Governance framework selection under pressure
  • Executive funding and influence strategy
  • International data architecture and regulatory trade-offs

Section 3Cloud Security Foundations, Identity, and Infrastructure

This section applies the 8-domain maturity framework to four foundational pillars: Identity and Access Management, Secure Infrastructure, Detection and Response, and Security Governance. Executives learn to assess organizational maturity, prioritize security investment, and lead transformation across the domains that define cloud security posture.

Topics covered

  • Identity and access management strategy
  • Secure infrastructure, configuration, and architecture
  • Detection, response, and security analytics
  • Cloud security governance and cost management
  • Maturity assessment and investment prioritization

Labs

  • IAM privilege and credential strategy trade-offs
  • Infrastructure drift resolution under pressure
  • Detection and response investment decisions

Section 4Cloud Data Protection, Operations, and Governance

This section completes the maturity framework across four remaining domains: Data Protection, Workload and Application Security, Security Assurance, and Workforce Transformation. A dedicated SaaS operational security module closes the course, equipping leaders to govern the fastest-growing and least-controlled segment of cloud adoption.

Topics covered

  • Data protection: encryption, classification, resilience
  • Workload and DevSecOps security
  • Security assurance and compliance validation
  • Workforce transformation and operating models
  • SaaS operational security governance

Labs

  • Cross-region data protection trade-offs
  • Application security vs. business scale decisions
  • Assurance investment prioritization

Section 5Post Quantum Crypto and Capstone Exercise

This section addresses the modern crypto transition to post-quantum security management, a critical future-proofing strategy. It culminates in a capstone exercise where students apply all concepts and skills learned throughout the course in a practical, executive-level scenario.

Topics covered

  • Post-quantum threats and cryptographic risk
  • Crypto inventory and agility strategy
  • Post-quantum migration planning

Labs

  • Executive-Level capstone exercise
  • Security strategy development presentation

Things You Need To Know

Relevant Job Roles

Cloud Security Manager

Cloud Security

Developing cloud security roadmaps, plans and procurement models to mature cloud security.

Explore learning path

Secure Project Management (OPM 802)

NICE: Oversight and Governance

Responsible for overseeing and directly managing technology projects. Ensures cybersecurity is built into projects to protect the organization’s critical infrastructure and assets, reduce risk, and meet organizational goals. Tracks and communicates project status and demonstrates project value to the organization.

Explore learning path

Systems Security Management (OPM 722)

NICE: Oversight and Governance

Responsible for managing the cybersecurity of a program, organization, system, or enclave.

Explore learning path

Senior Security Leader

Cybersecurity Leadership

Daily focus is on the oversight of technical teams while aligning them to overall business strategies. Includes titles such as Technical Director, Information Security Officer, and CISO.

Explore learning path

Cloud Security Architect Training, Salary, and Career Path

Cloud Security

Designs and secures the defensive architecture of secure cloud environments.

Explore learning path

Leadership

SCyWF: Leadership And Workforce Development

This role conducts supervises, manages and leads cybersecurity teams and work. Find the SANS courses that map to the Leadership SCyWF Work Role.

Explore learning path

Program Management (OPM 801)

NICE: Oversight and Governance

Responsible for leading, coordinating, and the overall success of a defined program. Includes communicating about the program and ensuring alignment with agency or organizational  priorities.

Explore learning path

Chief Information Security Officers Training, Salary, and Career Path

European Cybersecurity Skills Framework

Chief Information Security Officers lead cybersecurity initiatives, aligning strategic vision with operational execution, fostering a resilient security culture, and proactively managing risks to safeguard organisational assets and reputation.

Explore learning path

Course Schedule and Pricing

Have Questions?Contact Us
  • Location & instructor

    Virtual (OnDemand)

    Instructed by
    Date & Time
    OnDemand (Anytime)Self-Paced, 4 months access
    Course price
    $8,260 USD*Prices exclude applicable local taxesBuy now for access on Mar 26. Use code Presale10 for 10% off course price!
    Registration Options
  • Location & instructor

    SANS Cybersecurity Leadership Summit & Training 2026

    Arlington, VA, US & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    SANS Live Online Europe April 2026

    Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..
    Course price
    €7,715 EUR*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    SANS Chicago 2026

    Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    SANS Virginia Beach 2026

    Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    SANS Amsterdam October 2026

    Amsterdam, NL & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..
    Course price
    €7,715 EUR*Prices exclude applicable local taxes
    Registration Options
Showing 6 of 6

Benefits of Learning with SANS

Bryan Simon: Teacher Standing Next to Smartboard and Explaining Concept

Get feedback from the world’s best cybersecurity experts and instructors

OnDemand Mobile App

Choose how you want to learn - online, on demand, or at our live in-person training events

Close Up of Woman Holding a Pen and Documents

Get access to our range of industry-leading courses and resources