Course Overview
The CCISO Certification is an industry-leading, security certification program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security. Bringing together all the components required for a C-Level position, the CCISO program combines audit management, governance, IS controls, human capital management, strategic program development, and the financial expertise vital to leading a highly successful information security program. The job of the CISO is far too important to be learned by trial and error. Executive-level management skills are not areas that should be learned on the job.
The material in the CCISO Program assumes a high-level understanding of technical topics and doesn’t spend much time on strictly technical information, but rather on the application of technical knowledge to an information security executive’s day-to-day work. The CCISO aims to bridge the gap between the executive management knowledge that CISOs need and the technical knowledge that many sitting and aspiring CISOs have. This can be a crucial gap as a practitioner endeavors to move from mid-management to upper, executive management roles. Much of this is traditionally learned as on the job training, but the CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.
Who should attend
This course is designed for the aspiring or sitting upper-level manager striving to advance his or her career by learning to apply their existing deep technical knowledge to business problems.
Outline: Certified Chief Information Security Officer (CCISO)
1 - DOMAIN 1 – Governance and Risk Management
- Define, Implement, Manage, and Maintain an Information Security Governance Program
- Information Security Drivers
- Laws/Regulations/Standards as drivers of Organizational Policy/Standards/Procedures
- Managing an enterprise information security compliance program
- Intro to Risk Management
DOMAIN 2 - Information Security Controls, Compliance, and Audit Management
- Information Security Controls
- Compliance Management
- Guidelines, Good and Best Practices
- Audit Management
DOMAIN 3 Security Program Management & Operations
- Program Management
- Operations Management
DOMAIN 4 Information Security Core Competencies
- Access Controls
- Physical Security
- Network Security
- Certified Chief
- Endpoint Protection
- Application Security
- Encryption Technologies
- Virtualization Security
- Cloud Computing Security
- Transformative Technologies
DOMAIN 5 Strategic Planning, Finance, Procurement and Vendor Management
- Strategic Planning
- Designing, Developing, and Maintaining an Enterprise Information Security Program
- Understanding the Enterprise Architecture (EA)
- Finance
- Procurement
- Vendor management