Fill this form out to receive your Creating a Secure Computer User Whitepaper.Name* First Last Email* Phone*Address* Street Address City State / Province / Region ZIP / Postal Code AfghanistanAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarussalamBulgariaBurkina FasoBurundiCambodiaCameroonCanadaCape VerdeCayman IslandsCentral African RepublicChadChileChinaChristmas IslandCocos IslandsColombiaComorosCongo, Democratic Republic of theCongo,[...]
Read MoreTaipei, TAIWAN – March 28th 2016 EC-Council collaborated with SYSTEX to create the next generation of Information Security Leaders by introducing their globally renowned Certified Chief Information Security Officer Certification (CCISO) training to Taiwan for the first time. The 5-day training program has revolutionized information security leadership training in other markets and is poised to[…]
Read MoreListen Download this Podcast
Read MoreCorporate Governance for CISOs: Leadership: Beyond Security Technology Date: June 1st, 2016 Click here to Watch Technical expertise is a critical component of security leadership; however, the modern CISO must possess a myriad of fundamental business to run a successful program. This session will focus on non-technical areas in which the CISCO should be competent[…]
Read MoreCorporate Governance for CISOs: Business Continuity Management Date: May 17th, 2016 Click here to Watch This session focuses on the most important concerns related to business continuity management. CISO isn’t always the leader of an organization’s business resilience efforts, but the CISO offers significant influence to ensure an effective program that support business impact analysis,[…]
Read MoreListen Download this Podcast
Read MoreCorporate Governance for CISOs: Asset Management Date: May 3rd, 2016 Register to Attend This session will focus on some fundamental concerns that an organization must address to support an effective information security program. How do you identify asset owners? What are examples of effective classification strategies? What type of inventory do you maintain to manage[…]
Read MoreThe Certified CISO Program, EC-Council’s executive information security management course, has seen resounding success around the US, presenting four classes in four cities in 2016. Keyaan Williams, EC-Council CCISO Senior Executive, has seen incredible learning take place in these executive classrooms. Feedback from students in the class include mentions of how the CCISO program will[…]
Read MoreAt past EC-Council Foundation Global CISO Forums and CISO Summits, panels of information security executives have discussed the debate in the industry regarding the proper hierarchical placement of the CISO. The debate is typically framed as being a choice between the CISO reporting to the CIO or to the CEO. CIO.com recently published an article[…]
Read MoreIt’s been widely reported that the White House is expected to hire a CISO to oversee the information security of all federal agencies. In the wake of several high-profile breaches of important federal agencies over the last three years, the Obama administration is looking to fill the CISO position to help coordinate security across agencies.[…]
Read MoreThe EC-Council CCISO Body of Knowledge covers all five of the CCISO Information Security Management Domains in depth and was written by seasoned CISOs for current and aspiring CISOs.
Get your copy today