CCISO RESOURCES
Global CISO Forum Podcast Episode 3: Swimming with Sharks: Don’t be the Bait

In this Podcast: Host Amber Williams chats with Tom Bain of CounterTack about endpoint security, the Black Hat movie, and the future of security and Todd Bell of Intersec World Wide about the need for an MBA in the CISO role, swimming with the sharks, and turning the IS department into a profit center. Listen[…]

Read More
Global CISO Forum Podcast Episode 2: Should CISOs hit the road?

In this Podcast: This week, the Global CISO Forum Podcast interviews Keith Rayle, Principal at World Wide Technology and Ron Baklarz, CISO of Amtrak. Listen Download this Podcast

Read More
Global CISO Forum Podcast Episode 1: Information Security in 2015

In this Podcast: A conversation with Joe Voje, looking back at what the effects of a disastrous 2014 will be for 2015 in information security management and an interview with Dan Lohrmann of Security Mentor chronicling his career, his advice for aspiring CISOs, and his opinion on what 2015 might look like for the world[…]

Read More
Wargaming for Chief Information Security Officers

By: Nitin Kumar CMC, CCISO, CISSP, PMP, CGEIT Wargames can help forecast future scenarios holistically and help build a proactive strategy and a better reactive strategy.  

Read More
Shield Your Business – Combat Phishing Attacks

Fill this form out to receive your Shield Your Business – Combat Phishing Attacks Whitepaper.Name* First Last Email* Phone*Address* Street Address City State / Province / Region ZIP / Postal Code AfghanistanÅland IslandsAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarrussalamBulgariaBurkina FasoBurundiCambodiaCameroonCanadaCape VerdeCayman IslandsCentral African RepublicChadChileChinaChristmas IslandCocos IslandsColombiaComorosCongo, Democratic[...]

Read More
Ways to Lead a High-Performing Information Security Program

Fill this form out to receive your 10 Ways to Lead a High-Performing Information Security Program Whitepaper.Name* First Last Email* Phone*Address* Street Address City State / Province / Region ZIP / Postal Code AfghanistanÅland IslandsAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarrussalamBulgariaBurkina FasoBurundiCambodiaCameroonCanadaCape VerdeCayman IslandsCentral African RepublicChadChileChinaChristmas IslandCocos[...]

Read More
The High Price of “Faking” Your PCI Compliance Status

Fill this form out to receive your The High Price of “Faking” Your PCI Compliance Status Whitepaper.Name* First Last Email* Phone*Address* Street Address City State / Province / Region ZIP / Postal Code AfghanistanÅland IslandsAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarrussalamBulgariaBurkina FasoBurundiCambodiaCameroonCanadaCape VerdeCayman IslandsCentral African RepublicChadChileChinaChristmas IslandCocos[...]

Read More
Why Are So Many Companies Getting Hacked?

By: Todd Bell CCISO, CISSP, PMP, QSA, MPM, MBA Five years ago when Todd Bell worked as a Chief Information Security Officer (CISO) for a $2B corporation, he wanted to make a series of security enhancements after discovering a number of serious security vulnerabilities within his organization. Upon sharing the business benefits of why his[…]

Read More
Recent Security Breaches

Fill this form out to receive your Recent Security Breaches Whitepaper.Name* First Last Email* Phone*Address* Street Address City State / Province / Region ZIP / Postal Code AfghanistanÅland IslandsAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarrussalamBulgariaBurkina FasoBurundiCambodiaCameroonCanadaCape VerdeCayman IslandsCentral African RepublicChadChileChinaChristmas IslandCocos IslandsColombiaComorosCongo, Democratic Republic of theCongo, Republic[...]

Read More

Are you Ready to be a CCISO?

Subscribe to the CISO Podcast

CCISO Body of Knowledge

The EC-Council CCISO Body of Knowledge covers all five of the CCISO Information Security Management Domains in depth and was written by seasoned CISOs for current and aspiring CISOs.

Get your copy today

Featured Whitepaper