Webinars
Webinar: Building and Testing End User Training Programs

Building and Testing End User Training Programs Date: June 25, 2020 Click here to Watch Join Keyaan Williams, Founder and Managing Director of Cyber Leadership and Strategy Solutions, LLC (CLASS-LLC), to discuss how to build, test, and manage an end user training program to strengthen your overall security posture.

Read More
Webinar: Corporate Governance for CISOs: Leadership: Beyond Security Technology

Corporate Governance for CISOs: Leadership: Beyond Security Technology Date: June 1st, 2016 Click here to Watch Technical expertise is a critical component of security leadership; however, the modern CISO must possess a myriad of fundamental business to run a successful program. This session will focus on non-technical areas in which the CISCO should be competent[…]

Read More
Webinar: Corporate Governance for CISOs: Business Continuity Management

Corporate Governance for CISOs: Business Continuity Management Date: May 17th, 2016 Click here to Watch This session focuses on the most important concerns related to business continuity management. CISO isn’t always the leader of an organization’s business resilience efforts, but the CISO offers significant influence to ensure an effective program that support business impact analysis,[…]

Read More
Webinar: Corporate Governance for CISOs: Asset Management

Corporate Governance for CISOs: Asset Management Date: May 3rd, 2016 Register to Attend This session will focus on some fundamental concerns that an organization must address to support an effective information security program. How do you identify asset owners? What are examples of effective classification strategies? What type of inventory do you maintain to manage[…]

Read More

Are you Ready to be a CCISO?

Subscribe to the CISO Podcast

Listen on Apple Podcasts
Listen on Stitcher
Listen on Spotify
RSS Feed

CCISO Body of Knowledge

The EC-Council CCISO Body of Knowledge covers all five of the CCISO Information Security Management Domains in depth and was written by seasoned CISOs for current and aspiring CISOs.

Get your copy today

Featured Whitepaper