Get Training
The Certified Chief Information Security Officer (CCISO) program trains individuals who are looking to make the jump from middle management to the executive ranks by focusing on high-level management skills specifically needed for IS executives. From project to audit management, procurement and finance, to strategy and policy, students will be taught to steer complex security programs strategically and successfully. The CCISO program was created and is taught by sitting high-level information security executives from across industries, resulting in the most relevant, challenging, and applicable content on the market.Course Outline
Domain 1
- Definitions
- Information Security Management Program
- Information Security Laws, Regulations, & Guidelines
- Privacy Laws
Domain 2
- Design, Deploy, and Manage Security Controls in Alignment with Business Goals, Risk Tolerance, and Policies and Standards
- Information Security Risk Assessment
- Risk Treatment
- Residual Risk
- Risk Acceptance
- Risk Management Feedback Loops
- Business Goals
- Risk Tolerance
- Policies and Standards
- Understanding Security Controls Types and Objectives
- Implementing Control Assurance Frameworks
- COBIT (Control Objectives for Information and Related Technology)
- BAI06 Manage Changes
- COBIT 4.1 vs. COBIT 5
- ISO 27001/27002
- Automate Controls
- Understanding the Audit Management Process
Domain 3
- The Role of the CISO
- Information Security Projects
- Security Operations Management
Domain 4
- Access Controls
- Physical Security
- Disaster Recovery
- Network Security
- Threat and Vulnerability Management
- Application Security
- Systems Security
- Encryption
- Computer Forensics and Incident Response
Domain 5
- Security Strategic Planning
- Alignment with Business Goals and Risk Tolerance
- Relationship between Security, Compliance, & Privacy
- Leadership
- Enterprise Information Security Architecture (EISA) Models, Frameworks, and Standards
- Security Emerging Trends
- It’s all about the Data
- Key Performance Indicators (KPI)
- Systems Certification and Accreditation Process
- Resource Planning
- Financial Planning
- Procurement
- Vendor Management
- Request for Proposal (RFP) Process
- Integrate Security Requirements into the Contractual Agreement and Procurement Process
- Statement of Work
- Service Level Agreements
Instructor Profiles
Burgess Cooper
Partner – E&Y Global
Trainer for Global Launch C|CISO Certification India
Burgess is a Partner in Advisory Services team with a focus on the Information & Cyber Security in India.
He has over 18 years of industry experience.
Burgess has completed his B.E. in Electronics and Telecommunications and M.B.A from Jamnalal Bajaj College of Management.
He holds the following certification: CISA, CISM, CGEIT, CISSP and CIPP.
Vishal Jain
Partner, Ernst & Young Global Ltd
Mr. Vishal Jain, Partner at EY, joined EY in 2001 after completing his MBA in Telecom Management. During a career spanning more than 14 years, he has worked on various IT and Network security projects for Telecom giants across the globe.
He is presently leading Telecom and Technology Risk Advisory in India, Middle-East and Africa. He is a Certified Information System Security Professional (CISSP) and ISO 27001 Lead Implementer. He has wide range of experience in Telecom security, Data Privacy, Maturity Assessment & Benchmarking assessments for leading Telecom & Technology clients across the globe.
He is also the Privacy Leader for EY India. He is a Certified Information Privacy Professional (CIPP) and has led large Privacy engagements across sectors and was instrumental in setting up the Data Privacy services portfolio for EY India.
Dates: November 25th – 27th (Bengaluru)
Course Includes:
Official Courseware.
1 Complimentary Exam voucher
Certificate of Attendance
Lunch and coffee breaks throughout the duration of the training.