Get Training

The Certified Chief Information Security Officer (CCISO) program trains individuals who are looking to make the jump from middle management to the executive ranks by focusing on high-level management skills specifically needed for IS executives. From project to audit management, procurement and finance, to strategy and policy, students will be taught to steer complex security programs strategically and successfully. The CCISO program was created and is taught by sitting high-level information security executives from across industries, resulting in the most relevant, challenging, and applicable content on the market.

Course Outline

Domain 1

  • Definitions
  • Information Security Management Program
  • Information Security Laws, Regulations, & Guidelines
  • Privacy Laws

Domain 2

  • Design, Deploy, and Manage Security Controls in Alignment with Business Goals, Risk Tolerance, and Policies and Standards
  • Information Security Risk Assessment
  • Risk Treatment
  • Residual Risk
  • Risk Acceptance
  • Risk Management Feedback Loops
  • Business Goals
  • Risk Tolerance
  • Policies and Standards
  • Understanding Security Controls Types and Objectives
  • Implementing Control Assurance Frameworks
  • COBIT (Control Objectives for Information and Related Technology)
  • BAI06 Manage Changes
  • COBIT 4.1 vs. COBIT 5
  • ISO 27001/27002
  • Automate Controls
  • Understanding the Audit Management Process

Domain 3

  • The Role of the CISO
  • Information Security Projects
  • Security Operations Management

Domain 4

  • Access Controls
  • Physical Security
  • Disaster Recovery
  • Network Security
  • Threat and Vulnerability Management
  • Application Security
  • Systems Security
  • Encryption
  • Computer Forensics and Incident Response

Domain 5

  • Security Strategic Planning
  • Alignment with Business Goals and Risk Tolerance
  • Relationship between Security, Compliance, & Privacy
  • Leadership
  • Enterprise Information Security Architecture (EISA) Models, Frameworks, and Standards
  • Security Emerging Trends
  • It’s all about the Data
  • Key Performance Indicators (KPI)
  • Systems Certification and Accreditation Process
  • Resource Planning
  • Financial Planning
  • Procurement
  • Vendor Management
  • Request for Proposal (RFP) Process
  • Integrate Security Requirements into the Contractual Agreement and Procurement Process
  • Statement of Work
  • Service Level Agreements

Instructor Profiles

BurgessCooper1 - Training IndiaBurgess Cooper
Partner – E&Y Global

Trainer for Global Launch C|CISO Certification India
Burgess is a Partner in Advisory Services team with a focus on the Information & Cyber Security in India.

He has over 18 years of industry experience.

Burgess has completed his B.E. in Electronics and Telecommunications and M.B.A from Jamnalal Bajaj College of Management.

He holds the following certification: CISA, CISM, CGEIT, CISSP and CIPP.

Vishal trainer - Training IndiaVishal Jain
Partner, Ernst & Young Global Ltd

Mr. Vishal Jain, Partner at EY, joined EY in 2001 after completing his MBA in Telecom Management. During a career spanning more than 14 years, he has worked on various IT and Network security projects for Telecom giants across the globe.

He is presently leading Telecom and Technology Risk Advisory in India, Middle-East and Africa. He is a Certified Information System Security Professional (CISSP) and ISO 27001 Lead Implementer. He has wide range of experience in Telecom security, Data Privacy, Maturity Assessment & Benchmarking assessments for leading Telecom & Technology clients across the globe.

He is also the Privacy Leader for EY India. He is a Certified Information Privacy Professional (CIPP) and has led large Privacy engagements across sectors and was instrumental in setting up the Data Privacy services portfolio for EY India.

Dates: November 25th – 27th (Bengaluru)

Course Includes:

Official Courseware.

1 Complimentary Exam voucher

Certificate of Attendance

Lunch and coffee breaks throughout the duration of the training.

[krth_ctas cta_style=”style-one” cta_alignment=”cta-cnt-left”][krth_cta]

Get Training and become a CCISO!

[/krth_cta][krth_button button_size=”btn-large” button_text=”Sign Up Today” button_link=”https://ciso.eccouncil.org/contact/” open_link=”true” simple_hover=”” text_color=”#ffffff” text_hover_color=”#ffffff” css=”.vc_custom_1499851517509{margin-top: 10px !important;}”][/krth_ctas]