Global CISO Forum
GCF Agenda
CISO Awards
Global CISO Forum Sponsorship
Certification Training
Certified Chief Information Security Officer (CCISO)
The CCISO program trains individuals who are looking to make the jump from middle management to the executive ranks by focusing on high-level management skills specifically needed for IS executives. From project to audit management, procurement and finance, to strategy and policy, students will be taught to steer complex security programs strategically and successfully. The CCISO program was created and is taught by sitting high-level information security executives from across industries, resulting in the most relevant, challenging, and applicable content on the market.
  • + -

    About the Instructor

    Joe Voje currently serves as the Chief Information Security Officer for The University of Texas –Pan American, where he is developing an Information Security program and Privacy practice for one of the nation’s largest Hispanic serving institutions of higher education.

    As former Naval Officer, Mr. Voje, served in many roles related to cyber security and information assurance for the U.S. Navy. He has previously served as the Information Systems Director for the U.S. Navy’s only forward deployed air wing in Atsugi, Japan; the Information Assurance Officer for the Commander of the U.S. Pacific Fleet in Pearl Harbor, Hawaii; the Information Assurance Manager for Carrier Strike Group Nine home ported out of Everett, Washington; and the Executive Officer of the U.S. Naval Computer and Telecommunication Station Bahrain.

    Outside of the military, he has led the Information Security programs for a large west coast financial institution, Washington State’s second largest public utility district, and consulted for the Federal Government in addition to intellectual property and law firms through his consulting company American Cyber Corps.

    Mr. Voje holds a Masters degree in Network Security and is a Certified Information Systems Security Professional (CISSP), an Information Systems Security Engineering Professional (ISSEP), a Certified Ethical Hacker (C|EH), and Cisco Certified Network Associate (CCNA) with Security endorsement.


Dates: October 12th – 15th, 2014

Register and pay by August 31, 2014: $2,499
Register and pay After August 31, 2014: $2,899

Class Capacity: 25

Course Includes:

Official Courseware.
1 Complimentary Exam voucher
Certificate of Attendance
Complimentary Pass to Hacker Halted conference.
Lunch and coffee breaks throughout the duration of the training.


  • + -

    Domain 1: Governance (Policy, Legal & Compliance)

    • Definitions
    • Information Security Management Program
    • Information Security Laws, Regulations, & Guidelines
    • Privacy Laws
  • + -

    Domain 2: IS Management Controls and Auditing Management

    • Design, Deploy, and Manage Security Controls in Alignment with Business Goals, Risk Tolerance, and Policies and Standards
    • Information Security Risk Assessment
    • Risk Treatment
    • Residual Risk
    • Risk Acceptance
    • Risk Management Feedback Loops
    • Business Goals
    • Risk Tolerance
    • Policies and Standards
    • Understanding Security Controls Types and Objectives
    • Implementing Control Assurance Frameworks
    • COBIT (Control Objectives for Information and Related Technology)
    • BAI06 Manage Changes
    • COBIT 4.1 vs. COBIT 5
    • ISO 27001/27002
    • Automate Controls
    • Understanding the Audit Management Process
  • + -

    Domain 3: Management – Projects and Operations (Projects, Technology & Operations)

    • The Role of the CISO
    • Information Security Projects
    • Security Operations Management
  • + -

    Domain 4: Information Security Core Competencies

    • Access Controls
    • Physical Security
    • Disaster Recovery
    • Network Security
    • Threat and Vulnerability Management
    • Application Security
    • Systems Security
    • Encryption
    • Computer Forensics and Incident Response
  • + -

    Domain 5: Strategic Planning & Finance.

    • Security Strategic Planning
    • Alignment with Business Goals and Risk Tolerance
    • Relationship between Security, Compliance, & Privacy
    • Leadership
    • Enterprise Information Security Architecture (EISA) Models, Frameworks, and Standards
    • Security Emerging Trends
    • It’s all about the Data
    • Key Performance Indicators (KPI)
    • Systems Certification and Accreditation Process
    • Resource Planning
    • Financial Planning
    • Procurement
    • Vendor Management
    • Request for Proposal (RFP) Process
    • Integrate Security Requirements into the Contractual Agreement and Procurement Process
    • Statement of Work
    • Service Level Agreements
Domain Steps
Sign Up Today
Learn More