EC-Council CISO News
July 8, 2016
Creating a Secure Computer User

Fill this form out to receive your Creating a Secure Computer User Whitepaper.Name* First Last Email* Phone*Address* Street Address City State / Province / Region ZIP / Postal Code AfghanistanAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarussalamBulgariaBurkina FasoBurundiCambodiaCameroonCanadaCape VerdeCayman IslandsCentral African RepublicChadChileChinaChristmas IslandCocos[...]

Read More
June 9, 2016
SYSTEX hosts first ever EC-Council Certified Chief Information Security Officer (CCISO) training in Taipei, Taiwan taught by CISO of San Francisco

Taipei, TAIWAN – March 28th 2016 EC-Council collaborated with SYSTEX to create the next generation of Information Security Leaders by introducing their globally renowned Certified Chief Information Security Officer Certification (CCISO) training to Taiwan for the first time. The 5-day training program has revolutionized information security leadership training in other[…]

Read More
June 7, 2016
Tech Fetch

IT and tech jobseekers post resumes for free on TAG’s job board. Click candidate tab at to post. The TAG-TechFetch co-branded job board will connect you to over 400 tech recruiters and representatives from tech enabled companies located in Georgia. Choose TAG’s job board for your career search and[…]

Read More
May 24, 2016
ISSA Connecticut

As Connecticut’s preeminent community of IT Security professionals, ISSA-CT connects local cyber security professionals with unique networking opportunities. We also serve as a platform for professional development — for those willing to volunteer organizing chapter activities. Finally, we’re a resource to national events, through our parent organization Information Systems Security[…]

Read More
May 20, 2016
Webinar: Corporate Governance for CISOs: Leadership: Beyond Security Technology

Corporate Governance for CISOs: Leadership: Beyond Security Technology Date: June 1st, 2016 Click here to Watch Technical expertise is a critical component of security leadership; however, the modern CISO must possess a myriad of fundamental business to run a successful program. This session will focus on non-technical areas in which[…]

Read More
May 16, 2016

Chiron’s Pyramid Capture the Flag (CTF) competition has a different perspective from most CTFs you’ll find at conferences and on-line events. The Pyramid is an individually played CTF within a contained virtual network by using either the (very) limited laptops provided or your own laptops (not designed for team play).[…]

Read More
May 15, 2016
Webinar: Corporate Governance for CISOs: Business Continuity Management

Corporate Governance for CISOs: Business Continuity Management Date: May 17th, 2016 Click here to Watch This session focuses on the most important concerns related to business continuity management. CISO isn’t always the leader of an organization’s business resilience efforts, but the CISO offers significant influence to ensure an effective program[…]

Read More
May 13, 2016
National Cybersecurity Student Association

The National Cybersecurity Student Association is a one-stop-shop to enhance the educational and professional development of cybersecurity students through activities, networking and collaboration. This group supports the cybersecurity educational programs of academic institution, inspires career awareness and encourages creative efforts to increase the number of underrepresented populations in the field.[…]

Read More
May 2, 2016
Webinar: Corporate Governance for CISOs: Asset Management

Corporate Governance for CISOs: Asset Management Date: May 3rd, 2016 Register to Attend This session will focus on some fundamental concerns that an organization must address to support an effective information security program. How do you identify asset owners? What are examples of effective classification strategies? What type of inventory[…]

Read More
April 1, 2016
CCISO Program wraps-up successful Washington DC area class

The Certified CISO Program, EC-Council’s executive information security management course, has seen resounding success around the US, presenting four classes in four cities in 2016. Keyaan Williams, EC-Council CCISO Senior Executive, has seen incredible learning take place in these executive classrooms. Feedback from students in the class include mentions of[…]

Read More
February 11, 2016
Conclusive evidence that the CISO should be reporting to the CEO

At past EC-Council Foundation Global CISO Forums and CISO Summits, panels of information security executives have discussed the debate in the industry regarding the proper hierarchical placement of the CISO. The debate is typically framed as being a choice between the CISO reporting to the CIO or to the CEO.[…]

Read More
February 10, 2016
A CISO in the White House – Good News for Security

It’s been widely reported that the White House is expected to hire a CISO to oversee the information security of all federal agencies. In the wake of several high-profile breaches of important federal agencies over the last three years, the Obama administration is looking to fill the CISO position to[…]

Read More
February 9, 2016
Small Businesses, Ransomware, and Your Risk Assessment

An interesting article was published in The Guardian this week detailing the rise of ransomware attacks targeted at small businesses. Small and medium enterprises (SMEs) are enticing targets for ransomware attacks because they typically have fewer security controls in place and are unable to defend against an attack and may[…]

Read More
January 29, 2016
From Manager to C-Level Executive: Here’s what it takes

For many professionals in information security, there comes a time when the promotions stop coming at a predictable pace. For most, this happens at the upper end of middle management. This is the point when simple technical competence is no longer enough to earn the next bump in pay. Something[…]

Read More
September 4, 2015

Not All Network Security is Created Equal Cyber Security Solutions Tailored for Small to Mid-sized Businesses Ensuring data security and regulatory compliance means protecting your small to mid-sized business from the increasing threat of a cyber-attack with cost effective enterprise-class solutions. Protection of critical business networks requires specific cyber security[…]

Read More
August 20, 2015

Gemalto Brings Trust to Every Day Services SafeNet and Gemalto have recently joined forces to create the worldwide leader in enterprise and banking security from core data protection to secure access at the edge of the network. Together, we protect more data, transactions, and identities than any other company, delivering[…]

Read More
August 19, 2015

  CounterTack | MCSI is the leading provider of real-time, Big Data endpoint detection and response technology for the enterprise. CounterTack | MCSI provides unprecedented visibility and context around operating system and binary behaviors to detect zero-day attacks, rootkits, targeted malware and advanced persistent threats, enabling our customers to improve[…]

Read More
August 10, 2015
Global CISO Forum Podcast Episode 9: How would you do your job differently if you knew you would be breached?

In this Podcast: On this episode, host Amber Williams sits down with Gary Miglicco, ePlus’ Security Director, to talk about defending perimeters, asset classification, and Gary’s career path. Next, Keith Rayle, Principal at WWT, discusses some infosec current events before the CCISO Study Session. Listen Download this Podcast

Read More