EC-Council CISO News
Apr 16, 2015
Global CISO Forum Podcast Episode 6: Back to Basics – A Simplified Approach to Designing, Building and Measuring Information Security Programs

In this Podcast: Host Amber Williams talks with Joe Voje, Principal at American Cyber Corps about the Whitehouse’s cybersecurity executive order. During the CCISO Exam Study Session, Joe walks listeners through a CCISO Exam question. Next, Amber interviews Joe Krull, Director at the Demin Group and keynote at the upcoming[…]

Read More
Feb 23, 2015
Global CISO Forum Podcast Episode 5: Is your Ego Stopping your Security?

In this Podcast: Host Amber Williams talks to Keith Rayle, Principal at World Wide Technology about the importance of strategic planning to a CISO’s success. Next, an interview with Ed Pascua, SVP of Simeio Solutions, about his career, insights into the challenges CISOs face, and more. Plus a new CCISO[…]

Read More
Feb 12, 2015
Global CISO Forum Podcast Episode 4: Business Side versus Technical Side: Balance – Not Animosity

In this Podcast: Host Amber Williams sits down with Keith Rayle, Principal at World Wide Technology to discuss the issue of Privacy inside and outside the US. Also, a discussion with the CISO of Cengage, Robert Hotaling, talks about how to balance the business side of the CISO’s job with[…]

Read More
Feb 03, 2015
Global CISO Forum Podcast Episode 3: Swimming with Sharks: Don’t be the Bait

In this Podcast: Host Amber Williams chats with Tom Bain of CounterTack about endpoint security, the Black Hat movie, and the future of security and Todd Bell of Intersec World Wide about the need for an MBA in the CISO role, swimming with the sharks, and turning the IS department[…]

Read More
Jan 27, 2015
Global CISO Forum Podcast Episode 2: Should CISOs hit the road?

In this Podcast: This week, the Global CISO Forum Podcast interviews Keith Rayle, Principal at World Wide Technology and Ron Baklarz, CISO of Amtrak. Listen Download this Podcast

Read More
Jan 20, 2015
Global CISO Forum Podcast Episode 1: Information Security in 2015

In this Podcast: A conversation with Joe Voje, looking back at what the effects of a disastrous 2014 will be for 2015 in information security management and an interview with Dan Lohrmann of Security Mentor chronicling his career, his advice for aspiring CISOs, and his opinion on what 2015 might[…]

Read More
May 19, 2014
Wargaming for Chief Information Security Officers

By: Nitin Kumar CMC, CCISO, CISSP, PMP, CGEIT Wargames can help forecast future scenarios holistically and help build a proactive strategy and a better reactive strategy.  

Read More
May 19, 2014
Shield Your Business – Combat Phishing Attacks

Fill this form out to receive your Shield Your Business – Combat Phishing Attacks Whitepaper.Name* First Last Email* Phone*Address* Street Address City State / Province / Region ZIP / Postal Code AfghanistanÅland IslandsAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarrussalamBulgariaBurkina FasoBurundiCambodiaCameroonCanadaCape VerdeCayman IslandsCentral[...]

Read More
May 19, 2014
Ways to Lead a High-Performing Information Security Program

Fill this form out to receive your 10 Ways to Lead a High-Performing Information Security Program Whitepaper.Name* First Last Email* Phone*Address* Street Address City State / Province / Region ZIP / Postal Code AfghanistanÅland IslandsAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarrussalamBulgariaBurkina FasoBurundiCambodiaCameroonCanadaCape[...]

Read More
May 19, 2014
The High Price of “Faking” Your PCI Compliance Status

Fill this form out to receive your The High Price of “Faking” Your PCI Compliance Status Whitepaper.Name* First Last Email* Phone*Address* Street Address City State / Province / Region ZIP / Postal Code AfghanistanÅland IslandsAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarrussalamBulgariaBurkina FasoBurundiCambodiaCameroonCanadaCape[...]

Read More
May 19, 2014
Why Are So Many Companies Getting Hacked?

By: Todd Bell CCISO, CISSP, PMP, QSA, MPM, MBA Five years ago when Todd Bell worked as a Chief Information Security Officer (CISO) for a $2B corporation, he wanted to make a series of security enhancements after discovering a number of serious security vulnerabilities within his organization. Upon sharing the[…]

Read More
May 19, 2014
Recent Security Breaches

Fill this form out to receive your Recent Security Breaches Whitepaper.Name* First Last Email* Phone*Address* Street Address City State / Province / Region ZIP / Postal Code AfghanistanÅland IslandsAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarrussalamBulgariaBurkina FasoBurundiCambodiaCameroonCanadaCape VerdeCayman IslandsCentral African RepublicChadChileChinaChristmas IslandCocos IslandsColombiaComorosCongo,[...]

Read More