EC-Council CISO News
Women’s Society of Cyberjustsu

Women’s Society of Cyberjutsu (WSC), is a 501(c)3 organization serving hundreds of women across the globe by bringing an awareness towards the lack of women in science, technology, engineering, and mathematics (STEM) careers, more specifically cyber security. Our mission is to advance women and girls in cyber security by providing[…]

Read More
Global CISO Forum Podcast Episode 7: Get Down To The Guts of The Business

In this Podcast: Host Amber Williams talks to Joe Voje, CSO of American Cyber Corps, for the CCISO Exam Study Question. Next, an interview with Chuck McGann, Chief Cyber Strategist at CRGT, covering his career, his time working for the US Postal Service, and his upcoming talk at the EC-Council[…]

Read More
ePlus

ePlus engineers transformative security solutions for the most visionary organizations in the world. Through our security architects, engineers, and consultants, we see our clients’ horizons and craft sustainable IT roadmaps to get them there. Then we make it happen. This takes imagination, relentless client service, and the tenacity to enable[…]

Read More
Global CISO Forum Podcast Episode 6: Back to Basics – A Simplified Approach to Designing, Building and Measuring Information Security Programs

In this Podcast: Host Amber Williams talks with Joe Voje, Principal at American Cyber Corps about the Whitehouse’s cybersecurity executive order. During the CCISO Exam Study Session, Joe walks listeners through a CCISO Exam question. Next, Amber interviews Joe Krull, Director at the Demin Group and keynote at the upcoming[…]

Read More
Global CISO Forum Podcast Episode 5: Is your Ego Stopping your Security?

In this Podcast: Host Amber Williams talks to Keith Rayle, Principal at World Wide Technology about the importance of strategic planning to a CISO’s success. Next, an interview with Ed Pascua, SVP of Simeio Solutions, about his career, insights into the challenges CISOs face, and more. Plus a new CCISO[…]

Read More
Global CISO Forum Podcast Episode 4: Business Side versus Technical Side: Balance – Not Animosity

In this Podcast: Host Amber Williams sits down with Keith Rayle, Principal at World Wide Technology to discuss the issue of Privacy inside and outside the US. Also, a discussion with the CISO of Cengage, Robert Hotaling, talks about how to balance the business side of the CISO’s job with[…]

Read More
Global CISO Forum Podcast Episode 3: Swimming with Sharks: Don’t be the Bait

In this Podcast: Host Amber Williams chats with Tom Bain of CounterTack about endpoint security, the Black Hat movie, and the future of security and Todd Bell of Intersec World Wide about the need for an MBA in the CISO role, swimming with the sharks, and turning the IS department[…]

Read More
Global CISO Forum Podcast Episode 2: Should CISOs hit the road?

In this Podcast: This week, the Global CISO Forum Podcast interviews Keith Rayle, Principal at World Wide Technology and Ron Baklarz, CISO of Amtrak.   Listen Download this Podcast

Read More
Global CISO Forum Podcast Episode 1: Information Security in 2015

In this Podcast: A conversation with Joe Voje, looking back at what the effects of a disastrous 2014 will be for 2015 in information security management and an interview with Dan Lohrmann of Security Mentor chronicling his career, his advice for aspiring CISOs, and his opinion on what 2015 might[…]

Read More
Wargaming for Chief Information Security Officers

By: Nitin Kumar CMC, CCISO, CISSP, PMP, CGEIT Wargames can help forecast future scenarios holistically and help build a proactive strategy and a better reactive strategy.  

Read More
Shield Your Business – Combat Phishing Attacks

Fill this form out to receive your Shield Your Business – Combat Phishing Attacks Whitepaper.Name* First Last Email* Phone*Address* AfghanistanAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarussalamBulgariaBurkina FasoBurundiCabo VerdeCambodiaCameroonCanadaCayman IslandsCentral African RepublicChadChileChinaChristmas IslandCocos IslandsColombiaComorosCongoCongo, Democratic Republic of theCook IslandsCosta RicaCroatiaCubaCuraçaoCyprusCzechiaCôte d'IvoireDenmarkDjiboutiDominicaDominican RepublicEcuadorEgyptEl SalvadorEquatorial[...]

Read More
Ways to Lead a High-Performing Information Security Program

Fill this form out to receive your 10 Ways to Lead a High-Performing Information Security Program Whitepaper.Name* First Last Email* Phone*Address* AfghanistanAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarussalamBulgariaBurkina FasoBurundiCabo VerdeCambodiaCameroonCanadaCayman IslandsCentral African RepublicChadChileChinaChristmas IslandCocos IslandsColombiaComorosCongoCongo, Democratic Republic of theCook IslandsCosta RicaCroatiaCubaCuraçaoCyprusCzechiaCôte d'IvoireDenmarkDjiboutiDominicaDominican[...]

Read More
The High Price of “Faking” Your PCI Compliance Status

Fill this form out to receive your The High Price of “Faking” Your PCI Compliance Status Whitepaper.Name* First Last Email* Phone*Address* AfghanistanAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarussalamBulgariaBurkina FasoBurundiCabo VerdeCambodiaCameroonCanadaCayman IslandsCentral African RepublicChadChileChinaChristmas IslandCocos IslandsColombiaComorosCongoCongo, Democratic Republic of theCook IslandsCosta RicaCroatiaCubaCuraçaoCyprusCzechiaCôte d'IvoireDenmarkDjiboutiDominicaDominican[...]

Read More
Why Are So Many Companies Getting Hacked?

By: Todd Bell CCISO, CISSP, PMP, QSA, MPM, MBA Five years ago when Todd Bell worked as a Chief Information Security Officer (CISO) for a $2B corporation, he wanted to make a series of security enhancements after discovering a number of serious security vulnerabilities within his organization. Upon sharing the[…]

Read More
Recent Security Breaches

Fill this form out to receive your Recent Security Breaches Whitepaper.Name* First Last Email* Phone*Address* AfghanistanAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarussalamBulgariaBurkina FasoBurundiCabo VerdeCambodiaCameroonCanadaCayman IslandsCentral African RepublicChadChileChinaChristmas IslandCocos IslandsColombiaComorosCongoCongo, Democratic Republic of theCook IslandsCosta RicaCroatiaCubaCuraçaoCyprusCzechiaCôte d'IvoireDenmarkDjiboutiDominicaDominican RepublicEcuadorEgyptEl SalvadorEquatorial GuineaEritreaEstoniaEswatiniEthiopiaFalkland IslandsFaroe IslandsFijiFinlandFranceFrench GuianaFrench[...]

Read More