Training India 2016

[highlight color=”” border_color=”” background_image=”https://ciso.eccouncil.orgwp-content/uploads/2013/09/about_us_1.jpg” background_attachment=”fixed” background_position=”center center” background_stretch=”no” min_height=”300″ first_page=”yes” last_page=”no” padding_top=”10″ padding_bottom=”0″ margin_bottom=”” fullwidth=”yes”]

back - Training India 2016

[divider style=”1″ align=”center” size=”normal” variant=”normal” dimension=”3px” color=”” scrolltext=””][/divider]

Certified Chief Information Security Officer Training

[divider style=”2″ align=”center” size=”normal”][/divider]

The Certified Chief Information Security Officer (CCISO) program trains individuals who are looking to make the jump from middle management to the executive ranks by focusing on high-level management skills specifically needed for IS executives. From project to audit management, procurement and finance, to strategy and policy, students will be taught to steer complex security programs strategically and successfully. The CCISO program was created and is taught by sitting high-level information security executives from across industries, resulting in the most relevant, challenging, and applicable content on the market.

[space height=”20″] [two_third] [H3]Outline[/H3] [accordion style=”normal” open=”no”][accordion_toggle title=”Domain 1: Governance (Policy, Legal & Compliance)”] [list type=”icon-check”]
  • Definitions
  • Information Security Management Program
  • Information Security Laws, Regulations, & Guidelines
  • Privacy Laws
[/list] [/accordion_toggle][/accordion] [accordion style=”normal” open=”no”][accordion_toggle title=”Domain 2: IS Management Controls and Auditing Management”] [list type=”icon-check”]
  • Design, Deploy, and Manage Security Controls in Alignment with Business Goals, Risk Tolerance, and Policies and Standards
  • Information Security Risk Assessment
  • Risk Treatment
  • Residual Risk
  • Risk Acceptance
  • Risk Management Feedback Loops
  • Business Goals
  • Risk Tolerance
  • Policies and Standards
  • Understanding Security Controls Types and Objectives
  • Implementing Control Assurance Frameworks
  • COBIT (Control Objectives for Information and Related Technology)
  • BAI06 Manage Changes
  • COBIT 4.1 vs. COBIT 5
  • ISO 27001/27002
  • Automate Controls
  • Understanding the Audit Management Process
[/list] [/accordion_toggle][/accordion] [accordion style=”normal” open=”no”][accordion_toggle title=”Domain 3: Management – Projects and Operations (Projects, Technology & Operations)”] [list type=”icon-check”]
  • The Role of the CISO
  • Information Security Projects
  • Security Operations Management
[/list] [/accordion_toggle][/accordion] [accordion style=”normal” open=”no”][accordion_toggle title=”Domain 4: Information Security Core Competencies”] [list type=”icon-check”]
  • Access Controls
  • Physical Security
  • Disaster Recovery
  • Network Security
  • Threat and Vulnerability Management
  • Application Security
  • Systems Security
  • Encryption
  • Computer Forensics and Incident Response
[/list] [/accordion_toggle][/accordion] [accordion style=”normal” open=”no”][accordion_toggle title=”Domain 5: Strategic Planning & Finance.”] [list type=”icon-check”]
  • Security Strategic Planning
  • Alignment with Business Goals and Risk Tolerance
  • Relationship between Security, Compliance, & Privacy
  • Leadership
  • Enterprise Information Security Architecture (EISA) Models, Frameworks, and Standards
  • Security Emerging Trends
  • It’s all about the Data
  • Key Performance Indicators (KPI)
  • Systems Certification and Accreditation Process
  • Resource Planning
  • Financial Planning
  • Procurement
  • Vendor Management
  • Request for Proposal (RFP) Process
  • Integrate Security Requirements into the Contractual Agreement and Procurement Process
  • Statement of Work
  • Service Level Agreements
[/list] [/accordion_toggle][/accordion] [/two_third] [one_third_last]

Dates: April 27th-29th, 2016
Venue: TBD

[/one_third_last] [call_to_action_2 style=”1″ header=”Sign Up Today” content=”” buttontext=”Learn More” background=”#dd3333″ background_hover=”” url=”https://ciso.eccouncil.orgcontact/” target=”_parent”] [/highlight]