Screen Shot 2017 06 01 at 11.34.07 AM - Webinars

Corporate Governance for CISOs: Asset Management

This session will focus on some fundamental concerns that an organization must address to support an effective information security program. How do you identify asset owners? What are examples of effective classification strategies? What type of inventory do you maintain to manage your asset information? What relationship do asset management and change management share?

Screen Shot 2017 06 01 at 11.34.19 AM - Webinars

Corporate Governance for CISOs: Board Presentations

This session focuses on reporting the right metrics to the right people. What metrics should the CISO collect? Where do these metrics exist? What are the best ways to present this information to the board of directors and other organizational leaders?

Screen Shot 2017 06 01 at 11.34.26 AM - Webinars

Corporate Governance for CISOs: Business Continuity Management

This session focuses on the most important concerns related to business continuity management. CISO isn’t always the leader of an organization’s business resilience efforts, but the CISO offers significant influence to ensure an effective program that support business impact analysis, business continuity planning, and disaster recovery for an organization’s critical information assets.

Screen Shot 2017 06 01 at 11.34.33 AM - Webinars

Corporate Governance for CISOs: Leadership: Beyond Security Technology

Technical expertise is a critical component of security leadership; however, the modern CISO must possess a myriad of fundamental business to run a successful program. This session will focus on non-technical areas in which the CISCO should be competent and communicate effectively: strategic planning, financial management, contracting, and vendor management.

Security Channel

Are you Ready to be a CCISO?

Subscribe to the CISO Podcast

Listen on Apple Podcasts
Listen on Stitcher
Listen on Spotify
RSS Feed

CCISO Body of Knowledge

CISO book

The EC-Council CCISO Body of Knowledge covers all five of the CCISO Information Security Management Domains in depth and was written by seasoned CISOs for current and aspiring CISOs.

Get your copy today

Featured Whitepaper