About this course
The PECB Chief Information Security Officer (CISO) training course is tailored for aspiring CISOs, providing them with the necessary knowledge, skills, and strategies to lead information security programs effectively and safeguard information and assets in today’s dynamic digital environment.
Who should attend?
This training course is intended for:
-
- Professionals actively involved in information security management
- IT managers responsible for overseeing information security programs
- Security professionals who aspire to advance into leadership roles, such as security architects, security analysts, and security auditors
- Professionals responsible for managing information security risk and compliance within organizations
- Experienced CISOs seeking to enhance their knowledge, stay up to date with the latest trends, and refine their leadership skills
- Executives, including CIOs, CEOs, and COOs, who play a crucial role in decision-making processes related to information security
- Professionals aiming to achieve executive-level roles within the information security field
Learning objectives
By the end of this training course, participants will be able to:
- Explain the fundamental principles and concepts of information security
- Comprehend the roles and responsibilities of the CISO and the ethical considerations involved, and address the challenges associated with the role
- Design and develop an effective information security program, tailored to the needs of the organization
- Adopt applicable frameworks, laws, and regulations and effectively communicate and implement policies to ensure information security compliance
- Identify, analyze, evaluate, and treat information security risks, using a systematic and effective approach
Course agenda
Day 1: Fundamentals of information security and the role of a CISO
– Training course objectives and structure
– Fundamentals of information security
– Chief information security officer (CISO)
– Information security program
Day2: Information security compliance program, risk management, and security architecture and design
– Information security compliance program
– Analysis of the existing information security capabilities
– Information security risk management
– Security architecture and design
Day 3: Security controls, incident management, and change management
– Information security controls
– Information security incident management
– Change management
Day 4: Information security awareness, monitoring and measurement, and continual improvement
– Awareness and training programs
– Monitoring and measurement
– Assurance program
– Continual improvement
– Closing of the training course
Day 5: Certification Exam
Training info
Email. [email protected]
Tel.02 670 8980-3 ext.321-323
