Articles

Executive Management

CCISO VS CISSP

What next after CISSP? Created by (ISC)2, the CISSP certification has been the leading training program for and validation of IT security management skills since its inception all the way back in 1994. To date there are over 180,000 CISSPs around the world, and that number is growing all the time. It’s hard to overestimate…

Read article
Risk Management

What Is Risk Management? Risk management is a risk assessment method that analyzes and eliminates risks to mitigate threats and optimize an investment’s profits. Risk management includes the detection, review, and reaction to risk factors that are part of a company’s existence. Efficient risk management means seeking — by behaving proactively rather than reactively —…

Read article
What is Information Security Management

Information security management is an organization’s approach to ensure the confidentiality, availability, and integrity of IT assets and safeguard them from cyberattacks. A Chief Information Security Officer, IT Operations Manager, or Chief Technical Officer, whose team comprises Security Analysts and IT Operators, may carry out the tasks involved in information security. It’s obvious that virtually…

Read article
What is Disaster Recovery

What Is A Business Continuity Plan and How Is It Used? A business continuity plan refers to the processes and procedures that experts follow to ensure status quo in the event of a disruption. Simply put, business continuity is an organization’s ability to maintain essential functions during and after a disruption has occurred. Disaster Recovery, on…

Read article
World-Class Security Executive Certification for CISOs

EC-Council’s Certified Chief Information Security Officer (C|CISO) program is built on the decades of knowledge and experience of seasoned CISOs who contribute their time and energy to making the C|CISO a world-class security executive certification. We are both humbled and proud of the global C|CISOs who exhibit their passion and drive by enabling excellence through…

Read article
Associate C|CISO: The Next Step for a Certified Information Security Manager​ 

In today’s workforce, information security workers are more important than ever. Most companies have undergone a digital transformation to stay competitive, and many business processes now take place online. Data is an asset, and security personnel represent the first line of defense. The Certified Information Security Manager (CISM) certification is valuable for professionals following a…

Read article
Building Information Security Core Competencies: A Guide for CISOs and C|CISO Candidates

What does a chief information security officer do, and what are the various CISO roles and responsibilities? As an organization’s most important IT security professional, the CISO is tasked with defending the business from external attackers and cyber threats. Qualified CISOs must be familiar with many core information security competencies. Below, we’ll look at some…

Read article
5 New Cybersecurity Challenges Chief Security Officers (CSOs) Should Be Aware of in 2023 
5 New Cybersecurity Challenges Chief Security Officers (CSOs) Should Be Aware of in 2024

If you’re a chief security officer (CSO), chief information security officer (CISO), or other cybersecurity leader, your job is never dull. Technology is constantly evolving, as are the threats to an organization’s data and intellectual property. No chief security officer can rest on their laurels because each year brings new challenges. And 2023 is shaping…

Read article
EC-Council's Chief Information Security Officer Program Trusted Cyber Leadership – DoD Directive 8140 Featured image
EC-Council’s Certified Chief Information Security Officer (C|CISO) Program Trusted at the Highest Level of Cyber Leadership – DoD Directive 8140

Traditional national security measures of the past leveraged borders, global influence, political maneuvering, and intelligence gathering measures to protect a country’s interests. By shifting focus to cyber space, hostile nations and cybercriminal organizations can cause instantaneous damage to critical infrastructure, disseminate misleading information to large swaths of the population, subvert sensitive information, and create a deterioration of our ability to successfully achieve national goals of peace and prosperity for the population.

Read article