As cybersecurity problems continue to escalate across the world, the demand for practical CISO training is higher than ever before. We aim to provide CISOs with a roadmap on how to build, run and manage their security program to maturity. Essentially, this is a guide on how CISOs can perform their jobs day-to-day. When CISOs are well-trained, they will be able to secure their organizations from top-down – no matter what industry, company size or country they are from.
What stands out about our certification, versus other security & CISO certs in the market, is the practical nature of the training. We cover topics not commonly covered in other certs, including how to win budget for security, lower costs, build company-wide influence as a CISO, zero-trust architecture, and business/digital transformation (including how to deploy Internet of Things safely).
Another unique aspect about our cert is the sheer diversity of perspectives. Our course content has been put together by CISOs of various industries and company sizes, as well as lawyers, investigators, academia, and other security professionals across a diverse range of backgrounds.
We believe that all organizations deserve quality CISO education. That is why we provide this certification at an affordable price point, to make it accessible to CISOs of all company sizes and parts of the world – including nonprofits and small businesses.
Our certification is by the community, for the community. We understand that one of the greatest factors for a CISO’s success is their connections with senior peers in the same industry. As such, as part of this program, we will give you access to a mentor, who can give you one-on-one guidance with the course content, and support you in doing the best job you can as a CISO – even after you have completed our program. We are excited to provide new CISOs with access to some of the top CISOs in the industry.
Our testing methodology is extensive as well. We go beyond the traditional multiple-choice questions, by testing you on your response to real-world scenarios faced by CISOs. In doing so, we will have a more accurate assessment of your understanding of the CISO role. To find out more about the exam, please read the ‘Program Topics’ section.
This certification is meant to be a ‘badge of honor’ – both challenging and rewarding to complete.
Note: this certification emphasizes managerial, leadership & business skills that are most important for a CISO to perform their role effectively. Technical topics are covered lightly at a high level. For extensive technical training, we ask that you explore other certifications.
Average annual salary for a CISO in the U.S.
SOURCE: GLASSDOOR, SEPTEMBER 2022
of Fortune 500 CISOs are on the job for one year or less, largely due to lack of high-quality training, leading to poor performance & burnout
SOURCE: CYBERSECURITY VENTURES, JULY 2020
Yearly growth rate of the cost of cybercrime. By 2025 it will cost $10.5 trillion annually.
SOURCE: CYBERSECURITY VENTURES, NOVEMBER 2020
CISO Key Takeaways
- Cyber Strategy
- Risk Prioritization
- Security Budgeting
- Security Leadership
- Vendor Management
- Incident Response
- Crown Jewels
- Identity and Access Management
- Security Controls
- Aligning Security with Business Goals
- Regulatory Compliance
- Breach Investigations
CISO Program Topics
Our learning journey is structured to take you through the complete product life cycle, from concept and design to developing a comprehensive vision, incorporating customer feedback, and implementing the proper metrics for measuring performance.
Module 1: Setting Up Your Program
Learn how to establish the critical foundations of a security program and tailor them to your company’s needs, within the first 100 days of your role. Learn how to make everyone a security practitioner, win respect & influence rather than demanding it, and how to work with your board of directors.
Module 2: Risk Management
Learn how to establish a security risk management strategy & integrate it with enterprise risk management. Learn how to identify critical risks and mitigate them, how to manage third-party risk, and other essential elements of a risk management program.
Module 3: Financial Issues in Managing a Security Program
Learn how to win budget for your security program, how to justify it to to your organization’s senior decision makers, and how to save money – so that you have the resources to hire people and purchase the needed tools to keep your org safe.
Module 4: Holistic Cybersecurity Leadership
Learn how to create a compelling case for security for all stakeholders in your organization; building influence and trust across the board and becoming a leader people look up to. Learn how to motivate your team, manage your energy and prevent burnout.
Module 5: Integrating Security Into the Project Management Lifecycle
Learn about the role of a CISO in delivering business projects, the goal being to meet security as well as compliance requirements. We will go over how the CISO will be involved in the project lifecycle, & how to prevent projects from adding unwanted risk to the environment.
Module 6: Incident Response Lifecycle
Learn how to quickly and effectively respond to security incidents, as well as what to do before and after an incident occurs – to minimize its impact to your organization.
Module 7: Protecting Your Crown Jewels
Learn how to identify your crown jewels – the information assets of highest value to your organization – and how to protect them via technical, contractual and procedural controls.
Module 8: Identity and Access Management
Learn how to establish the processes, procedures, and framework of an IAM program, tailored to your company’s needs, in a way that meets regulatory/compliance requirements.
Module 9: Security Operations
Learn how to manage & monitor your security program using preventative, detective and responsive controls – from a defense-in-depth point of view. Learn how to manage your configurations.
Module 10: Business Transformation & Enablement
This module takes the view that properly executed cybersecurity enables organizations to operate, transform and scale safely. Learn how new technology and business processes (e.g. Internet of Things, DevSecOps) can help you enable your business.
Module 11: Legal Issues in Managing Secure Operations
Learn how to comply with overlapping and conflicting legal regimes around the world, along with how best to work with lawyers & law enforcement on important topics such as breach investigations & information sharing.
Answer, via video, a series of questions written by key executives (e.g. CEOs, CIOs, CISOs), investigators (FBI) and lawyers. These questions simulate real-world scenarios & are meant to be answered in business-school, case-study style. They are designed to test your creativity, communication skills, and understanding of the concepts taught in the course. Your exam will be graded by 3 CISOs, from whom you will receive valuable written feedback – that can help you in your career going forward.
If you are an experienced CISO, you can skip the course and take the final exam on its own – to get GCISO credit.
Click here for complete CISO Curriculum.
CISO Program Experience
Learn the material via our instructor-led live sessions, 4 hours per week.
Gauge your understanding of the content as the program progresses, via in-course quizzes.
Case Study Questions
In the final exam, focus on real-world scenarios such as how to answer a CFO or lawyer’s question during a data breach.
Get access to a mentor who is a senior CISO in your industry. They will provide you guidance on how to make the best use of the course content in your CISO role, both during and after course completion.