top of page
Writer's picturesocial218

CISO


The Chief Information Security Officer

One of the top Position in information security is the chief information security officer, it’s a “C” level position, with power and decision making capabilities, that required both technical and business management competencies and skills,

The main points included in CISO job descriptions can be summarized as following

  • Working closely with senior management to ensure the information security program are being implemented, maintained and governed.

  • Develop information security architecture that matches business requirement

  • Create information security strategic plans.

  • Supervise the development of information security policies and procedures

  • Ensure the compliance of the organization with information security standers and regulations

  • Perform and responsible for information security risk management process

  • Build a proper security incidents handling and response and coordinate investigation activities

  • Responsible for the efficiency of information Security Operation centers

  • Ensure information security resources.

The Training required to become CISO,

Introduction to cybersecurity (2 Months)

  • Cyber Security terminology

  • Authentication and Identity management concepts

  • Type of attacks

  • Networking and communications security

  • Cryptography fundamental

  • Managing security risks

Security Professional (CISSP) ( 4 months)

  • Security and Risk Management

  • Asset Security

  • Security Engineering

  • Communications and Network Security

  • Identity and Access Management

  • Security Assessment and Testing

  • Security Operation

  • Software Development Security

Security Management (CISM) (3 Months)

  • Information security governance

  • Information security Risk management

  • Information security program management

  • Incident Management and Response

information Systems Auditing (CISA) (3 Months)

  • The Process of Auditing Information systems

  • Governance ad Management of IT

  • Information systems Acquisition, development and implementation

  • Information systems Operations, Maintenance and support

  • Protection of information assets

18 views0 comments

Recent Posts

See All
bottom of page