CISO 2. 0 Certification Course
5 days
Align security with business. The different ways security can be structured in an organization, the impact on the CISO role, mandate and stakeholder influencing strategies.
Identify major flaws in security organization design. Understand the crucial role of Security Operating Models as the bridge between strategy and execution. Practice alignment with value driven strategies and operating models from business and IT.
Govern, align and lead cyber security into an organization. Create strong allies with compliance and assurance to have everything in line with regulatory and legal requirements.
Position the CISO as a trusted strategic advisor. Build a strong information security team and organisation with appropriate funding and executive support.
Lead cyber security vs being lead (as mostly done today). Communication ways, reverse psychology vs direct communication. Create a compelling story instead of denying projects because of security concerns.
Create an inventory of your business and IT strategy. Describe key elements of existing IT-governance processes.
Practice effective Risk Management, countervailing powers in an organization, successful implementation of risk management and responsibilities in a 3 lines of defence model. Challenge the 3 lines of defense model with Dynamic Risk Governance Principles.
Practice the impact of agile way of working on the security organization and controls.
Practice cybersecurity strategy development as a change management process to develop an implementable information security plan with realistic targets and goals. Define resource planning and budgets. Create a business case.
Manage information security in operations, programs, projects, supply chains, geographical locations, business units and in an agile organization.
Practice C-Level involvement. Report to the board and external stakeholders. Obtain a seat in the board, at least once or twice a year. Define relational mechanism’s, how to discuss with board members / CEO in an unformal manner.
Evaluate the cyber function in the context of Risk Appetite, the role of digital transformation and Maturity levels in different types of organizations. Evaluate typical CISO Leadership competences and opportunities to grow. Identify your leadership style and create your personal development plan.
Define a problem to solve for your organization. Walk away from the course with a strategic plan and a personal development plan.
What’s included
- Official SECO-Institute course materials and reference literature
- 5 days of training
- Guidance and support from an exceptional group of cyber leaders
- One-to-one coaching
- Working in small classes with highly motivated peers
- A personal leadership development plan with opportunities to grow
- Alumni Membership with access to SECO’s international CISO Certified Network
- Exam
Who is this course for?
Typical participants include but are not limited to CISO’s, Information Security Officers, (Cyber-) Security Managers, Security Consultants, Security Operations Managers, Information Technology Risk Managers, Information Technology Governance Managers and Risk Advisories that integrate this course in their high potential talent programs. The program also attracts CIO’s, IT Managers and Cyber Risk Owners from business, adding additional value to group dynamics. At the end of the day, security needs to know more about business….and business more about Security!
Minimum Requirements:
Participants are expected to have 2 years of experience at the tactical level with a solid understanding of Governance, Risk and be familiar with Maturity Models and Frameworks. Previous trainings could include CISSP, CISM, C|CISO, Information Security Practitioner or similar. Equally important, the setup of the program requires a general level of seniority, an open personality and mindset, and the willingness to continuously challenge and improve yourself. The success of the program and your training heavily relies on group dynamics and enabling you to connect, work with and learn from your peers. When in doubt if this is the right program for you, please connect with us.
Course Modules
Day 1 – CISO & The Security Organization
1.1 Security Organization Design
– Definition & Building Blocks
– Major issues: When you get it wrong…
– Security Operating Model: The DNA of your organization
– Security Capabilities in the Operating Model
– Security Governance Models
– Discussion: Governance models flaws
– CISO in- or outside of IT?
– Aligning the security team to overall business objectives
– Business alignment exercise: Aligning with different strategies and value based operating models from business
1.2. CISO Role, Interfaces and Stakeholders
– CISO Roles: Leader, Strategist, Change Manager, Expert
– Discussion: CISO Role in context to CISO Position and Mandate
– Major challenges due to lack of executive support and stakeholder alignment
– CISO interfaces and interactions
– Stakeholder Analysis based on their power, involvement in cyber, approach to cyber and relationships between stakeholders
– Creating a stakeholder analysis model and goals table. Set the stage for your influencing strategy
1.3. CISO Maturity in Leadership
– CISO Leadership in context of the Organization’s Risk Appetite and Maturity
– CIRO Model & NIST
– CIRO Model Components:
1. Different organization types based on their Risk Appetite and Maturity
2. The Cyber Security Function per each level
3. Cultural impact: Challenging-, defining- and shaping the culture
4. Nature of internal relationships, styles of interaction and level of influence of the CISO
5. CISO Leadership competencies required for each level & opportunities to grow
– CISO Leadership Assessment
Exercises:
- Aligning with strategies and value driven operating models from business
- Security Governance Models: Major pitfalls, how to identify and fix them
- CISO Interfaces: Setting the stage for your influencing strategy
- CISO Maturity in Leadership: Identify your leadership style and opportunities to grow
Day 2 – Leadership
2.1. CISO Leadership Theories
– Trait Theories
– Behavorial theories
– Contingency theories
– Power and influence theories
– Ethical leadership
– Transformational leadership
– Agile leadership
2.2. Personal competencies and leadership, KYS
– Know Yourself
– Leadership assessment
– Authenticity, trust and Integrit
– Courage
– Storytelling
2.3. CISO interfaces
– Important CISO interfaces
– Driving change building successful teams
– Driving change through building successful relationships with CISO interfaces
– Stakeholder models and influencing strategies
Exercises:
- Know yourself
- Find your own voice
- Leadership assessment and personal development plan
- Stakeholder models and influencing strategies
Day 3 – Govern, align and organize security
3.1. Business aligned security
– Introduction on business value en business strategy
– Business value strategies
– Business aligned IT and security
– Alignment with IT maturity and existing IT governance
3.2. Effective risk management
– Need for countervailing power in an organization
– Deep dive on effective risk management processes and risk mitigation
3.3. Security in an agile organization
– Introduction agile way of working
– Agile manifesto
– Lead by example: agile security teams
– Impact agile way of working on security
Exercises:
- Business strategy, IT and security strategy and key governance processes
- Countervailing powers (group discussion)
- Risk mitigation and risk acceptance
- Impact agile way of working on security controls
Day 4 – Information security and risk management strategy
4.1. Cybersecurity as organizational change
Foundational practice of organizational change for an implementable strategy
4.2. Tactics for creating urgency
Know the why
Never waste a good crisis
SWOT 2.0 applied to organization-stakeholder relationship
4.3. Tactics for Identifying and tackling roadblocks
Identifying roadblocks
Tackling roadblocks
– Sources of influence
– CISO addressing friction?
– Personal circles of influence
4.4. Tactics for short-term goals and achievable steps
Articulate your management plan
– Using cyber security maturity models
– Classic Fit-Gap Analysis of a standard
– Communication and KPIs: what is your dashboard?
Breaking the whole down into achievable steps
– Leveraging Agile and LEAN methods for cyber security projects and processes
– Leverage your professionals
– Management by objectives / goal setting theory
Balancing incidents and structural change for organisational impact
4.5. Tactics for keeping up the momentum
Organizational learning cq learning maturity
Using the 3 Lines of Defense
Integrate different work styles for a unified view of cybersecurity via a control framework
Day 5 – Managing Information Security, Evaluation and Reporting to the Board
5.1. Security Operations vs. Security in Operations (part 1)
– SIEM, SOC, SOAR
– SECOPS & IT
– InfoSec in Business Ops
– InfoSec in IoT
– InfosSec in Industrial environments (ISO62443)
5.2. Security Operations vs. Security in Operations (part 2)
– Challenges of InfoSec (Multi-locations, cloud, etc.)
– 3 lines of Defense versus Dynamic Risk Governance
– Breakout rooms: Translate the models into your own organization
6.1. Finance for non-financial people (introduction)
– Public versus Private organizations
– Run cost versus change costs
– Capex vs. Opex
– EBIT vs. EBITDA
– Financial Statement vs. P&L
– Financial Management & KPIs
6.2. Creating a financial plan
– Key Elements
– Common pitfalls
– Aligning stakeholder expectations
– Break-out rooms: Create a high-level financial plan to setup a SOC
7.1. What is on the Board’s mind?
Presenting Information Security:
– Sources of the report
– Ways of bringing information to the board
– When to report and to whom
– How to align with their expectations
– Who are your allies within the Board?!
Collect your badge of honor
Exam options
This course has two possible exam options:
- Assignment based exam (S-CISO certification title)
- Traditional exam (S-ISME certification title)
Assignment based exam (S-CISO certification title)
At the beginning of the program, you will receive the template of your final assignment. The goal of this assignment is to assess students’ capabilities to apply course content and practices taught throughout the course. Students must write this document as if this pertains a real-time security case or security strategy, preferably applicable to the students own working environment. The case or strategy should ideally bring value to the company student is employed. During the course, separate assignments need to be executed prior to certain lectures and will be discussed during class. These can be integrated into the overall template assignment document. We strongly advise you to define your ‘’problem to solve’’ as early as possible to maximize the benefit from class assignments and in this way minimize workload at the end of the course.
Exam Process:
1. Decide your problem to solve for your final assignment early in the program
2. Take the training, and make your assignments for each Training Day
3. Integrate the theory and practices into your final assignment
4. Evaluation of your assignment by the board
5. Take the remote online proctor exam with questions related to your assignment
6. Claim your S-CISO Certification Title (minimum 5 Years of experience in the field mandatory)
Traditional exam (S-ISME certification title)
This exam option is for those who don’t have the time to write a final assignment; the problem to solve. For those students, we offer a traditional examen. This online exam consists of open questions and case studies and takes 2 hours.
Exam Process:
1. Take the training, and make your assignments/homework for each Training Day
2. After the course take the remote online proctor exam
6. Claim your S-ISME Certification Title
7. If you want to claim your S-CISO Certification title, you can always take the assignment based exam in a later stadium