Chapter 1 - Introduction to the CvCISO Program
(1 Lesson/2 Hours)
Covers everything there is to know about the SecurityStudio Certified virtual Chief Information Security Officer Program and how to be successful with it.
Chapter 2 - Information Security Fundamentals
(15 Lessons/30 Hours)
The most intense portion of the CvCISO-1 course, this chapter introduces information security fundamentals without shortcuts and builds mastery critical to vCISO success.
Chapter 3 – vCISO/Customer Relationship
(1 Lesson/2 Hours)
This chapter covers setting the appropriate expectations and communicating effectively, especially with people who don’t speak the information security language natively.
Chapter 4 - Roles and Responsibilities
(1 Lesson/2 Hours)
This chapter covers how to establish good governance, including how to determine the most important roles, assigning the roles, and establishing accountability.
Chapter 5 - Risk Assessment
(3 Lessons/6 Hours)
In previous chapters, the vCISO should have established effective communication, determined (and assigned) roles, and established responsibilities. This chapter leverages previous work to conduct a comprehensive, objective, and measurable information security risk assessment. Students will learn how to lead an information security risk assessment and use SecurityStudio's S2Org to conduct one.
NOTE: Although S2Org is used in the class, CvCISO certification is NOT dependent upon using any SecurityStudio product.
Chapter 6 - Building a Roadmap
(2 Lessons/4 Hours)
Risk assessment is only one part of the risk management process. Learning how to use a risk assessment is where skill and experience are put to the test. Risk decisions must be made and resources must be allocated to enact the decisions. This chapter teaches students how to build, communicate, and adjust information security roadmaps.
Chapter 7 - Asset Management
(2 Lessons/4 Hours)
It's only logical that we can't protect what we don't know we have. Students learn how to build and maintain effective asset management programs in this chapter.
Chapter 8 - Incident Management
(2 Lessons/4 Hours)
Information security incidents are a certainty that all information security leaders need to be prepared for. In this chapter, students will learn how to build functional incident management capabilities and integrate them into an organization seamlessly.
Chapter 9 - Third Party Information Security Risk Management (TPISRM)
(1 Lesson/2 Hours)
More than half of all information security incidents are caused directly or indirectly by third parties. In this Chapter, students will learn how to build a comprehensive third-party information security risk management program from building an inventory of third-party relationships to risk management and contract requirements.
Students will use S2Vendor to conduct third-party information security risk management activities for demonstration; however, S2Vendor-specific skills are not required for CvCISO certification.
Chapter 10 - Maintaining Progress and Transition
(2 Lessons/4 Hours)
Information security processes must be continually maintained and eventually all vCISO contracts are terminated. In this Chapter, students learn strategies to ensure that information security progress is not lost and can be maintained over the long term. Students also learn how to gracefully transition vCISO leadership from themselves to someone else.
BONUS - CvCISO-1 Examination Preparation
(1 Lesson/2 Hours)
All the content has been delivered at this point. This session is dedicated to preparing the students for their certification examination.