Managing Information Security in Complex Environments (CvCISO-E)
"Complexity is the WORST enemy of security"
It’s true, complexity is our worst enemy. This is (or should be) indisputable because it’s fact founded in logic. Accepting the truth can be a tough pill for some people to swallow, but it doesn’t change the fact that it’s truth. For us, the root question is:
How can we secure a complex environment like a state or global enterprise?
Some CISOs, vCISOs, and/or other information security leaders (collectively “us”) are tasked with “securing” complex environments, and too often we’re set up to FAIL. It’s not intentional, but our traditional approaches aren’t working. We CAN change the game, and WIN for everyone!
We will never mislead anyone here (at SecurityStudio), securing complex environments is hard, but it’s NOT impossible. ALL information security leaders CAN secure complex environments given the correct approach, appropriate skills, and support from others.
This is what the CvCISO-E course is all about!
This course is specifically designed for public and private sector professionals who are:
This course is NOT exclusively designed for CISOs/CvCISOs; however, it should be mandatory training for ALL these individuals.
There is no prerequisite for the CvCISO-E course and technical expertise is NOT required. The ability to think critically, with discernment is helpful; however, we’ll do our best to teach this skill during the course too.
Completion of the CvCISO-E course is required for CvCISO Level 3, Expert, and Mentor.
This is a twelve-hour course taught in six two-hour sessions, starting June 19th. It meets Tuesday, Wednesday, and Thursday evening, 6-8pm CST, for two consecutive weeks.
The course is organized into two parts (or Chapters).
Securing complex environments starts with understanding the challenges. Obviously, the better we understand the challenges, the more effective our solutions will be, and the better our chances of success during (and after) implementation. Chapter 1 consists of three classes dedicated to learning.
Participants will use the information presented in Chapter 1 for completion of the practical exercises in Chapter 2.
Knowledge is one thing, but using knowledge is completely different. Chapter 2 is dedicated to applying the concepts and methodologies learned in Chapter 1 to scenarios that resemble complex environments commonly faced by CISOs/vCISOs.
SecurityStudio is 100% committed to our mission, creating solutions to “fix the broken industry”.
The cost for the course, exercises, exam and certification is $500.
Introduction
About the Course
About the Instructor
Class #1 - Information Security Complexity and Logic
Class #1 - Tackling Complexity with Logic (Instructor's Slide Deck)
Class #1 - Tackling Complexity with Logic (Class Recording)
Class #2 - Introduction to WISE
Class #2 - Introduction to WISE (Instructor's Slide Deck)
Class #2 - Introduction to WISE (Class Recording)
Class #3 - Design, Planning and Deployment Strategy
Class #3 - Design, Planning and Deployment Strategy (Instructor's Slide Deck)
Class #3 - Design, Planning and Deployment Strategy (Instructor's Slide Deck)
Class #3 - Design, Planning and Deployment Strategy (Class Recording)
WISE Administration Manual-DRAFT
Whole of Information Security Enablement (WISE) Purpose Document - Template
Goals for Whole of State Information Security in the State of STATE_NAME - Template
WISE AOU Inventory - Template (UPDATED)
In the Meantime