The document discusses plans to develop a new Certified Counterespionage Information Security Manager (CCISM) certification. The certification was originally created by Glenn Whidden to focus on counterespionage and technical surveillance countermeasures, but does not address modern cyber issues. The new CCISM certification will incorporate counterespionage, TSCM, information security, and cyber TSCM skill sets. It will be a management-level certification administered through an online learning platform. The certification is aimed at setting standards for TSCM professionals and bringing awareness to the relevance of cyber TSCM.
The Offensive Cyber Security Certification will upgrade your skills to become a pentester, exploit developer. You will learn multiple offensive approaches to access infrastructure, environment, and information, performing risk analysis and mitigation, compliance, and much more with this program.
Symantec Cyber Security Solutions minimize the potential business impact of increasingly sophisticated and targeted attacks by reducing the time it takes to detect, assess and respond to security incidents.
Conozca como tener una completa visibilidad para identificar e investigar los ataques, detecte y analice ataques avanzados, antes que afecten al negocio, gestione los incidentes más importantes, permitiéndole combinar Logs con otros tipos de datos como tráfico en la red, información end point y datos en la nube.
The Offensive Cyber Security Certification will upgrade your skills to become a pentester, exploit developer. You will learn multiple offensive approaches to access infrastructure, environment, and information, performing risk analysis and mitigation, compliance, and much more with this program.
Symantec Cyber Security Solutions minimize the potential business impact of increasingly sophisticated and targeted attacks by reducing the time it takes to detect, assess and respond to security incidents.
Conozca como tener una completa visibilidad para identificar e investigar los ataques, detecte y analice ataques avanzados, antes que afecten al negocio, gestione los incidentes más importantes, permitiéndole combinar Logs con otros tipos de datos como tráfico en la red, información end point y datos en la nube.
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?NetEnrich, Inc.
With cybersecurity threats continuing to grow faster than security budgets, CISOs, CIOs and SecOps teams are left at a dangerous disadvantage.
Even enterprises running their own Security Operations Centers (SOCs) find the perennial shortage of skills, tools, and other resources stops them from realizing the full value of investments. Rather than struggle to find – and hang on to – top talent with hands-on experience across network and cloud security, mid-sized enterprises are instead opting for SOC-as-a-Service offerings.
This presentation explained the security controls and evolving threats that pertain in the market
at the moment through giving descriptive elaboration on today's security landscape. The
presentation further envelopes the key reasons why Cyber Security is imperative for
organizations today.
Happiest Minds Cyber Security Services:
http://www.happiestminds.com/cyber-security-services/
Most organizations have good enterprise-level security policies that define their approach to maintaining, improving, and securing their information and information systems. However, once the policies are signed by senior leadership and distributed throughout the organization, significant cybersecurity governance challenges remain. In this workshop I will explain the transforming organizational security to strengthen defenses and integrate cybersecurity with the overall approach toward security governance, risk management and compliance.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.Cristian Garcia G.
El control de cuentas y accesos privilegiados enfrenta la realidad actual que involucra complejidad de ambientes de nube, sistemas y plataformas SAAS, así como sistemas legados y bajo premisa. ¿Cómo se adecúan los productos de administración de accesos actuales a esta realidad tecnológica? ¿En torno a qué deben estar listas estas soluciones?
This primary focus of study was to investigate how cyber risks in ICT infrastructures of supply chains are managed. As its theoretical base, the study used the Adaptive Security Architecture framework that has been employed by most IT security specialists. Five experienced IT experts participated in a semi-structured interview to provide practical insights on the state of cybersecurity in supply chains operations from various industries. Their responses were analyzed based on the four stages of prediction, prevention, detection and response.
This study offers a new framework that suggests cybersecurity requires anticipatory vigilance, profiling malevolence, instantaneous response and uncompromised recovery to dealing with the cyber threats posing disruptions to supply chains.
What We’ve Learned Building a Cyber Security Operation Center: du Case StudyPriyanka Aash
The cybersecurity landscape is rapidly evolving, with new threats and threat actors emerging, and traditional security operations centers (SOCs) need to be augmented accordingly. This session will detail the journey of du in building and continually enhancing its SOC, physically and philosophically, to best deal with attack detection (offensively and defensively) and response.
(Source: RSA Conference USA 2017)
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
El panorama de amenazas en evolución basado en nuestro ISTR (Reporte de Anual de Amenazas en Internet Vol. 24) recientemente publicado, refleja las últimas tendencias y cómo se aplican a Colombia y América Latina. Las principales tendencias de transformación digital, como la nube y la movilidad, junto con los nuevos desafíos de seguridad han cambiado el panorama de ciberseguridad por lo que la estrategia debe enfocarse en términos de riesgos clave, regulaciones y hallazgos sobre la madurez de la seguridad. Recomendaciones para enfocar y mejorar las posturas de ciberseguridad para abordar estas tendencias, incluidos los marcos clave, las tecnologías, los procesos y los cambios culturales son parte integral de los pasos a seguir.
Cyber security hands on-training.
Learn advanced applications of Cyber Security to embedded systems.
It’s all about Cyber and Security.
Proudly presented by: Tonex.Com
Index / Highlights:
Understanding cyber security, risk and action tools.
Integrating Cybersecurity and Enterprise Risk Management (ERM).
What is Secure Embedded Systems ? How does it protect ?
Advance methods & procedure to analyze, reverse, debug ?
Value of risk assessment methodologies, failure analysis ?
How to set up and measure successful mission control system ?
Which professionals need to learn cyber security approaches ?
Case studies and workshop.
Request more information
Sign up for Hands-On Cybersecurity Course
https://www.tonex.com/training-courses/cyber-security-embedded-systems-training-bootcamp-hands-on/
In January 2020, the Department of Defense released the initial version of Cybersecurity Maturity Model Certification (CMMC) standard. Certifications will begin for new and existing defense contractors this year. As you are preparing for the CMMC now by becoming NIST 800-171 compliant, it is critical to ensure you can continue bidding on RFPs. Any type of cybersecurity audit takes time and getting compliant to NIST 800-171 ahead of an audit is no different.
Whether your organization’s security and compliance are 80% of the way there, or you think your infrastructure needs a complete overhaul, get tips and insights to get you closer to compliance.
We Share:
- An overview of the compliance requirements,
- Tips for analyzing current cyber security measures and processes,
- How the Microsoft 365 Cloud helps ensure compliance
- Measures you can put in place to help you meet NIST 800-171 compliance
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?NetEnrich, Inc.
With cybersecurity threats continuing to grow faster than security budgets, CISOs, CIOs and SecOps teams are left at a dangerous disadvantage.
Even enterprises running their own Security Operations Centers (SOCs) find the perennial shortage of skills, tools, and other resources stops them from realizing the full value of investments. Rather than struggle to find – and hang on to – top talent with hands-on experience across network and cloud security, mid-sized enterprises are instead opting for SOC-as-a-Service offerings.
This presentation explained the security controls and evolving threats that pertain in the market
at the moment through giving descriptive elaboration on today's security landscape. The
presentation further envelopes the key reasons why Cyber Security is imperative for
organizations today.
Happiest Minds Cyber Security Services:
http://www.happiestminds.com/cyber-security-services/
Most organizations have good enterprise-level security policies that define their approach to maintaining, improving, and securing their information and information systems. However, once the policies are signed by senior leadership and distributed throughout the organization, significant cybersecurity governance challenges remain. In this workshop I will explain the transforming organizational security to strengthen defenses and integrate cybersecurity with the overall approach toward security governance, risk management and compliance.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.Cristian Garcia G.
El control de cuentas y accesos privilegiados enfrenta la realidad actual que involucra complejidad de ambientes de nube, sistemas y plataformas SAAS, así como sistemas legados y bajo premisa. ¿Cómo se adecúan los productos de administración de accesos actuales a esta realidad tecnológica? ¿En torno a qué deben estar listas estas soluciones?
This primary focus of study was to investigate how cyber risks in ICT infrastructures of supply chains are managed. As its theoretical base, the study used the Adaptive Security Architecture framework that has been employed by most IT security specialists. Five experienced IT experts participated in a semi-structured interview to provide practical insights on the state of cybersecurity in supply chains operations from various industries. Their responses were analyzed based on the four stages of prediction, prevention, detection and response.
This study offers a new framework that suggests cybersecurity requires anticipatory vigilance, profiling malevolence, instantaneous response and uncompromised recovery to dealing with the cyber threats posing disruptions to supply chains.
What We’ve Learned Building a Cyber Security Operation Center: du Case StudyPriyanka Aash
The cybersecurity landscape is rapidly evolving, with new threats and threat actors emerging, and traditional security operations centers (SOCs) need to be augmented accordingly. This session will detail the journey of du in building and continually enhancing its SOC, physically and philosophically, to best deal with attack detection (offensively and defensively) and response.
(Source: RSA Conference USA 2017)
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
El panorama de amenazas en evolución basado en nuestro ISTR (Reporte de Anual de Amenazas en Internet Vol. 24) recientemente publicado, refleja las últimas tendencias y cómo se aplican a Colombia y América Latina. Las principales tendencias de transformación digital, como la nube y la movilidad, junto con los nuevos desafíos de seguridad han cambiado el panorama de ciberseguridad por lo que la estrategia debe enfocarse en términos de riesgos clave, regulaciones y hallazgos sobre la madurez de la seguridad. Recomendaciones para enfocar y mejorar las posturas de ciberseguridad para abordar estas tendencias, incluidos los marcos clave, las tecnologías, los procesos y los cambios culturales son parte integral de los pasos a seguir.
Cyber security hands on-training.
Learn advanced applications of Cyber Security to embedded systems.
It’s all about Cyber and Security.
Proudly presented by: Tonex.Com
Index / Highlights:
Understanding cyber security, risk and action tools.
Integrating Cybersecurity and Enterprise Risk Management (ERM).
What is Secure Embedded Systems ? How does it protect ?
Advance methods & procedure to analyze, reverse, debug ?
Value of risk assessment methodologies, failure analysis ?
How to set up and measure successful mission control system ?
Which professionals need to learn cyber security approaches ?
Case studies and workshop.
Request more information
Sign up for Hands-On Cybersecurity Course
https://www.tonex.com/training-courses/cyber-security-embedded-systems-training-bootcamp-hands-on/
In January 2020, the Department of Defense released the initial version of Cybersecurity Maturity Model Certification (CMMC) standard. Certifications will begin for new and existing defense contractors this year. As you are preparing for the CMMC now by becoming NIST 800-171 compliant, it is critical to ensure you can continue bidding on RFPs. Any type of cybersecurity audit takes time and getting compliant to NIST 800-171 ahead of an audit is no different.
Whether your organization’s security and compliance are 80% of the way there, or you think your infrastructure needs a complete overhaul, get tips and insights to get you closer to compliance.
We Share:
- An overview of the compliance requirements,
- Tips for analyzing current cyber security measures and processes,
- How the Microsoft 365 Cloud helps ensure compliance
- Measures you can put in place to help you meet NIST 800-171 compliance
A comprehensive Incident Handler Certification program was created to provide organizations with the skills and knowledge needed to manage post-breach consequences, and thereby reduce the financial and reputational consequences of an incident.
CISSO Certification | CISSO Training | CISSOSagarNegi10
Our CISSO Certification course is designed for forward-thinking security professionals that want the advanced skill set necessary to manage and consult businesses on information security.
CISSO Certification| CISSO Training | CISSOSagarNegi10
You will gain practical knowledge regarding a range of aspects in the INFOSEC community as part of the CISSO Certification program. It will teach you how to secure assets, monitor them, and comply with data security policies.
Tonex Cybersecurity Fundamentals, Cybersecurity Training and CertificationBryan Len
In the cutting edge computerized world, cybersecurity is basic to securing digital information, data, basic foundation and different resources.
The hard the truth is that cybersecurity risk is expanding, driven by worldwide availability and utilization of cloud administrations to store sensitive data and individual data.
Tonex offers Cybersecurity Fundamentals, a unique 2-day course that covers cybersecurity discipline managing certifiable use cases and applications moving specialized,
The executives and strategy aptitudes to make sure about data and foundation and battle new assaults.
Cybersecurity Fundamental course is a unique 2-day training course gave by Tonex,
the most believed supplier of cybersecurity training courses, certification, counseling administrations and research to digital security experts around the world.
Course Key Topics:
Prologue to Cybersecurity
Fundamentals of Information, Data, Communications, Infrastructure and System Security
Utilization of Cybersecurity
Diagram of Risk Management and Risk Management Framework (RMF)
Cybersecurity Law, Policy, Regulations and Analysis
Digital Management Theory and Practice
Course Agenda :
Intro to Cybersecurity
Diagram of Cybersecurity Domains and Assets
Diagram of Cybersecurity Threats
Basic Attack Types and Attack Vectors
Diagram of Cybersecurity Processes
Diagram of Cybersecurity Controls
Diagram of Advanced Persistent Threats (APT)
Endeavor Risk of Successful APT Attack
The "Digital Kill Chain"
Request more information. Online training available.
Visit tonex.com for course and workshop detail
Cybersecurity Fundamentals, Cybersecurity Training and Certification
https://www.tonex.com/training-courses/cybersecurity-fundamentals/
CCI provide SSCP Certification Training for a minimum of 5 years paid work experience in one of the six cloud-based domains identified by (ISC)² standards in Dallas & Arlington, TX. Join Now! https://www.ccitraining.edu/sscp-certification-systems-security-certified-practitioner/
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
As we approach the new year, the importance of a robust cybersecurity strategy cannot be overstated. Learning on the effective measures to be taken and tools needed to navigate the evolving cybersecurity landscape successfully is essential.
Amongst others, the webinar covers:
• ISO/IEC 27001 and ISO/IEC 27035 and their key components
• Key Components of a Resilient Cybersecurity Strategy
• Best practices for building a resilient cybersecurity strategy in 2024
Presenters:
Rinske Geerlings
Rinske is an internationally known consultant, speaker and certified Business Continuity, Information Security & Risk Management trainer.
She was awarded Alumnus of the Year 2012 of Delft University, Australian Business Woman of the Year 2010-13 by BPW, Risk Consultant of the Year 2017 (RMIA/Australasia) and Outstanding Security Consultant 2019 Finalist (OSPAs)
Rinske has consulted to the Department of Prime Minister & Cabinet, 15 Central Banks, APEC, BBC, Shell, Fuji Xerox, NIB Health Funds, ASIC, Departments of Defense, Immigration, Health, Industry, Education, Foreign Affairs and 100s of other public and private organizations across 5 continents.
She has been changing the way organizations ‘plan for the unexpected’. Her facilitation skills enable organizations to achieve their own results and simplify their processes. She applies a fresh, energetic, fun, practical, easy-to-apply, innovative approach to BCM, Security, and Risk.
Her 'alter ego' includes being a lead singer in SophieG Music and contributing to the global charity playing for Change, which provides music education to children in disadvantaged regions.
Loris Mansiamina
A Senior GRC Professional consultant for Small, Medium and large companies. Over 10 years, Loris has been assisting clients in both public and private sectors about various matters relating to Gouvernance, Risk Management and Compliance (GRC), Digital transformation, cyber security program management, ISO 27k & ISO 20k implementation, COBIT & ITIL implementation, etc.
Date: December 19, 2023
Tags: ISO, ISO/IEC 27001, ISO/IEC 27035, Cybersecurity, Information Security
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
ISO/IEC 27035 Information Security Incident Management - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/yT8gxRZD_4c
Erau cybersecurity and security degreesERAUWebinars
Slides from a degree briefing presented in April 2018 covering Embry-Riddle degrees in Aviation Security and Cybersecurity. Covers the BS in Aviation Security, the MS in Cybersecurity Management and Policy, the MS in Cybersecurity Engineering, and Non-credit Aviation Cybersecurity 3-day course.
CRISC – Certified in Risk & Information Systems Control| Virtual and ClassroomBharathi Grover
CRISC certification training at Net Security Training is intended as an intense and hardcore exam preparation for ISACA’s Certified in Risk and Information Systems Control (CRISC) Examination. The four (4) domains of the ISACA CRISC syllabus is covered with a big focus on the Examination. The Official ISACA CRISC course Review Manual and Question, Answer and Explanation, (Q, A&E), supplements will ALSO be provided when attending. The Q, A&E is exceptional in helping delegates understand the ISACA style of questions, the type of answers ISACA CRISC training are looking for and it helps rapid memory assimilation of the material.
Cyber Security is the most important constituent of Information Technology
that protects all kinds of information systems, (personal or professional) against
all the vulnerabilities and potential attacks via the internet.
List of cybersecurity training courses by TonexWesley Comal
Cybersecurity Training
Cybersecurity training, IT Security Management Training, and Network Security Courses Seminars, In order for employees to stay current in their field of expertise, business and government organizations arrange for Cyber Security training and seminars, educational courses and training sessions that pertain to their specific niche in the industry. Tonex provides these types of specialized seminars, including telecom technology training courses for those in the telecommunications field. Our Cyber security training courses and seminars are continuously updated so that they reflect the latest industry trends, and they are also created by specialists in the industry who are familiar with the market climate.
Cybersecurity Training
Cybersecurity Foundation
Risk Management Framework (RMF)
Wireless Security Training
Visit Tonex cyber security website for more information
https://www.tonex.com/cybersecurity-training/
In Our Certified SOC Analyst course, candidates are taught by the industry’s most experienced trainers to acquire trending and in-demand technical skills. A Certified SOC Analyst Certification focuses on creating new career opportunities through extensive and meticulous knowledge paired with enhanced capabilities for a dynamic contribution to a SOC team.
2. TABLE OF CONTENTS
1. What Does CCISM Stand For?
2. History of CCISM Certification
• Mr. Whidden’s Expertise
• The Original CCISM Certification
3. The New CCISM Certification
• Skill Sets
• Overview of the Curriculum
• Structure of the CCISM Certification
• Format of the CCISM Certification Program
• Benefits of LMS System
• Accreditation/Certification of the CCISM Program
• Timeline
• Aims/Benefits
• What’s Next
3. WHAT DOES CCISM STAND FOR?
CCISM:
Certified Counterespionage
Information Security Manager
Certification
4. HISTORY OF THE CCISM CERTIFICATION
Glenn H. Whidden
(1928 – 2011)
The CCISM certification was developed by Glenn H. Whidden.
It was implemented by Mr. Whidden and Dr. Norman R. Bottom
through The Institute for Countermeasures Studies (ICS), a
subsidiary of Technical Services Agency, Inc.
5. HISTORY OF THE CCISM CERTIFICATION (Continued)
• Twenty-eight-year CIA veteran, retired 1974.
• Operated in 72 countries worldwide.
• Field experience in most types of espionage activity, including
mail intercepts, surreptitious entry, electronic eavesdropping
and Technical Surveillance Counter Measures (TSCM).
• Author of The Ear: Volume I, II, III
Mr. Whidden’s Expertise:
6. HISTORY OF THE CCISM CERTIFICATION (Continued)
• Former President of Technical
Services Agency Inc., a private
firm that designed and
marketed electronic
equipment for eavesdropping
detection.
• Holder of five U.S. patents.
More On Mr. Whidden’s Expertise:
• Founder & Sole Proprietor of The Institute for
Countermeasures Studies (ICS).
7. HISTORY OF THE CCISM CERTIFICATION (Continued)
More On Mr. Whidden’s Expertise:
• Part-time instructor at the World Institute of Security
Enhancement, Greensboro, N.C.
• Author of:
• A Guidebook for the Beginning Sweeper;
• The Russian Eavesdropping Threat -- Late 1993;
• The Attack on Axnan Headquarters;
• Five other books on the subject of counter
eavesdropping.
8. HISTORY OF THE CCISM CERTIFICATION (Continued)
• Prepared individuals to study potential
sources of threats, defeat attacks and
manage information security at an
organizational level.
• Focused on counterespionage and
TSCM.
• Did not address modern day cyber
issues that are within the realm of
cyber TSCM.
The Original CCISM Certification:
9. THE NEW CCISM CERTIFICATION
Certified Counterespionage Information Security Manager Certification
The NEW CCISM Certification Program Will Incorporate The
Following Skill Sets:
• Counterespionage
• Technical Surveillance Countermeasures (TSCM)
• Information Security/Cyber TSCM
A Management Level Certification
IT Focus on Cyber TSCM / Gaps Left By
Cyber Security
Not a Replacement for IT Cyber Security
Certification
10. THE NEW CCISM CERTIFICATION
Certified Counterespionage Information Security Manager Certification
Overview of CCISM Certification Curriculum:
The Certification Program Will:
• Include counter espionage, electrical engineering and
TSCM principles from The Ear, Vols. 1, 2 & 3.
• Identify the gaps between cyber TSCM and cyber
security disciplines.
• Incorporate methods for exploiting networks and cyber
security defenses within the realm of cyber TSCM.
• Provide counter measures detection methodologies for
Cyber TSCM and network exploitations.
11. THE NEW CCISM CERTIFICATION
Certified Counterespionage Information Security Manager Certification
Structure of the CCISM Certification Program:
Five (5) Separate Modules:
1. Electrical Engineering Principles
2. TSCM
3. Counterespionage
4. Network Principles
5. Cyber TSCM
Each module must be completed within a designated
period of time.
Each module must be completed before the next module is
begun.
12. THE NEW CCISM CERTIFICATION
Certified Counterespionage Information Security Manager Certification
Format of the New CCISM Certification Program:
• Program will utilize a Learning Management System (LMS)
platform for the majority of the course work.
LMS:
A software application for the administration,
documentation, tracking, reporting and delivery of
electronic educational technology (also called e-learning)
education courses or training programs.
• Prerequisite of apprenticeship in TSCM/Cyber TSCM field for
at least 2 years.
• Hands-on testing at 2017 ERII Annual Conference to receive
CCISM certification.
13. THE NEW CCISM CERTIFICATION
Certified Counterespionage Information Security Manager Certification
Benefits of LMS System:
• The LMS is online so it allows
students worldwide to
complete course materials
24/7, 365 days a year at their
convenience.
• Reduces costs/time for
maintenance of the program.
(e.g. No grading of test
papers manually.)
• Provides a more consistent presentation of course
materials. (e.g. No variation from instructor to instructor).
• Randomized questions and includes time controls to
prevent cheating.
14. THE NEW CCISM CERTIFICATION
Certified Counterespionage Information Security Manager Certification
Accreditation / Certification of the CCISM Program:
Program will be certified by The Espionage Research
Institute International (ERII) in the US.
Why Not Seek Private Accreditation?
• TSCM/Cyber TSCM is a specialized field.
• The Ear coursework was developed by Glenn Whidden,
the foremost TSCM expert.
• No organization has more expertise in the TSCM/Cyber
TSCM field than ERII.
15. THE NEW CCISM CERTIFICATION
Certified Counterespionage Information Security Manager Certification
Timeline:
Winter, 2015:
• Select LMS and begin adding The Ear modules.
• Simultaneously work with network and Cyber TSCM
experts to develop curriculum.
Summer, 2016:
• Complete adding The Ear modules, and begin offering
Vols. 1, 2 & 3 to students via the LMS.
• Begin developing the hands-on portion of the CCISM
certification program.
16. THE NEW CCISM CERTIFICATION
Certified Counterespionage Information Security Manager Certification
Timeline (continued):
Winter, 2016:
• Begin offering the network module in the LMS.
Spring/Summer, 2017:
• Begin offering the cyber TSCM module in the LMS.
Fall, 2017:
• Offer the hands-on exam at the 2017 ERII
Counterespionage Conference.
Winter, 2017:
• Award ERII’s first CCISM certifications
17. THE NEW CCISM CERTIFICATION
Certified Counterespionage Information Security Manager Certification
Aims:
• Set a standard for minimum course work/knowledge of
TSCM/Cyber TSCM professionals.
• Include both TSCM/Cyber TSCM to create a modernized
approach to electronic eavesdropping detection.
Benefits:
• Clearly distinguish Cyber TSCM from cyber security.
• Bring awareness to the relevance of Cyber TSCM and gaps in
cybersecurity programs.
18. THE NEW CCISM CERTIFICATION
Certified Counterespionage Information Security Manager Certification
What’s Next:
• We will be contacting individuals for networking and Cyber
TSCM module input and development.
ERII will be forming a CCISM advisory board. If you
would like to be considered for this advisory board or
If you know someone who would be of significant
value in the development of the curriculum for these
modules, please send their name, expertise and
contact details to J.D. LeaSure or Lisa LeaSure.
Thank you!