SlideShare a Scribd company logo
Meet the
panel
Director of Channel Business Development at
ISACA, CFA
Jeff Peters
Director of Content Marketing at Infosec
Chris DeMale
Today’s webcast
⮚ ISACA overview
⮚ Which ISACA certification is best for you?
 Certified Information Systems Auditor (CISA)
 Certified Information Security Manager (CISM)
⮚ Certified in Risk and Information Systems Control (CRISC)
⮚ Certified in the Governance of Enterprise IT (CGEIT)
⮚ Certified Data Privacy Solutions Engineer (CDPSE)
⮚ ISACA training resources
⮚ Q&A
Free ISACA resources
Download your free ISACA career kit:
 Guide to all ISACA certifications
 In-depth brochures for: CISA, CISM, CRISC
and CGEIT
 ISACA certification infographic
infosecinstitute.com/form/isaca-career-kit/
ISACA overview
Who is ISACA?
ISACA certifications are recognized globally as the industry standard
— and in many cases as job prerequisites — for IS/IT audit, control,
security, cybersecurity, risk, privacy and governance-related positions.
 Founded in 1969 by a small group of auditors
 Has grown to more than 145,000 members across more 180
countries
 Offers 8 certifications, as well as various certificate programs, such
as those for COBIT
Which ISACA certification is best
for you?
ISACA CISA certification
CISA is the globally recognized gold standard for
IS audit, control and assurance, in demand and
valued by leading global brands. It’s often a
mandatory qualification for employment as an IT
auditor. CISA professionals offer the credibility to
leverage standards, manage vulnerabilities,
ensure compliance, offer solutions, institute
controls and deliver value to organizations.
CISA exam domains
Information systems auditing
process (21%)
Governance and management
of IT (17%)
Information systems acquisition,
development and implementation (12%)
Information systems operations
and business resilience (23%)
Protection of information
assets (27%)
ISACA CISA by the numbers
Designed for entry- to mid-level IT pros
and internal auditors who audit for
information security compliance or are
engaged in risk and compliance:
 IT auditors
 Compliance and risk analysts
 Program managers
 Data protection managers
 Security officers and managers
 IT consultants
151,000+
# of cert holders
1978
Year created by ISACA
22%
Potential pay boost
$103,046
Avg. salary of CISA holders
45%
Have implemented
efficiencies in their org
52%
Say their expertise more
sought within their org
ISACA CISM certification
Designed for experienced security managers,
cybersecurity professionals and those who have
information security management
responsibilities. The CISM designation
demonstrates commitment to compliance,
security and integrity; ultimately contributing to
the attraction and retention of customers.
Information security
governance (24%)
Information risk
management (30%)
Information security program
development and management (27%)
Protection of information
assets (27%)
CISM domains
ISACA CISM by the numbers
Designed for technical experts looking to
move into strategic management
positions, such as:
 IT architects
 Security analysts
 Data security managers
 Security and compliance directors
 VPs and AVPs of information security
 CIOs, CISOs and CTOs
46,000+
# of cert holders
2002
Year created by ISACA
42%
Salary in managerial roles
$127,595
Avg. salary of CISM holders
70%
On-the-job performance
improvement
$3.86M
Avg. breach cost, which takes
280 days to find and contain
ISACA CRISC certification
Globally accepted management-focused
certification for professionals with three or more
years of experience which demonstrates
expertise in identifying and managing enterprise
IT risk and implementing and maintaining
information systems controls.
Governance (26%)
IT risk assessment (20%)
Risk response and reporting (32%)
Information technology and
security (22%)
CRISC domains
ISACA CRISC by the numbers
Designed for mid-level IT professionals
looking for career growth in IT risk:
 Risk and security managers
 IS or business analysts
 IS managers
 Operations managers
 Information control managers
 Chief Information Security Officers (CISO)
 Chief Compliance Officers (CCO)
30,000+
# of cert holders
2010
Year created by ISACA
#4
Highest-paying cert
$123,184
Avg. salary of CRISC holders
44%
Employers who say
certs boost productivity
#1
Best governance, risk
and compliance certs
ISACA CGEIT certification
CGEIT recognizes professionals with 5 or more
years of experience establishing and managing a
framework for the Governance of I&T as well as
serving in an advisory or oversight role, and/or
otherwise supporting the governance of the IT-
related contributions. Globally-recognized and
transferable across all industries, CGEIT
empowers individuals to handle the governance
of an entire organization and consider a move to
the C-suite, if not already there.
Governance and management
of IT (25%)
Strategic management (20%)
Benefits realization (16%)
Risk optimization (24%)
Resource optimization (15%)
CGEIT domains
ISACA CGEIT by the numbers
Designed for highly experienced strategic
IT professionals who are in the role of
advisors to upper management and the
board:
 CIOs, CTOs and CISOs
 Senior IT internal auditors
 Lead analysts — IT governance, risk
and compliance
 Security risk and compliance specialist
 Information security compliance
manager
 Governance risk consultant
8,000+
# of cert holders
2008
Year created by ISACA
$133,132
Avg. salary of CGEIT holders
96%
Avg. annual renewal rate
90%+
More effective teams
#2
Best governance, risk
and compliance certs
ISACA CDPSE certification
The CDPSE certification validates privacy
technologists’ ability to implement privacy by
design solutions into new and existing networks,
platforms and products, building customer and
stakeholder trust and mitigating risks of
noncompliance.
Privacy governance (34%)
Privacy architecture (36%)
Data lifecycle (30%)
CDPSE domains
ISACA CDPSE by the numbers
Designed for technical IT professionals
with some experience implementing
privacy controls:
 Data analysts
 Privacy engineers
 Privacy solutions architects
 Lead privacy managers
 IT consultants
18,000+
Signed up in
grandfathering period
2021
Year created by ISACA
Biggest challenges facing a successful
privacy program:
45%
Lack of clarity on
the privacy
mandate, roles and
responsibilities
41%
Lack of executive
or business
support for
initiatives
41%
Lack of
competent
resources
ISACA training resources
Get certified with Infosec Skills
Train for your ISACA certification with Infosec Skills:
Infosec Skills subscription:
 130+ role-based learning paths (e.g., CISA, CISM,
Cybersecurity Foundations, Ethical Hacking)
 100s of hands-on labs in cloud-hosted cyber ranges
 Custom certification practice exams and skill assessments
Infosec Skills live boot camp:
 Live, instructor-led training (in-person or live online)
 Certification exam voucher
 90 day extended access to recordings of daily lessons, plus
all materials in Infosec Skills
 Exam Pass Guarantee
infosecinstitute.com/skills
Questions?
About us
Infosec believes knowledge is power when fighting
cybercrime. We help IT and security professionals advance
their careers with skills development and certifications
while empowering all employees with security awareness
and privacy training to stay cyber-safe at work and home.
www.infosecinstitute.com

More Related Content

What's hot

SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
Jonathan Sinclair
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat ModelingMarco Morana
 
2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf
ControlCase
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
Yokogawa1
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
Resilient Systems
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
The Open Group SA
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Edureka!
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
Ralf Braga
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
YouAttestSlideshare
 
Overview of National Cybersecurity Strategy 2023.pdf
Overview of National Cybersecurity Strategy 2023.pdfOverview of National Cybersecurity Strategy 2023.pdf
Overview of National Cybersecurity Strategy 2023.pdf
Niloufer Tamboly
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptx
SandeepK707540
 
Iso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training courseIso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training course
Mart Rovers
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
Digital Bond
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
Priyanka Aash
 

What's hot (20)

SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
 
Overview of National Cybersecurity Strategy 2023.pdf
Overview of National Cybersecurity Strategy 2023.pdfOverview of National Cybersecurity Strategy 2023.pdf
Overview of National Cybersecurity Strategy 2023.pdf
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptx
 
Iso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training courseIso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training course
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
CyberArk
CyberArkCyberArk
CyberArk
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 

Similar to Isaca career paths - the highest paying certifications in the industry

Professional Designations in IT Governance
Professional Designations in IT GovernanceProfessional Designations in IT Governance
Professional Designations in IT Governance
jkllee
 
Professional designations in it governance
Professional designations in it governanceProfessional designations in it governance
Professional designations in it governance
jkllee
 
CompTIA CySA+ domains and their Weightage.pptx
CompTIA CySA+ domains and their Weightage.pptxCompTIA CySA+ domains and their Weightage.pptx
CompTIA CySA+ domains and their Weightage.pptx
Infosectrain3
 
CISSP Vs. CISA Which is better for you.pptx
CISSP Vs. CISA Which is better for you.pptxCISSP Vs. CISA Which is better for you.pptx
CISSP Vs. CISA Which is better for you.pptx
Infosectrain3
 
File1
File1File1
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
infosec train
 
Cyber-Security Certifications
Cyber-Security CertificationsCyber-Security Certifications
Cyber-Security Certifications
Nithin Sai
 
Cybersecurity Skills Audit
Cybersecurity Skills AuditCybersecurity Skills Audit
Cybersecurity Skills Audit
Vilius Benetis
 
5548 isaca for-students
5548 isaca for-students5548 isaca for-students
5548 isaca for-students
Universitas Bina Darma Palembang
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to know
Infosec
 
Know about cisa certification
Know about cisa certificationKnow about cisa certification
Know about cisa certification
JasonRoy50
 
CRISC Certification Training Brochure.pptx
CRISC Certification Training Brochure.pptxCRISC Certification Training Brochure.pptx
CRISC Certification Training Brochure.pptx
Spoclearn Inc.
 
CRISC Certification Training Brochure.pptx
CRISC Certification Training Brochure.pptxCRISC Certification Training Brochure.pptx
CRISC Certification Training Brochure.pptx
Spoclearn Inc.
 
What’s New in CYSA+ Exam (CSO-002).pdf
What’s New in CYSA+ Exam (CSO-002).pdfWhat’s New in CYSA+ Exam (CSO-002).pdf
What’s New in CYSA+ Exam (CSO-002).pdf
infosec train
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
Ulf Mattsson
 
Track-2307_KUKREJA.potx
Track-2307_KUKREJA.potxTrack-2307_KUKREJA.potx
Track-2307_KUKREJA.potxPuneet Kukreja
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
Prime Infoserv
 
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfAdaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfawish11
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
SagarNegi10
 
A Career in Cybersecurity
A Career in CybersecurityA Career in Cybersecurity
A Career in Cybersecurity
lfh663
 

Similar to Isaca career paths - the highest paying certifications in the industry (20)

Professional Designations in IT Governance
Professional Designations in IT GovernanceProfessional Designations in IT Governance
Professional Designations in IT Governance
 
Professional designations in it governance
Professional designations in it governanceProfessional designations in it governance
Professional designations in it governance
 
CompTIA CySA+ domains and their Weightage.pptx
CompTIA CySA+ domains and their Weightage.pptxCompTIA CySA+ domains and their Weightage.pptx
CompTIA CySA+ domains and their Weightage.pptx
 
CISSP Vs. CISA Which is better for you.pptx
CISSP Vs. CISA Which is better for you.pptxCISSP Vs. CISA Which is better for you.pptx
CISSP Vs. CISA Which is better for you.pptx
 
File1
File1File1
File1
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
 
Cyber-Security Certifications
Cyber-Security CertificationsCyber-Security Certifications
Cyber-Security Certifications
 
Cybersecurity Skills Audit
Cybersecurity Skills AuditCybersecurity Skills Audit
Cybersecurity Skills Audit
 
5548 isaca for-students
5548 isaca for-students5548 isaca for-students
5548 isaca for-students
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to know
 
Know about cisa certification
Know about cisa certificationKnow about cisa certification
Know about cisa certification
 
CRISC Certification Training Brochure.pptx
CRISC Certification Training Brochure.pptxCRISC Certification Training Brochure.pptx
CRISC Certification Training Brochure.pptx
 
CRISC Certification Training Brochure.pptx
CRISC Certification Training Brochure.pptxCRISC Certification Training Brochure.pptx
CRISC Certification Training Brochure.pptx
 
What’s New in CYSA+ Exam (CSO-002).pdf
What’s New in CYSA+ Exam (CSO-002).pdfWhat’s New in CYSA+ Exam (CSO-002).pdf
What’s New in CYSA+ Exam (CSO-002).pdf
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Track-2307_KUKREJA.potx
Track-2307_KUKREJA.potxTrack-2307_KUKREJA.potx
Track-2307_KUKREJA.potx
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfAdaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
A Career in Cybersecurity
A Career in CybersecurityA Career in Cybersecurity
A Career in Cybersecurity
 

More from Infosec

AWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certifiedAWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certified
Infosec
 
AWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certifiedAWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certified
Infosec
 
AWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certifiedAWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certified
Infosec
 
AWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptxAWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptx
Infosec
 
Infosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptxInfosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec
 
How AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxHow AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptx
Infosec
 
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
Infosec
 
NCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptxNCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptx
Infosec
 
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowCompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
Infosec
 
Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...
Infosec
 
Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...
Infosec
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter most
Infosec
 
Join the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxJoin the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptx
Infosec
 
Threat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxThreat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptx
Infosec
 
How to do application security right
How to do application security rightHow to do application security right
How to do application security right
Infosec
 
A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...
Infosec
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident response
Infosec
 
Get started in cybersecurity in 2022
Get started in cybersecurity in 2022Get started in cybersecurity in 2022
Get started in cybersecurity in 2022
Infosec
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
Infosec
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new exam
Infosec
 

More from Infosec (20)

AWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certifiedAWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certified
 
AWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certifiedAWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certified
 
AWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certifiedAWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certified
 
AWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptxAWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptx
 
Infosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptxInfosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptx
 
How AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxHow AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptx
 
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
 
NCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptxNCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptx
 
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowCompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
 
Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...
 
Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter most
 
Join the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxJoin the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptx
 
Threat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxThreat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptx
 
How to do application security right
How to do application security rightHow to do application security right
How to do application security right
 
A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident response
 
Get started in cybersecurity in 2022
Get started in cybersecurity in 2022Get started in cybersecurity in 2022
Get started in cybersecurity in 2022
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new exam
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Isaca career paths - the highest paying certifications in the industry

  • 1.
  • 2. Meet the panel Director of Channel Business Development at ISACA, CFA Jeff Peters Director of Content Marketing at Infosec Chris DeMale
  • 3. Today’s webcast ⮚ ISACA overview ⮚ Which ISACA certification is best for you?  Certified Information Systems Auditor (CISA)  Certified Information Security Manager (CISM) ⮚ Certified in Risk and Information Systems Control (CRISC) ⮚ Certified in the Governance of Enterprise IT (CGEIT) ⮚ Certified Data Privacy Solutions Engineer (CDPSE) ⮚ ISACA training resources ⮚ Q&A
  • 4. Free ISACA resources Download your free ISACA career kit:  Guide to all ISACA certifications  In-depth brochures for: CISA, CISM, CRISC and CGEIT  ISACA certification infographic infosecinstitute.com/form/isaca-career-kit/
  • 6. Who is ISACA? ISACA certifications are recognized globally as the industry standard — and in many cases as job prerequisites — for IS/IT audit, control, security, cybersecurity, risk, privacy and governance-related positions.  Founded in 1969 by a small group of auditors  Has grown to more than 145,000 members across more 180 countries  Offers 8 certifications, as well as various certificate programs, such as those for COBIT
  • 7.
  • 8. Which ISACA certification is best for you?
  • 9. ISACA CISA certification CISA is the globally recognized gold standard for IS audit, control and assurance, in demand and valued by leading global brands. It’s often a mandatory qualification for employment as an IT auditor. CISA professionals offer the credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to organizations. CISA exam domains Information systems auditing process (21%) Governance and management of IT (17%) Information systems acquisition, development and implementation (12%) Information systems operations and business resilience (23%) Protection of information assets (27%)
  • 10. ISACA CISA by the numbers Designed for entry- to mid-level IT pros and internal auditors who audit for information security compliance or are engaged in risk and compliance:  IT auditors  Compliance and risk analysts  Program managers  Data protection managers  Security officers and managers  IT consultants 151,000+ # of cert holders 1978 Year created by ISACA 22% Potential pay boost $103,046 Avg. salary of CISA holders 45% Have implemented efficiencies in their org 52% Say their expertise more sought within their org
  • 11. ISACA CISM certification Designed for experienced security managers, cybersecurity professionals and those who have information security management responsibilities. The CISM designation demonstrates commitment to compliance, security and integrity; ultimately contributing to the attraction and retention of customers. Information security governance (24%) Information risk management (30%) Information security program development and management (27%) Protection of information assets (27%) CISM domains
  • 12. ISACA CISM by the numbers Designed for technical experts looking to move into strategic management positions, such as:  IT architects  Security analysts  Data security managers  Security and compliance directors  VPs and AVPs of information security  CIOs, CISOs and CTOs 46,000+ # of cert holders 2002 Year created by ISACA 42% Salary in managerial roles $127,595 Avg. salary of CISM holders 70% On-the-job performance improvement $3.86M Avg. breach cost, which takes 280 days to find and contain
  • 13. ISACA CRISC certification Globally accepted management-focused certification for professionals with three or more years of experience which demonstrates expertise in identifying and managing enterprise IT risk and implementing and maintaining information systems controls. Governance (26%) IT risk assessment (20%) Risk response and reporting (32%) Information technology and security (22%) CRISC domains
  • 14. ISACA CRISC by the numbers Designed for mid-level IT professionals looking for career growth in IT risk:  Risk and security managers  IS or business analysts  IS managers  Operations managers  Information control managers  Chief Information Security Officers (CISO)  Chief Compliance Officers (CCO) 30,000+ # of cert holders 2010 Year created by ISACA #4 Highest-paying cert $123,184 Avg. salary of CRISC holders 44% Employers who say certs boost productivity #1 Best governance, risk and compliance certs
  • 15. ISACA CGEIT certification CGEIT recognizes professionals with 5 or more years of experience establishing and managing a framework for the Governance of I&T as well as serving in an advisory or oversight role, and/or otherwise supporting the governance of the IT- related contributions. Globally-recognized and transferable across all industries, CGEIT empowers individuals to handle the governance of an entire organization and consider a move to the C-suite, if not already there. Governance and management of IT (25%) Strategic management (20%) Benefits realization (16%) Risk optimization (24%) Resource optimization (15%) CGEIT domains
  • 16. ISACA CGEIT by the numbers Designed for highly experienced strategic IT professionals who are in the role of advisors to upper management and the board:  CIOs, CTOs and CISOs  Senior IT internal auditors  Lead analysts — IT governance, risk and compliance  Security risk and compliance specialist  Information security compliance manager  Governance risk consultant 8,000+ # of cert holders 2008 Year created by ISACA $133,132 Avg. salary of CGEIT holders 96% Avg. annual renewal rate 90%+ More effective teams #2 Best governance, risk and compliance certs
  • 17. ISACA CDPSE certification The CDPSE certification validates privacy technologists’ ability to implement privacy by design solutions into new and existing networks, platforms and products, building customer and stakeholder trust and mitigating risks of noncompliance. Privacy governance (34%) Privacy architecture (36%) Data lifecycle (30%) CDPSE domains
  • 18. ISACA CDPSE by the numbers Designed for technical IT professionals with some experience implementing privacy controls:  Data analysts  Privacy engineers  Privacy solutions architects  Lead privacy managers  IT consultants 18,000+ Signed up in grandfathering period 2021 Year created by ISACA Biggest challenges facing a successful privacy program: 45% Lack of clarity on the privacy mandate, roles and responsibilities 41% Lack of executive or business support for initiatives 41% Lack of competent resources
  • 20. Get certified with Infosec Skills Train for your ISACA certification with Infosec Skills: Infosec Skills subscription:  130+ role-based learning paths (e.g., CISA, CISM, Cybersecurity Foundations, Ethical Hacking)  100s of hands-on labs in cloud-hosted cyber ranges  Custom certification practice exams and skill assessments Infosec Skills live boot camp:  Live, instructor-led training (in-person or live online)  Certification exam voucher  90 day extended access to recordings of daily lessons, plus all materials in Infosec Skills  Exam Pass Guarantee infosecinstitute.com/skills
  • 22. About us Infosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. www.infosecinstitute.com