CINXE.COM
Best Information Security Blogs | Executive Management | EC-Council
<!DOCTYPE html> <!--[if !(IE 6) | !(IE 7) | !(IE 8) ]><!--> <html lang="en-US" class="no-js"> <!--<![endif]--> <head> <meta charset="UTF-8" /> <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=1"> <link rel="profile" href="https://gmpg.org/xfn/11" /> <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' /> <style>img:is([sizes="auto" i], [sizes^="auto," i]) { contain-intrinsic-size: 3000px 1500px }</style> <!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v24.3) - https://yoast.com/wordpress/plugins/seo/ --> <title>Best Information Security Blogs | Executive Management | EC-Council</title> <meta name="description" content="Looking for the best information security blogs? Look no further! This list of top CISOs provides you with everything you need to know about leading a successful security team." /> <link rel="canonical" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/" /> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="article" /> <meta property="og:title" content="Executive Management" /> <meta property="og:description" content="Looking for the best information security blogs? Look no further! This list of top CISOs provides you with everything you need to know about leading a successful security team." /> <meta property="og:url" content="https://www.eccouncil.org/cybersecurity-exchange/executive-management/" /> <meta property="og:site_name" content="Cybersecurity Exchange" /> <meta property="article:modified_time" content="2023-04-19T06:34:02+00:00" /> <meta property="og:image" content="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/03/Career-and-Leadership.jpg" /> <meta property="og:image:width" content="1200" /> <meta property="og:image:height" content="630" /> <meta property="og:image:type" content="image/jpeg" /> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:label1" content="Est. reading time" /> <meta name="twitter:data1" content="5 minutes" /> <script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"WebPage","@id":"https://www.eccouncil.org/cybersecurity-exchange/executive-management/","url":"https://www.eccouncil.org/cybersecurity-exchange/executive-management/","name":"Best Information Security Blogs | Executive Management | EC-Council","isPartOf":{"@id":"https://eccouncil.org/cybersecurity-exchange/#website"},"primaryImageOfPage":{"@id":"https://www.eccouncil.org/cybersecurity-exchange/executive-management/#primaryimage"},"image":{"@id":"https://www.eccouncil.org/cybersecurity-exchange/executive-management/#primaryimage"},"thumbnailUrl":"https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/03/Career-and-Leadership.jpg","datePublished":"2022-03-15T16:11:34+00:00","dateModified":"2023-04-19T06:34:02+00:00","description":"Looking for the best information security blogs? Look no further! This list of top CISOs provides you with everything you need to know about leading a successful security team.","breadcrumb":{"@id":"https://www.eccouncil.org/cybersecurity-exchange/executive-management/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https://www.eccouncil.org/cybersecurity-exchange/executive-management/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.eccouncil.org/cybersecurity-exchange/executive-management/#primaryimage","url":"https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/03/Career-and-Leadership.jpg","contentUrl":"https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/03/Career-and-Leadership.jpg","width":1200,"height":630,"caption":"Career and Leadership"},{"@type":"BreadcrumbList","@id":"https://www.eccouncil.org/cybersecurity-exchange/executive-management/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"EC-Council","item":"https://www.eccouncil.org/cybersecurity-exchange/"},{"@type":"ListItem","position":2,"name":"Executive Management"}]},{"@type":"WebSite","@id":"https://eccouncil.org/cybersecurity-exchange/#website","url":"https://eccouncil.org/cybersecurity-exchange/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https://eccouncil.org/cybersecurity-exchange/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://eccouncil.org/cybersecurity-exchange/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https://eccouncil.org/cybersecurity-exchange/#organization","name":"Cybersecurity Exchange","url":"https://eccouncil.org/cybersecurity-exchange/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://eccouncil.org/cybersecurity-exchange/#/schema/logo/image/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https://eccouncil.org/cybersecurity-exchange/#/schema/logo/image/"}}]}</script> <!-- / Yoast SEO Premium plugin. --> <link rel='dns-prefetch' href='//www.eccouncil.org' /> <link rel='dns-prefetch' href='//www.google.com' /> <link rel='dns-prefetch' href='//fonts.googleapis.com' /> <link rel="alternate" type="application/rss+xml" title="Cybersecurity Exchange » Feed" href="https://www.eccouncil.org/cybersecurity-exchange/feed/" /> <link rel="alternate" type="application/rss+xml" title="Cybersecurity Exchange » Comments Feed" href="https://www.eccouncil.org/cybersecurity-exchange/comments/feed/" /> <script> window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.7.1"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); </script> <style id='wp-emoji-styles-inline-css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <style id='classic-theme-styles-inline-css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <style id='global-styles-inline-css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #FFF;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--color--accent: #999999;--wp--preset--color--dark-gray: #111;--wp--preset--color--light-gray: #767676;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='the7-font-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/fonts/icomoon-the7-font/icomoon-the7-font.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='the7-awesome-fonts-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/fonts/FontAwesome/css/all.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='elementor-frontend-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/frontend.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='widget-image-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-image.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='the7_horizontal-menu-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-horizontal-menu-widget.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='the7-icon-widget-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-icon-widget.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='the7-e-sticky-effect-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-sticky-effects.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='widget-social-icons-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-social-icons.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='e-apple-webkit-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/conditionals/apple-webkit.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='widget-text-editor-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-text-editor.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='widget-divider-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-divider.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='elementor-post-19542-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-19542.css?ver=1735024234' media='all' /> <link rel='stylesheet' id='e-popup-style-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor-pro/assets/css/conditionals/popup.min.css?ver=3.25.5' media='all' /> <link rel='stylesheet' id='widget-heading-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-heading.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='widget-spacer-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-spacer.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='the7-filter-decorations-base-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-filter-decorations-base.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='the7-simple-common-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-simple-common.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='the7-elements-simple-posts-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-simple-posts.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='elementor-post-76841-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-76841.css?ver=1735048598' media='all' /> <link rel='stylesheet' id='elementor-post-50845-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-50845.css?ver=1735024235' media='all' /> <link rel='stylesheet' id='elementor-post-21569-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-21569.css?ver=1735024235' media='all' /> <link rel='stylesheet' id='elementor-post-50913-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-50913.css?ver=1735024240' media='all' /> <link rel='stylesheet' id='dt-web-fonts-css' href='https://fonts.googleapis.com/css?family=Nunito+Sans:200,300,400,600,700%7CRoboto:400,600,700%7CNunito:300,400,600,700%7CMerriweather:400,600,700' media='all' /> <link rel='stylesheet' id='dt-main-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/main.min.css?ver=12.2.0' media='all' /> <style id='dt-main-inline-css'> body #load { display: block; height: 100%; overflow: hidden; position: fixed; width: 100%; z-index: 9901; opacity: 1; visibility: visible; transition: all .35s ease-out; } .load-wrap { width: 100%; height: 100%; background-position: center center; background-repeat: no-repeat; text-align: center; display: -ms-flexbox; display: -ms-flex; display: flex; -ms-align-items: center; -ms-flex-align: center; align-items: center; -ms-flex-flow: column wrap; flex-flow: column wrap; -ms-flex-pack: center; -ms-justify-content: center; justify-content: center; } .load-wrap > svg { position: absolute; top: 50%; left: 50%; transform: translate(-50%,-50%); } #load { background: var(--the7-elementor-beautiful-loading-bg,#ffffff); --the7-beautiful-spinner-color2: var(--the7-beautiful-spinner-color,rgba(0,0,0,0.12)); } </style> <link rel='stylesheet' id='the7-custom-scrollbar-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/lib/custom-scrollbar/custom-scrollbar.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='the7-core-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/dt-the7-core/assets/css/post-type.min.css?ver=2.7.10' media='all' /> <link rel='stylesheet' id='the7-css-vars-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/the7-css/css-vars.css?ver=baeca5dfba94' media='all' /> <link rel='stylesheet' id='dt-custom-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/the7-css/custom.css?ver=baeca5dfba94' media='all' /> <link rel='stylesheet' id='dt-media-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/the7-css/media.css?ver=baeca5dfba94' media='all' /> <link rel='stylesheet' id='the7-mega-menu-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/the7-css/mega-menu.css?ver=baeca5dfba94' media='all' /> <link rel='stylesheet' id='the7-elements-albums-portfolio-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/the7-css/the7-elements-albums-portfolio.css?ver=baeca5dfba94' media='all' /> <link rel='stylesheet' id='the7-elements-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/the7-css/post-type-dynamic.css?ver=baeca5dfba94' media='all' /> <link rel='stylesheet' id='style-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7-child/style.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='the7-elementor-global-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/elementor-global.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='eael-general-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/essential-addons-for-elementor-lite/assets/front-end/css/view/general.min.css?ver=6.1.1' media='all' /> <link rel='stylesheet' id='ecs-styles-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/ele-custom-skin/assets/css/ecs-style.css?ver=3.1.9' media='all' /> <link rel='stylesheet' id='elementor-post-78847-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-78847.css?ver=1698847797' media='all' /> <link rel='stylesheet' id='google-fonts-1-css' href='https://fonts.googleapis.com/css?family=DM+Sans%3A100%2C100italic%2C200%2C200italic%2C300%2C300italic%2C400%2C400italic%2C500%2C500italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%2C900%2C900italic%7CInter%3A100%2C100italic%2C200%2C200italic%2C300%2C300italic%2C400%2C400italic%2C500%2C500italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%2C900%2C900italic%7CAssistant%3A100%2C100italic%2C200%2C200italic%2C300%2C300italic%2C400%2C400italic%2C500%2C500italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%2C900%2C900italic&display=auto&ver=6.7.1' media='all' /> <link rel='stylesheet' id='elementor-icons-the7-icons-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/fonts/icomoon-the7-font/icomoon-the7-font.min.css?ver=12.2.0' media='all' /> <link rel="preconnect" href="https://fonts.gstatic.com/" crossorigin><script src="https://www.eccouncil.org/cybersecurity-exchange/wp-includes/js/jquery/jquery.min.js?ver=3.7.1" id="jquery-core-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script> <script id="dt-above-fold-js-extra"> var dtLocal = {"themeUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/themes\/dt-the7","passText":"To view this protected post, enter the password below:","moreButtonText":{"loading":"Loading...","loadMore":"Load more"},"postID":"76841","ajaxurl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","REST":{"baseUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/the7\/v1","endpoints":{"sendMail":"\/send-mail"}},"contactMessages":{"required":"One or more fields have an error. Please check and try again.","terms":"Please accept the privacy policy.","fillTheCaptchaError":"Please, fill the captcha."},"captchaSiteKey":"","ajaxNonce":"3f9d1e1d83","pageData":{"type":"page","template":"page","layout":null},"themeSettings":{"smoothScroll":"off","lazyLoading":false,"desktopHeader":{"height":""},"ToggleCaptionEnabled":"disabled","ToggleCaption":"Navigation","floatingHeader":{"showAfter":94,"showMenu":false,"height":64,"logo":{"showLogo":true,"html":"","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"}},"topLine":{"floatingTopLine":{"logo":{"showLogo":false,"html":""}}},"mobileHeader":{"firstSwitchPoint":1150,"secondSwitchPoint":600,"firstSwitchPointHeight":60,"secondSwitchPointHeight":50,"mobileToggleCaptionEnabled":"right","mobileToggleCaption":"Menu"},"stickyMobileHeaderFirstSwitch":{"logo":{"html":""}},"stickyMobileHeaderSecondSwitch":{"logo":{"html":""}},"sidebar":{"switchPoint":992},"boxedWidth":"1280px"},"elementor":{"settings":{"container_width":1200}}}; var dtShare = {"shareButtonText":{"facebook":"Share on Facebook","twitter":"Share on X","pinterest":"Pin it","linkedin":"Share on Linkedin","whatsapp":"Share on Whatsapp"},"overlayOpacity":"90"}; </script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/above-the-fold.min.js?ver=12.2.0" id="dt-above-fold-js"></script> <script id="ecs_ajax_load-js-extra"> var ecs_ajax_params = {"ajaxurl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","posts":"{\"page\":0,\"pagename\":\"executive-management\",\"error\":\"\",\"m\":\"\",\"p\":0,\"post_parent\":\"\",\"subpost\":\"\",\"subpost_id\":\"\",\"attachment\":\"\",\"attachment_id\":0,\"name\":\"executive-management\",\"page_id\":0,\"second\":\"\",\"minute\":\"\",\"hour\":\"\",\"day\":0,\"monthnum\":0,\"year\":0,\"w\":0,\"category_name\":\"\",\"tag\":\"\",\"cat\":\"\",\"tag_id\":\"\",\"author\":\"\",\"author_name\":\"\",\"feed\":\"\",\"tb\":\"\",\"paged\":0,\"meta_key\":\"\",\"meta_value\":\"\",\"preview\":\"\",\"s\":\"\",\"sentence\":\"\",\"title\":\"\",\"fields\":\"\",\"menu_order\":\"\",\"embed\":\"\",\"category__in\":[],\"category__not_in\":[],\"category__and\":[],\"post__in\":[],\"post__not_in\":[],\"post_name__in\":[],\"tag__in\":[],\"tag__not_in\":[],\"tag__and\":[],\"tag_slug__in\":[],\"tag_slug__and\":[],\"post_parent__in\":[],\"post_parent__not_in\":[],\"author__in\":[],\"author__not_in\":[],\"search_columns\":[],\"post_type\":[\"post\",\"page\",\"e-landing-page\"],\"ignore_sticky_posts\":false,\"suppress_filters\":false,\"cache_results\":true,\"update_post_term_cache\":true,\"update_menu_item_cache\":false,\"lazy_load_term_meta\":true,\"update_post_meta_cache\":true,\"posts_per_page\":10,\"nopaging\":false,\"comments_per_page\":\"50\",\"no_found_rows\":false,\"order\":\"DESC\"}"}; </script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/ele-custom-skin/assets/js/ecs_ajax_pagination.js?ver=3.1.9" id="ecs_ajax_load-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/ele-custom-skin/assets/js/ecs.js?ver=3.1.9" id="ecs-script-js"></script> <link rel="https://api.w.org/" href="https://www.eccouncil.org/cybersecurity-exchange/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://www.eccouncil.org/cybersecurity-exchange/wp-json/wp/v2/pages/76841" /><link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://www.eccouncil.org/cybersecurity-exchange/xmlrpc.php?rsd" /> <meta name="generator" content="WordPress 6.7.1" /> <link rel='shortlink' href='https://www.eccouncil.org/cybersecurity-exchange/?p=76841' /> <link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://www.eccouncil.org/cybersecurity-exchange/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.eccouncil.org%2Fcybersecurity-exchange%2Fexecutive-management%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://www.eccouncil.org/cybersecurity-exchange/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.eccouncil.org%2Fcybersecurity-exchange%2Fexecutive-management%2F&format=xml" /> <meta name="generator" content="Elementor 3.27.2; features: e_font_icon_svg; settings: css_print_method-external, google_font-enabled, font_display-auto"> <!-- Google Tag Manager --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-M5VLP9X');</script> <!-- End Google Tag Manager --> <!--<script src="https://www.googleoptimize.com/optimize.js?id=GTM-5ZS5R76"></script>--> <!-- Global site tag (gtag.js) - Google Ads: 1028393842 --> <script async src="https://www.googletagmanager.com/gtag/js?id=AW-1028393842"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'AW-1028393842'); </script> <!--End--> <!-- This site is converting visitors into subscribers and customers with OptinMonster - https://optinmonster.com --> <script>(function(d,u,ac){var s=d.createElement('script');s.type='text/javascript';s.src='https://a.omappapi.com/app/js/api.min.js';s.async=true;s.dataset.user=u;s.dataset.account=ac;d.getElementsByTagName('head')[0].appendChild(s);})(document,159113,172974);</script> <!-- / https://optinmonster.com --> <style> .e-con.e-parent:nth-of-type(n+4):not(.e-lazyloaded):not(.e-no-lazyload), .e-con.e-parent:nth-of-type(n+4):not(.e-lazyloaded):not(.e-no-lazyload) * { background-image: none !important; } @media screen and (max-height: 1024px) { .e-con.e-parent:nth-of-type(n+3):not(.e-lazyloaded):not(.e-no-lazyload), .e-con.e-parent:nth-of-type(n+3):not(.e-lazyloaded):not(.e-no-lazyload) * { background-image: none !important; } } @media screen and (max-height: 640px) { .e-con.e-parent:nth-of-type(n+2):not(.e-lazyloaded):not(.e-no-lazyload), .e-con.e-parent:nth-of-type(n+2):not(.e-lazyloaded):not(.e-no-lazyload) * { background-image: none !important; } } </style> <script type="text/javascript" id="the7-loader-script"> document.addEventListener("DOMContentLoaded", function(event) { var load = document.getElementById("load"); if(!load.classList.contains('loader-removed')){ var removeLoading = setTimeout(function() { load.className += " loader-removed"; }, 300); } }); </script> <link rel="icon" href="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/cropped-fav-icon-3-32x32.png" sizes="32x32" /> <link rel="icon" href="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/cropped-fav-icon-3-192x192.png" sizes="192x192" /> <link rel="apple-touch-icon" href="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/cropped-fav-icon-3-180x180.png" /> <meta name="msapplication-TileImage" content="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/cropped-fav-icon-3-270x270.png" /> <style id="wp-custom-css"> .eael-grid-post-holder-inner { min-height: 330px; } .elementor-heading-title { line-height: 1.3 !important} .menu-item-text, h5.ele-entry-title{ word-spacing:0 !important; } h5{ word-spacing: 0px; } h6.heading{ word-spacing: 0px !important; } .gform_legacy_markup_wrapper li.hidden_label input{ margin-top:0 !important; } </style> <style id='the7-custom-inline-css' type='text/css'> .sub-nav .menu-item i.fa, .sub-nav .menu-item i.fas, .sub-nav .menu-item i.far, .sub-nav .menu-item i.fab { text-align: center; width: 1.25em; } </style> </head> <body id="the7-body" class="page-template-default page page-id-76841 wp-embed-responsive the7-core-ver-2.7.10 title-off dt-responsive-on right-mobile-menu-close-icon ouside-menu-close-icon mobile-close-right-caption fade-thin-mobile-menu-close-icon fade-medium-menu-close-icon srcset-enabled btn-flat custom-btn-color custom-btn-hover-color first-switch-logo-left first-switch-menu-right second-switch-logo-left second-switch-menu-right right-mobile-menu layzr-loading-on no-avatars popup-message-style the7-ver-12.2.0 dt-fa-compatibility elementor-default elementor-template-full-width elementor-clear-template elementor-kit-19542 elementor-page elementor-page-76841 elementor-page-50913"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M5VLP9X" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- The7 12.2.0 --> <div id="load" class="spinner-loader"> <div class="load-wrap"><style type="text/css"> [class*="the7-spinner-animate-"]{ animation: spinner-animation 1s cubic-bezier(1,1,1,1) infinite; x:46.5px; y:40px; width:7px; height:20px; fill:var(--the7-beautiful-spinner-color2); opacity: 0.2; } .the7-spinner-animate-2{ animation-delay: 0.083s; } .the7-spinner-animate-3{ animation-delay: 0.166s; } .the7-spinner-animate-4{ animation-delay: 0.25s; } .the7-spinner-animate-5{ animation-delay: 0.33s; } .the7-spinner-animate-6{ animation-delay: 0.416s; } .the7-spinner-animate-7{ animation-delay: 0.5s; } .the7-spinner-animate-8{ animation-delay: 0.58s; } .the7-spinner-animate-9{ animation-delay: 0.666s; } .the7-spinner-animate-10{ animation-delay: 0.75s; } .the7-spinner-animate-11{ animation-delay: 0.83s; } .the7-spinner-animate-12{ animation-delay: 0.916s; } @keyframes spinner-animation{ from { opacity: 1; } to{ opacity: 0; } } </style> <svg width="75px" height="75px" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100" preserveAspectRatio="xMidYMid"> <rect class="the7-spinner-animate-1" rx="5" ry="5" transform="rotate(0 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-2" rx="5" ry="5" transform="rotate(30 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-3" rx="5" ry="5" transform="rotate(60 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-4" rx="5" ry="5" transform="rotate(90 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-5" rx="5" ry="5" transform="rotate(120 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-6" rx="5" ry="5" transform="rotate(150 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-7" rx="5" ry="5" transform="rotate(180 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-8" rx="5" ry="5" transform="rotate(210 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-9" rx="5" ry="5" transform="rotate(240 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-10" rx="5" ry="5" transform="rotate(270 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-11" rx="5" ry="5" transform="rotate(300 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-12" rx="5" ry="5" transform="rotate(330 50 50) translate(0 -30)"></rect> </svg></div> </div> <div id="page" > <a class="skip-link screen-reader-text" href="#content">Skip to content</a> <div data-elementor-type="header" data-elementor-id="50845" class="elementor elementor-50845 elementor-location-header" data-elementor-post-type="elementor_library"> <section class="elementor-section elementor-top-section elementor-element elementor-element-968da6e the7-e-sticky-row-yes the7-e-sticky-effect-yes elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="968da6e" data-element_type="section" data-settings="{"background_background":"classic","the7_sticky_row":"yes","the7_sticky_effects_offset":30,"the7_sticky_effects":"yes","the7_sticky_effects_devices":["desktop"],"the7_sticky_row_devices":["desktop","tablet","mobile"],"the7_sticky_row_offset":0}"> <div class="elementor-container elementor-column-gap-no"> <div class="elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-49473c7 elementor-hidden-tablet elementor-hidden-mobile" data-id="49473c7" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-fa8bc97 the7-img-sticky-size-effect-yes elementor-widget elementor-widget-image" data-id="fa8bc97" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <a href="https://www.eccouncil.org/cybersecurity-exchange"> <img width="1087" height="650" src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-1.png" class="attachment-full size-full wp-image-77272" alt="EC-Council Cybersecurity Exchange Logo" srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-1.png 1087w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-1-300x179.png 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-1-1024x612.png 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-1-768x459.png 768w" sizes="(max-width: 1087px) 100vw, 1087px" /> </a> </div> </div> </div> </div> <div class="elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-d76c1a4" data-id="d76c1a4" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-18944c0 items-decoration-yes sub-icon_align-side sub-menu-position-tablet-justify toggle-align-left decoration-downwards decoration-position-top mob-menu-popup elementor-widget__width-inherit show-sub-menu-on-hover horizontal-menu--dropdown-tablet decoration-align-height sub-menu-position-left dt-sub-menu_align-left sub-icon_position-right elementor-widget elementor-widget-the7_horizontal-menu" data-id="18944c0" data-element_type="widget" data-settings="{"dropdown_type":"popup","dropdown":"tablet"}" data-widget_type="the7_horizontal-menu.default"> <div class="elementor-widget-container"> <div class="horizontal-menu-wrap"><a class="horizontal-menu-toggle hidden-on-load" role="button" tabindex="0" aria-label="Menu Toggle" aria-expanded="false" href="#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6NzM2ODksInRvZ2dsZSI6ZmFsc2V9"><span class="right menu-toggle-icons" aria-hidden="true" role="presentation"></span></a><nav class="dt-nav-menu-horizontal--main dt-nav-menu-horizontal__container justify-content-end widget-divider- indicator-off"><ul class="dt-nav-menu-horizontal d-flex flex-row justify-content-end"><li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-home menu-item-77187 first depth-0"><a href='https://www.eccouncil.org/cybersecurity-exchange/' data-level='1'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Articles</span></span><span class="submenu-indicator" ><span class="submenu-mob-indicator" ></span></span></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-82842 has-children depth-0"><a class='not-clickable-item' data-level='1'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Online Degree</span></span><span class="submenu-indicator" ><span class="submenu-mob-indicator" ></span></span></span></a><ul class="the7-e-sub-nav horizontal-sub-nav"><li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82845 first depth-1"><a href='https://www.eccu.edu/online-cyber-security-degrees/master-degree-in-cyber-security-online/?utm_source=ecc&utm_medium=blog-menu-link&utm_campaign=mscs-degree' data-level='2'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Masters of Cyber Security</span></span><span class="submenu-indicator" ><svg aria-hidden="true" class="desktop-menu-icon e-font-icon-svg e-fas-caret-right" viewBox="0 0 192 512" xmlns="http://www.w3.org/2000/svg"><path d="M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z"></path></svg><span class="submenu-mob-indicator" ></span></span></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82859 depth-1"><a href='https://www.eccu.edu/online-cyber-security-degrees/masters-of-science-in-computer-science-mcs/?utm_source=ecc&utm_medium=blog-menu-link&utm_campaign=mcs-degree' data-level='2'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Master of Science in Computer Science</span></span><span class="submenu-indicator" ><svg aria-hidden="true" class="desktop-menu-icon e-font-icon-svg e-fas-caret-right" viewBox="0 0 192 512" xmlns="http://www.w3.org/2000/svg"><path d="M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z"></path></svg><span class="submenu-mob-indicator" ></span></span></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82860 depth-1"><a href='https://www.eccu.edu/online-cyber-security-degrees/mba-masters-business-administration/?utm_source=ecc&utm_medium=blog-menu-link&utm_campaign=mba-degree' data-level='2'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Masters In Business Administration</span></span><span class="submenu-indicator" ><svg aria-hidden="true" class="desktop-menu-icon e-font-icon-svg e-fas-caret-right" viewBox="0 0 192 512" xmlns="http://www.w3.org/2000/svg"><path d="M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z"></path></svg><span class="submenu-mob-indicator" ></span></span></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82844 depth-1"><a href='https://www.eccu.edu/online-cyber-security-degrees/bachelor-of-science-in-cyber-security/?utm_source=ecc&utm_medium=blog-menu-link&utm_campaign=bscs-degree' data-level='2'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Bachelors of Science in Cyber Security</span></span><span class="submenu-indicator" ><svg aria-hidden="true" class="desktop-menu-icon e-font-icon-svg e-fas-caret-right" viewBox="0 0 192 512" xmlns="http://www.w3.org/2000/svg"><path d="M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z"></path></svg><span class="submenu-mob-indicator" ></span></span></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82843 depth-1"><a href='https://www.eccu.edu/online-cyber-security-degrees/graduate-certificate-program/?utm_source=ecc&utm_medium=blog-menu-link&utm_campaign=graduate-degree' data-level='2'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Graduate Certificate Program</span></span><span class="submenu-indicator" ><svg aria-hidden="true" class="desktop-menu-icon e-font-icon-svg e-fas-caret-right" viewBox="0 0 192 512" xmlns="http://www.w3.org/2000/svg"><path d="M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z"></path></svg><span class="submenu-mob-indicator" ></span></span></span></a></li> </ul></li> <li class="menu-item menu-item-type-post_type menu-item-object-page menu-item-78453 depth-0"><a href='https://www.eccouncil.org/cybersecurity-exchange/whitepapers/' data-level='1'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Whitepapers</span></span><span class="submenu-indicator" ><span class="submenu-mob-indicator" ></span></span></span></a></li> <li class="menu-item menu-item-type-post_type menu-item-object-page menu-item-79632 depth-0"><a href='https://www.eccouncil.org/cybersecurity-exchange/cyber-talks/' data-level='1'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Cyber Talks</span></span><span class="submenu-indicator" ><span class="submenu-mob-indicator" ></span></span></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-79998 depth-0"><a href='https://www.eccouncil.org/success-stories/is-ceh-worth-it/?utm_source=cyberxchange-homepage&utm_medium=website&utm_campaign=success%20stories' data-level='1'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Success Stories</span></span><span class="submenu-indicator" ><span class="submenu-mob-indicator" ></span></span></span></a></li> <li class="gcb-btn menu-item menu-item-type-custom menu-item-object-custom menu-item-78176 last has-children depth-0 the7-e-mega-menu"><a href='https://www.eccouncil.org/train-certify/?utm_source=ecc-train-certify&utm_medium=cybersecurity-exchange&utm_campaign=ecc-blog-referral' target='_blank' class='not-clickable-item' data-level='1'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Train & Certify</span></span><span class="submenu-indicator" ><span class="submenu-mob-indicator" ></span></span></span></a><ul class="the7-e-sub-nav the7-e-mega-menu-sub-nav"><li> <div data-elementor-type="the7-mega-menu" data-elementor-id="78556" class="elementor elementor-78556 the7-e-mega-menu-content the7-e-mega-menu-width-full" data-elementor-post-type="elementor_library"> <div class="elementor-section-wrap"> <section class="elementor-section elementor-top-section elementor-element elementor-element-63fedec4 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="63fedec4" data-element_type="section" data-settings="{"background_background":"classic"}"> <div class="elementor-container elementor-column-gap-no"> <div class="elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-65a36019" data-id="65a36019" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-2b953b65 elementor-widget elementor-widget-heading" data-id="2b953b65" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">Certifications</h2> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-126d7885 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="126d7885" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-5a62212c" data-id="5a62212c" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-49cad7f5 elementor-widget elementor-widget-heading" data-id="49cad7f5" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/ethical-hacking/">ETHICAL HACKING</a></h6> </div> </div> <div class="elementor-element elementor-element-5af40aeb elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="5af40aeb" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-ethical-hacker-ceh/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Ethical Hacker (C|EH)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/ceh-master/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">C|EH (MASTER)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-5327f2e4 elementor-widget elementor-widget-heading" data-id="5327f2e4" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <p class="elementor-heading-title elementor-size-default"><a href="/train-certify/executive-management/">EXECUTIVE MANAGEMENT</a></p> </div> </div> <div class="elementor-element elementor-element-7c0f22c3 content-align-left icon-box-vertical-align-top icon-position-left icon-vertical-align-start elementor-widget elementor-widget-the7_icon_box_grid_widget" data-id="7c0f22c3" data-element_type="widget" data-widget_type="the7_icon_box_grid_widget.default"> <div class="elementor-widget-container"> <div class="the7-box-grid-wrapper the7-elementor-widget loading-effect-none the7_icon_box_grid_widget-7c0f22c3"> <div class="dt-css-grid"> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://www.eccouncil.org/train-certify/certified-chief-information-security-officer-cciso/" target="_blank" aria-label="Certified Chief Information Security Officer (C|CISO)"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Certified Chief Information Security Officer (C|CISO) </div> </div> </div> </a> </div> </div> </div> </div> </div> <div class="elementor-element elementor-element-a32c621 content-align-left icon-box-vertical-align-top icon-position-left icon-vertical-align-start elementor-widget elementor-widget-the7_icon_box_grid_widget" data-id="a32c621" data-element_type="widget" data-widget_type="the7_icon_box_grid_widget.default"> <div class="elementor-widget-container"> <div class="the7-box-grid-wrapper the7-elementor-widget loading-effect-none the7_icon_box_grid_widget-a32c621"> <div class="dt-css-grid"> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://www.eccouncil.org/train-certify/associate-cciso/" target="_blank" aria-label="Associate C|CISO"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Associate C|CISO </div> </div> </div> </a> </div> </div> </div> </div> </div> <div class="elementor-element elementor-element-791c93cb elementor-widget elementor-widget-heading" data-id="791c93cb" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/computer-forensics/">COMPUTER FORENSICS</a></h6> </div> </div> <div class="elementor-element elementor-element-277c8451 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="277c8451" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-hacking-forensic-investigator-chfi/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Computer Hacking Forensic Investigator (C|HFI)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-2f9ff8e9 elementor-widget elementor-widget-heading" data-id="2f9ff8e9" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/network-security/">NETWORK SECURITY</a></h6> </div> </div> <div class="elementor-element elementor-element-5cd38d09 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="5cd38d09" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-network-security-course/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Network Defender (C|ND)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/ics-scada-cybersecurity/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">ICS/SCADA Cybersecurity</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-55ce970e elementor-widget elementor-widget-heading" data-id="55ce970e" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/encryption/">ENCRYPTION</a></h6> </div> </div> <div class="elementor-element elementor-element-5b28a167 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="5b28a167" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/ec-council-certified-encryption-specialist-eces/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Encryption Specialist (E|CES)</span> </a> </li> </ul> </div> </div> </div> </div> <div class="elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-54f4d41c" data-id="54f4d41c" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-53c75e7 elementor-widget elementor-widget-heading" data-id="53c75e7" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/pen-testing/">Pen testing</a></h6> </div> </div> <div class="elementor-element elementor-element-7dd26587 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="7dd26587" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-penetration-testing-professional-cpent/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Penetration Testing Professional (C|PENT)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-a086b3d elementor-widget elementor-widget-heading" data-id="a086b3d" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/incident-handling/">INCIDENT HANDLING</a></h6> </div> </div> <div class="elementor-element elementor-element-78ecf7d5 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="78ecf7d5" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/ec-council-certified-incident-handler-ecih/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Incident Handler (E|CIH)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-threat-intelligence-analyst-ctia/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Threat Intelligence Analyst (C|TIA)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-soc-analyst-csa/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified SOC Analyst (C|SA)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-1e46b8e5 elementor-widget elementor-widget-heading" data-id="1e46b8e5" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/cloud-security/">CLOUD SECURITY</a></h6> </div> </div> <div class="elementor-element elementor-element-f7377f2 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="f7377f2" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-cloud-security-engineer-course/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Cloud Security Engineer (C|CSE)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-8d4389b elementor-widget elementor-widget-heading" data-id="8d4389b" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/dev-sec-ops/">DevSecOps</a></h6> </div> </div> <div class="elementor-element elementor-element-61a24ab9 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="61a24ab9" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-devsecops-engineer-ecde/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified DevSecOps Engineer (E|CDE)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-6f4a9983 elementor-widget elementor-widget-heading" data-id="6f4a9983" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/cyber-technician/">CYBER TECHNICIAN</a></h6> </div> </div> <div class="elementor-element elementor-element-1132d360 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="1132d360" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-cybersecurity-technician-certification/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Cybersecurity Technician (C|CT)</span> </a> </li> </ul> </div> </div> </div> </div> <div class="elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-4411e0c2" data-id="4411e0c2" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-325058ee elementor-widget elementor-widget-heading" data-id="325058ee" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/blockchain/">BLOCKCHAIN</a></h6> </div> </div> <div class="elementor-element elementor-element-935b7c2 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="935b7c2" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/blockchain-developer-courses/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Blockchain Developer Certification (B|DC)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/blockchain-fintech-course-bfc/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Blockchain Fintech Certification (B|FC)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/blockchain-business-leader-certification-bblc/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Blockchain Business Leader Certification (B|BLC)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-55d76a6e elementor-widget elementor-widget-heading" data-id="55d76a6e" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/business-continuity-and-disaster-recovery/">BUSINESS CONTINUITY AND DISASTER RECOVERY</a></h6> </div> </div> <div class="elementor-element elementor-element-32df3ae8 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="32df3ae8" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/business-continuity-and-disaster-recovery-training/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Disaster Recovery Professional (E|DRP)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-546f6f77 elementor-widget elementor-widget-heading" data-id="546f6f77" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/fundamentals/">FUNDAMENTALS</a></h6> </div> </div> <div class="elementor-element elementor-element-3bff0f8 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="3bff0f8" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-secure-computer-user-cscu/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Secure Computer User (C|SCU)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-security-specialist-ecss/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">EC-Council Certified Security Specialist (E|CSS)</span> </a> </li> </ul> </div> </div> </div> </div> <div class="elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-36e786e1" data-id="36e786e1" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-40d2e2e2 elementor-widget elementor-widget-heading" data-id="40d2e2e2" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/essentials/">ESSENTIALS SERIES</a></h6> </div> </div> <div class="elementor-element elementor-element-3ea8398 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="3ea8398" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/network-defense-essentials-nde/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Network Defense Essentials (N|DE)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/ethical-hacking-essentials-ehe/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Ethical Hacking Essentials (E|HE)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/digital-forensics-essentials-dfe/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Digital Forensics Essentials (D|FE)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/devsecops-essentials-dse/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">DevSecOps Essentials (D|SE)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/soc-essentials-course-sce/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">SOC Essentials (S|CE)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/cloud-security-essentials-cse/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Cloud Security Essentials (C|SE)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/iot-security-essentials-ise/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">IoT Security Essentials (I|SE)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/threat-intelligence-essentials-tie/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Threat Intelligence Essentials (T|IE)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-4278dee2 elementor-widget elementor-widget-heading" data-id="4278dee2" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <p class="elementor-heading-title elementor-size-default"><a href="/train-certify/application-security/">APPLICATION SECURITY</a></p> </div> </div> <div class="elementor-element elementor-element-6907196 content-align-left icon-box-vertical-align-top icon-position-left icon-vertical-align-start elementor-widget elementor-widget-the7_icon_box_grid_widget" data-id="6907196" data-element_type="widget" data-widget_type="the7_icon_box_grid_widget.default"> <div class="elementor-widget-container"> <div class="the7-box-grid-wrapper the7-elementor-widget loading-effect-none the7_icon_box_grid_widget-6907196"> <div class="dt-css-grid"> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://www.eccouncil.org/train-certify/certified-application-security-engineer-case-net/" target="_blank" aria-label="Certified Application Security Engineer (C|ASE .NET)"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Certified Application Security Engineer (C|ASE .NET) </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://www.eccouncil.org/train-certify/certified-application-security-engineer-case-java/" target="_blank" aria-label="Certified Application Security Engineer (C|ASE Java)"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Certified Application Security Engineer (C|ASE Java) </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://www.eccouncil.org/train-certify/certified-web-application-security-tester-wahs/" target="_blank" aria-label="Web Application Hacking and Security (W|AHS)"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Web Application Hacking and Security (W|AHS) </div> </div> </div> </a> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </div> <div class="elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4a1b0d3b" data-id="4a1b0d3b" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-77eeb67f elementor-widget elementor-widget-heading" data-id="77eeb67f" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">Micro Learning</h2> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-7502e767 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="7502e767" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-228d659b" data-id="228d659b" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-4b39ca95 content-align-left icon-box-vertical-align-top icon-position-left icon-vertical-align-start elementor-widget elementor-widget-the7_icon_box_grid_widget" data-id="4b39ca95" data-element_type="widget" data-widget_type="the7_icon_box_grid_widget.default"> <div class="elementor-widget-container"> <div class="the7-box-grid-wrapper the7-elementor-widget loading-effect-none the7_icon_box_grid_widget-4b39ca95"> <div class="dt-css-grid"> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/course/python-for-absolute-beginners?utm_source=ecc-website&utm_medium=product-category&utm_campaign=python-for-absolute-beginners" target="_blank" aria-label="Python Programming for Beginners"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Python Programming for Beginners </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/pro?utm_source=ecc-website&utm_medium=product-category&utm_campaign=learn-python-online&logged=false" target="_blank" aria-label="Learn Python Online: From Novice to Pro"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Learn Python Online: From Novice to Pro </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://coderedmarketing.eccouncil.org/python-security-microdegree-program/?utm_source=ecc-website&utm_medium=product-menu&utm_campaign=microdegree-in-python-security" target="_blank" aria-label="Microdegree in Python Security"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Microdegree in Python Security </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://coderedmarketing.eccouncil.org/php-security-microdegree/" target="_blank" aria-label="Microdegree in PHP Security"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Microdegree in PHP Security </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/course/identity-and-access-management?utm_source=ecc-website&utm_medium=product-category&utm_campaign=identity-and-access-management" target="_blank" aria-label="Identity and Access Management"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Identity and Access Management </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/course/ubuntu-linux-fundamentals-learn-linux-server-with-ubuntu?utm_source=ecc-website&utm_medium=programs-category&utm_campaign=linux-fundamentals" target="_blank" aria-label="Linux Fundamentals"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Linux Fundamentals </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/course/linux-server-administration-made-easy-with-hands-on-training?utm_source=ecc-website&utm_medium=product-category&utm_campaign=linux-server-administration-made-easy-with-hands-on-training" target="_blank" aria-label="Linux-Server Administration"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Linux-Server Administration </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/course/cybersecurity-for-blockchain-from-ground-up?utm_source=ecc-menu&utm_medium=webiste&logged=false" target="_blank" aria-label="Cybersecurity for Blockchain from Ground Up"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Cybersecurity for Blockchain from Ground Up </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/course/cybersecurity-for-businesses-the-fundamental-edition?utm_source=ecc-website&utm_medium=programs-category&utm_campaign=cybersecurity-for-businesses" target="_blank" aria-label="Cybersecurity for Business"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Cybersecurity for Business </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/course/email-phishing?utm_source=ecc-website&utm_medium=programs-category&utm_campaign=email-phishing" target="_blank" aria-label="Email Phishing"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Email Phishing </div> </div> </div> </a> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </div> </div> </section> </div> </div> </li></ul></li> </ul></nav></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-5a0164f elementor-hidden-desktop" data-id="5a0164f" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-a88f71b elementor-widget elementor-widget-image" data-id="a88f71b" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <a href="https://www.eccouncil.org/cybersecurity-exchange"> <img width="1087" height="650" src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab.png" class="attachment-full size-full wp-image-77265" alt="EC-Council_Cybersecurity-Exchange-tab" srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab.png 1087w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-300x179.png 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-1024x612.png 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-768x459.png 768w" sizes="(max-width: 1087px) 100vw, 1087px" /> </a> </div> </div> </div> </div> <div class="elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-3dd1f80" data-id="3dd1f80" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-3a79a7b elementor-widget__width-auto elementor-hidden-desktop elementor-align-center elementor-widget elementor-widget-the7_icon_widget" data-id="3a79a7b" data-element_type="widget" data-widget_type="the7_icon_widget.default"> <div class="elementor-widget-container"> <div class="the7-icon-wrapper the7-elementor-widget"><a class="elementor-icon" href="#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjczNjg5IiwidG9nZ2xlIjpmYWxzZX0%3D"><svg aria-hidden="true" class="e-font-icon-svg e-fas-bars" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M16 132h416c8.837 0 16-7.163 16-16V76c0-8.837-7.163-16-16-16H16C7.163 60 0 67.163 0 76v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16z"></path></svg></a></div> </div> </div> </div> </div> </div> </section> </div> <div id="main" class="sidebar-none sidebar-divider-off"> <div class="main-gradient"></div> <div class="wf-wrap"> <div class="wf-container-main"> <div id="content" class="content" role="main"> <div data-elementor-type="single-page" data-elementor-id="50913" class="elementor elementor-50913 elementor-location-single post-76841 page type-page status-publish has-post-thumbnail" data-elementor-post-type="elementor_library"> <section class="elementor-section elementor-top-section elementor-element elementor-element-0baf9b6 elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="0baf9b6" data-element_type="section" data-settings="{"background_background":"classic"}"> <div class="elementor-background-overlay"></div> <div class="elementor-container elementor-column-gap-no"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1102c08" data-id="1102c08" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-98f5a50 elementor-widget elementor-widget-theme-post-content" data-id="98f5a50" data-element_type="widget" data-widget_type="theme-post-content.default"> <div class="elementor-widget-container"> <div data-elementor-type="wp-page" data-elementor-id="76841" class="elementor elementor-76841" data-elementor-post-type="page"> <section class="elementor-section elementor-top-section elementor-element elementor-element-897ee5f elementor-section-full_width elementor-section-height-min-height elementor-section-stretched elementor-section-height-default elementor-section-items-middle" data-id="897ee5f" data-element_type="section" data-settings="{"stretch_section":"section-stretched","background_background":"classic"}"> <div class="elementor-background-overlay"></div> <div class="elementor-container elementor-column-gap-no"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cb9997a" data-id="cb9997a" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-b177ddd elementor-widget__width-auto elementor-widget elementor-widget-heading" data-id="b177ddd" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h1 class="elementor-heading-title elementor-size-default">Executive Management</h1> </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-top-section elementor-element elementor-element-3115799 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="3115799" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ce42ec4" data-id="ce42ec4" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-90b2a6d elementor-widget elementor-widget-spacer" data-id="90b2a6d" data-element_type="widget" data-widget_type="spacer.default"> <div class="elementor-widget-container"> <div class="elementor-spacer"> <div class="elementor-spacer-inner"></div> </div> </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-top-section elementor-element elementor-element-280a309 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="280a309" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-df3f4ca" data-id="df3f4ca" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <section class="elementor-section elementor-inner-section elementor-element elementor-element-c358820 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="c358820" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-f30bbbe" data-id="f30bbbe" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-77669e1 img-align-mobile-top icon-box-vertical-align-top img-align-left image-vertical-align-start preserve-img-ratio-cover slide-h-position-left elementor-widget elementor-widget-the7-elements-simple-posts" data-id="77669e1" data-element_type="widget" data-widget_type="the7-elements-simple-posts.default"> <div class="elementor-widget-container"> <div class="the7-simple-widget-posts the7-elementor-widget the7-elements-simple-posts-77669e1 jquery-filter widget-divider-on jquery-filter" data-post-limit="-1" data-pagination-mode="none" data-scroll-offset="" aria-live="assertive"> <div class="dt-css-grid custom-pagination-handler" data-columns="{"d":1,"t":1,"p":1,"wd":""}"> <div class="wf-cell visible "> <article class="post visible wrapper post-82822 type-post status-publish format-standard has-post-thumbnail category-executive-management tag-chief-technology-officer tag-cto tag-cybersecurity tag-cybersecurity-management tag-ec-council-2 tag-information-security tag-it"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/how-to-become-a-chief-technology-officer-cto/"><img fetchpriority="high" fetchpriority="high" width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/CCISO-Blog-Thumbnail-01-BG-1080x1080-1.png" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/CCISO-Blog-Thumbnail-01-BG-1080x1080-1.png 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/CCISO-Blog-Thumbnail-01-BG-1080x1080-1-300x300.png 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/CCISO-Blog-Thumbnail-01-BG-1080x1080-1-1024x1024.png 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/CCISO-Blog-Thumbnail-01-BG-1080x1080-1-150x150.png 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/CCISO-Blog-Thumbnail-01-BG-1080x1080-1-768x768.png 768w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/CCISO-Blog-Thumbnail-01-BG-1080x1080-1-400x400.png 400w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/CCISO-Blog-Thumbnail-01-BG-1080x1080-1-600x600.png 600w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/how-to-become-a-chief-technology-officer-cto/" rel="bookmark" title="How to Become a Chief Technology Officer (CTO)" class="post-title">How to Become a Chief Technology Officer (CTO)</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2025-01-31T10:53:03+00:00">January 31, 2025</time></span></div><p class="short-description">In today’s digital world, online businesses depend heavily on reliable technology and strong networks. This increased reliance on technology has led to a critical demand…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/how-to-become-a-chief-technology-officer-cto/" target="" aria-label="Read more about How to Become a Chief Technology Officer (CTO)" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-82795 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/ciso-guide-to-information-security-leadership/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/01/BG_Navigating-the-Changing-Landscape-1080-x-1080.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/01/BG_Navigating-the-Changing-Landscape-1080-x-1080.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/01/BG_Navigating-the-Changing-Landscape-1080-x-1080-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/01/BG_Navigating-the-Changing-Landscape-1080-x-1080-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/01/BG_Navigating-the-Changing-Landscape-1080-x-1080-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/01/BG_Navigating-the-Changing-Landscape-1080-x-1080-768x768.jpg 768w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/01/BG_Navigating-the-Changing-Landscape-1080-x-1080-400x400.jpg 400w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/01/BG_Navigating-the-Changing-Landscape-1080-x-1080-600x600.jpg 600w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/ciso-guide-to-information-security-leadership/" rel="bookmark" title="Navigating the Changing Landscape of Information Security Leadership with Best Practices for the Modern CISO – Head of Security" class="post-title">Navigating the Changing Landscape of Information Security Leadership with Best Practices for the Modern CISO – Head of Security</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2025-01-28T09:17:29+00:00">January 28, 2025</time></span></div><p class="short-description">The world of cybersecurity is a constant battleground, with new threats emerging all the time. For Chief Information Security Officers, staying ahead of the curve…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/ciso-guide-to-information-security-leadership/" target="" aria-label="Read more about Navigating the Changing Landscape of Information Security Leadership with Best Practices for the Modern CISO – Head of Security" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-77586 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/what-is-cybersecurity-management/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Cybersecurity Management Work" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/09/what-is-cybersecurity-management-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/09/what-is-cybersecurity-management-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/09/what-is-cybersecurity-management-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/09/what-is-cybersecurity-management-thumb-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/what-is-cybersecurity-management/" rel="bookmark" title="What Is Cybersecurity Management, and Why Is it Important?" class="post-title">What Is Cybersecurity Management, and Why Is it Important?</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2025-01-28T03:32:31+00:00">January 28, 2025</time></span></div><p class="short-description">Cyberattacks increased by 50% in 2021, reaching an all-time peak in Q4 as companies experienced an average of 900 attacks per week (Check Point, 2022).…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/what-is-cybersecurity-management/" target="" aria-label="Read more about What Is Cybersecurity Management, and Why Is it Important?" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-82198 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/role-of-cciso-for-chief-risk-officer/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="A Strategic Imperative for Chief Risk Officer in Modern Organizations" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/Certified-CISO-A-Strategic-Imperative-for-Chief-Risk-Officer-in-Modern-Organizations-1080-x-1080-pix_A.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/Certified-CISO-A-Strategic-Imperative-for-Chief-Risk-Officer-in-Modern-Organizations-1080-x-1080-pix_A.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/Certified-CISO-A-Strategic-Imperative-for-Chief-Risk-Officer-in-Modern-Organizations-1080-x-1080-pix_A-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/Certified-CISO-A-Strategic-Imperative-for-Chief-Risk-Officer-in-Modern-Organizations-1080-x-1080-pix_A-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/Certified-CISO-A-Strategic-Imperative-for-Chief-Risk-Officer-in-Modern-Organizations-1080-x-1080-pix_A-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/Certified-CISO-A-Strategic-Imperative-for-Chief-Risk-Officer-in-Modern-Organizations-1080-x-1080-pix_A-768x768.jpg 768w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/role-of-cciso-for-chief-risk-officer/" rel="bookmark" title="Certified CISO: A Strategic Imperative for Chief Risk Officer in Modern Organizations" class="post-title">Certified CISO: A Strategic Imperative for Chief Risk Officer in Modern Organizations</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2024-07-23T08:24:20+00:00">July 23, 2024</time></span></div><p class="short-description">The role of a Chief Risk Officer (CRO) is crucial for successfully implementing cybersecurity programs to reduce security risks in organizations. CROs conduct thorough risk…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/role-of-cciso-for-chief-risk-officer/" target="" aria-label="Read more about Certified CISO: A Strategic Imperative for Chief Risk Officer in Modern Organizations" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-82063 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/ciso-cybersecurity-risk-management-governance-compliance/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Understanding Role of a CISO" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/CISO-Blog-banner-1080-x-1080.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/CISO-Blog-banner-1080-x-1080.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/CISO-Blog-banner-1080-x-1080-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/CISO-Blog-banner-1080-x-1080-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/CISO-Blog-banner-1080-x-1080-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/CISO-Blog-banner-1080-x-1080-768x768.jpg 768w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/ciso-cybersecurity-risk-management-governance-compliance/" rel="bookmark" title="Navigating Cybersecurity Risk Management, Governance, and Compliance as a CISO" class="post-title">Navigating Cybersecurity Risk Management, Governance, and Compliance as a CISO</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2024-06-19T09:49:55+00:00">June 19, 2024</time></span></div><p class="short-description">The role of Chief Information Security Officer (CISO) is vital for businesses of all sizes and industries. CISOs are in charge of managing and overseeing…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/ciso-cybersecurity-risk-management-governance-compliance/" target="" aria-label="Read more about Navigating Cybersecurity Risk Management, Governance, and Compliance as a CISO" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-81936 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/associate-cciso-grandfathering-program-paving-way-to-grow-into-a-ciso-role/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Overview of the Associate CCISO Grandfathering" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Associate-CCISO-Grandfathering-1080-x-1080-1-1.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Associate-CCISO-Grandfathering-1080-x-1080-1-1.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Associate-CCISO-Grandfathering-1080-x-1080-1-1-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Associate-CCISO-Grandfathering-1080-x-1080-1-1-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Associate-CCISO-Grandfathering-1080-x-1080-1-1-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Associate-CCISO-Grandfathering-1080-x-1080-1-1-768x768.jpg 768w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/associate-cciso-grandfathering-program-paving-way-to-grow-into-a-ciso-role/" rel="bookmark" title="Associate C|CISO Grandfathering: A Strategic Move to Transition to the Office of a CISO" class="post-title">Associate C|CISO Grandfathering: A Strategic Move to Transition to the Office of a CISO</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2024-05-08T08:30:11+00:00">May 8, 2024</time></span></div><p class="short-description">In an era marked by escalating cyber threats, the demand for skilled cybersecurity leaders who can seamlessly navigate the intricacies of information security has gotten…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/associate-cciso-grandfathering-program-paving-way-to-grow-into-a-ciso-role/" target="" aria-label="Read more about Associate C|CISO Grandfathering: A Strategic Move to Transition to the Office of a CISO" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-81713 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/essential-information-security-management-skills-cisos/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/4-Essential-Information-Security-Management-Skills-for-CISOs-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/4-Essential-Information-Security-Management-Skills-for-CISOs-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/4-Essential-Information-Security-Management-Skills-for-CISOs-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/4-Essential-Information-Security-Management-Skills-for-CISOs-thumb-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/essential-information-security-management-skills-cisos/" rel="bookmark" title="4 Essential Information Security Management Skills CISOS" class="post-title">4 Essential Information Security Management Skills CISOS</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2024-03-11T02:54:26+00:00">March 11, 2024</time></span></div><p class="short-description">Organizations face an ever-changing digital landscape, which often results in new security risks. Cyberthreats continue to plague both governments and businesses around the world, highlighting…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/essential-information-security-management-skills-cisos/" target="" aria-label="Read more about 4 Essential Information Security Management Skills CISOS" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-81708 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/what-next-after-cissp/"><img width="1024" height="512" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201024%20512'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 1024px) 100vw, 1024px" style="--ratio: 1024 / 512;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/what-next-after-cissp-blog1.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/what-next-after-cissp-blog1.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/what-next-after-cissp-blog1-300x150.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/what-next-after-cissp-blog1-768x384.jpg 768w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/what-next-after-cissp/" rel="bookmark" title="What Next After CISSP" class="post-title">What Next After CISSP</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2024-03-11T02:49:40+00:00">March 11, 2024</time></span></div><p class="short-description">EC-Council supports your continued leadership journey and that’s why we encourage you to pursue the CCISO after you finish the CISSP. After all, CCISO was…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/what-next-after-cissp/" target="" aria-label="Read more about What Next After CISSP" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-81704 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/cciso-vs-cissp/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-next-after-CISSP-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-next-after-CISSP-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-next-after-CISSP-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-next-after-CISSP-thumb-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/cciso-vs-cissp/" rel="bookmark" title="CCISO VS CISSP" class="post-title">CCISO VS CISSP</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2024-03-11T02:43:35+00:00">March 11, 2024</time></span></div><p class="short-description">What next after CISSP? Created by (ISC)2, the CISSP certification has been the leading training program for and validation of IT security management skills since…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/cciso-vs-cissp/" target="" aria-label="Read more about CCISO VS CISSP" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-81697 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/risk-management/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/Introduction-to-Risk-Management-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/Introduction-to-Risk-Management-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/Introduction-to-Risk-Management-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/Introduction-to-Risk-Management-thumb-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/risk-management/" rel="bookmark" title="Risk Management" class="post-title">Risk Management</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2024-03-11T02:33:13+00:00">March 11, 2024</time></span></div><p class="short-description">What Is Risk Management? Risk management is a risk assessment method that analyzes and eliminates risks to mitigate threats and optimize an investment’s profits. Risk…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/risk-management/" target="" aria-label="Read more about Risk Management" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-81679 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/what-is-information-security-management/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/what-is-information-security-management-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/what-is-information-security-management-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/what-is-information-security-management-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/what-is-information-security-management-thumb-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/what-is-information-security-management/" rel="bookmark" title="What is Information Security Management" class="post-title">What is Information Security Management</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2024-03-11T02:21:32+00:00">March 11, 2024</time></span></div><p class="short-description">Information security management is an organization’s approach to ensure the confidentiality, availability, and integrity of IT assets and safeguard them from cyberattacks. A Chief Information…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/what-is-information-security-management/" target="" aria-label="Read more about What is Information Security Management" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-81610 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/what-is-disaster-recovery/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/what-is-disaster-recovery-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/what-is-disaster-recovery-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/what-is-disaster-recovery-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/what-is-disaster-recovery-thumb-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/what-is-disaster-recovery/" rel="bookmark" title="What is Disaster Recovery" class="post-title">What is Disaster Recovery</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2024-03-06T16:32:03+00:00">March 6, 2024</time></span></div><p class="short-description">What Is A Business Continuity Plan and How Is It Used? A business continuity plan refers to the processes and procedures that experts follow to…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/what-is-disaster-recovery/" target="" aria-label="Read more about What is Disaster Recovery" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-81359 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/world-class-security-executive-certification-ciso/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/01/world-class-security-executive-thumb-2.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/01/world-class-security-executive-thumb-2.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/01/world-class-security-executive-thumb-2-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/01/world-class-security-executive-thumb-2-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/world-class-security-executive-certification-ciso/" rel="bookmark" title="World-Class Security Executive Certification for CISOs" class="post-title">World-Class Security Executive Certification for CISOs</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2024-01-11T12:14:44+00:00">January 11, 2024</time></span></div><p class="short-description">EC-Council’s Certified Chief Information Security Officer (C|CISO) program is built on the decades of knowledge and experience of seasoned CISOs who contribute their time and…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/world-class-security-executive-certification-ciso/" target="" aria-label="Read more about World-Class Security Executive Certification for CISOs" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-81332 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/associate-cciso-next-step-cism/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/01/Blank-1.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/01/Blank-1.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/01/Blank-1-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/01/Blank-1-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/associate-cciso-next-step-cism/" rel="bookmark" title="Associate C|CISO: The Next Step for a Certified Information Security Manager " class="post-title">Associate C|CISO: The Next Step for a Certified Information Security Manager </a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2024-01-04T10:35:05+00:00">January 4, 2024</time></span></div><p class="short-description">In today’s workforce, information security workers are more important than ever. Most companies have undergone a digital transformation to stay competitive, and many business processes…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/associate-cciso-next-step-cism/" target="" aria-label="Read more about Associate C|CISO: The Next Step for a Certified Information Security Manager " class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-81294 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/information-security-core-competencies-cisos/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/information-security-core-competencies-cisos-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/information-security-core-competencies-cisos-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/information-security-core-competencies-cisos-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/information-security-core-competencies-cisos-thumb-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/information-security-core-competencies-cisos/" rel="bookmark" title="Building Information Security Core Competencies: A Guide for CISOs and C|CISO Candidates" class="post-title">Building Information Security Core Competencies: A Guide for CISOs and C|CISO Candidates</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2023-12-29T12:36:49+00:00">December 29, 2023</time></span></div><p class="short-description">What does a chief information security officer do, and what are the various CISO roles and responsibilities? As an organization’s most important IT security professional,…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/information-security-core-competencies-cisos/" target="" aria-label="Read more about Building Information Security Core Competencies: A Guide for CISOs and C|CISO Candidates" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-80724 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/cybersecurity-challenges-chief-security-officer/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="5 New Cybersecurity Challenges Chief Security Officers (CSOs) Should Be Aware of in 2023 " decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/cybersecurity-challenges-chief-security-officer-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/cybersecurity-challenges-chief-security-officer-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/cybersecurity-challenges-chief-security-officer-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/cybersecurity-challenges-chief-security-officer-thumb-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/cybersecurity-challenges-chief-security-officer/" rel="bookmark" title="5 New Cybersecurity Challenges Chief Security Officers (CSOs) Should Be Aware of in 2024" class="post-title">5 New Cybersecurity Challenges Chief Security Officers (CSOs) Should Be Aware of in 2024</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2023-11-02T12:55:41+00:00">November 2, 2023</time></span></div><p class="short-description">If you’re a chief security officer (CSO), chief information security officer (CISO), or other cybersecurity leader, your job is never dull. Technology is constantly evolving,…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/cybersecurity-challenges-chief-security-officer/" target="" aria-label="Read more about 5 New Cybersecurity Challenges Chief Security Officers (CSOs) Should Be Aware of in 2024" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-80162 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/ec-councils-cciso-program-trusted-at-the-highest-level-of-cyber-leadership-dod-directive-8140/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="EC-Council's Chief Information Security Officer Program Trusted Cyber Leadership – DoD Directive 8140 Featured image" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/09/EC-Councils-Chief-Information-Security-Officer-Program-Trusted-Cyber-Leadership-–-DoD-Directive-8140-Featured-image-2.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/09/EC-Councils-Chief-Information-Security-Officer-Program-Trusted-Cyber-Leadership-–-DoD-Directive-8140-Featured-image-2.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/09/EC-Councils-Chief-Information-Security-Officer-Program-Trusted-Cyber-Leadership-–-DoD-Directive-8140-Featured-image-2-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/09/EC-Councils-Chief-Information-Security-Officer-Program-Trusted-Cyber-Leadership-–-DoD-Directive-8140-Featured-image-2-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/ec-councils-cciso-program-trusted-at-the-highest-level-of-cyber-leadership-dod-directive-8140/" rel="bookmark" title="EC-Council’s Certified Chief Information Security Officer (C|CISO) Program Trusted at the Highest Level of Cyber Leadership – DoD Directive 8140" class="post-title">EC-Council’s Certified Chief Information Security Officer (C|CISO) Program Trusted at the Highest Level of Cyber Leadership – DoD Directive 8140</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2023-09-18T03:45:27+00:00">September 18, 2023</time></span></div><p class="short-description">Traditional national security measures of the past leveraged borders, global influence, political maneuvering, and intelligence gathering measures to protect a country’s interests. By shifting focus…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/ec-councils-cciso-program-trusted-at-the-highest-level-of-cyber-leadership-dod-directive-8140/" target="" aria-label="Read more about EC-Council’s Certified Chief Information Security Officer (C|CISO) Program Trusted at the Highest Level of Cyber Leadership – DoD Directive 8140" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-80159 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/im-an-associate-cciso-now-what/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="I’m an Associate CCISO - Now What" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/09/Im-an-Associate-CCISO-Now-What-Featired-image.png" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/09/Im-an-Associate-CCISO-Now-What-Featired-image.png 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/09/Im-an-Associate-CCISO-Now-What-Featired-image-300x300.png 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/09/Im-an-Associate-CCISO-Now-What-Featired-image-150x150.png 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/im-an-associate-cciso-now-what/" rel="bookmark" title="I’m an Associate C|CISO – Now What?" class="post-title">I’m an Associate C|CISO – Now What?</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2023-09-18T03:30:30+00:00">September 18, 2023</time></span></div><p class="short-description">You have been in the security industry for a couple of years and are looking for a way to propel your career to the next…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/im-an-associate-cciso-now-what/" target="" aria-label="Read more about I’m an Associate C|CISO – Now What?" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-79971 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/EC-Councils-CCISO-Program-Recognized-for-12-Job-Billets-of-the-Department-of-Defense-fetured.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/EC-Councils-CCISO-Program-Recognized-for-12-Job-Billets-of-the-Department-of-Defense-fetured.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/EC-Councils-CCISO-Program-Recognized-for-12-Job-Billets-of-the-Department-of-Defense-fetured-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/EC-Councils-CCISO-Program-Recognized-for-12-Job-Billets-of-the-Department-of-Defense-fetured-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security/" rel="bookmark" title="EC-Council’s Certified Chief Information Security Officer (C|CISO) Program Trusted at the Highest Level of Cyber Leadership and Strategy for Cyber Workforce Job Billets Critical to National Security" class="post-title">EC-Council’s Certified Chief Information Security Officer (C|CISO) Program Trusted at the Highest Level of Cyber Leadership and Strategy for Cyber Workforce Job Billets Critical to National Security</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2023-08-18T12:10:36+00:00">August 18, 2023</time></span></div><p class="short-description">The future of national security lies in the hands of our cyber leaders, as they set policies, make workforce decisions, manage vendors and contractors, and…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security/" target="" aria-label="Read more about EC-Council’s Certified Chief Information Security Officer (C|CISO) Program Trusted at the Highest Level of Cyber Leadership and Strategy for Cyber Workforce Job Billets Critical to National Security" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-79863 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/cybersecurity-leadership-training-program-and-knowledge/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Why Cybersecurity Leadership Training and Knowledge is Crucial for Future Career Growth" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/07/Why-Cybersecurity-Leadership-Training-and-Knowledge-is-Crucial-for-Future-Career-Growth.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/07/Why-Cybersecurity-Leadership-Training-and-Knowledge-is-Crucial-for-Future-Career-Growth.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/07/Why-Cybersecurity-Leadership-Training-and-Knowledge-is-Crucial-for-Future-Career-Growth-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/07/Why-Cybersecurity-Leadership-Training-and-Knowledge-is-Crucial-for-Future-Career-Growth-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/cybersecurity-leadership-training-program-and-knowledge/" rel="bookmark" title="Why Cybersecurity Leadership Training Program is Crucial for Career Growth" class="post-title">Why Cybersecurity Leadership Training Program is Crucial for Career Growth</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2023-07-20T17:19:13+00:00">July 20, 2023</time></span></div><p class="short-description">There are a few old security jokes out there, the most common one being about lions and running shoes. There’s another one that has to…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/cybersecurity-leadership-training-program-and-knowledge/" target="" aria-label="Read more about Why Cybersecurity Leadership Training Program is Crucial for Career Growth" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-79861 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/crafting-a-career-in-cybersecurity-leadership-key-steps-and-advice/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Crafting a Career in Cybersecurity Leadership Key Steps and Advice" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/07/Crafting-a-Career-in-Cybersecurity-Leadership-Key-Steps-and-Advice-featured.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/07/Crafting-a-Career-in-Cybersecurity-Leadership-Key-Steps-and-Advice-featured.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/07/Crafting-a-Career-in-Cybersecurity-Leadership-Key-Steps-and-Advice-featured-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/07/Crafting-a-Career-in-Cybersecurity-Leadership-Key-Steps-and-Advice-featured-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/crafting-a-career-in-cybersecurity-leadership-key-steps-and-advice/" rel="bookmark" title="Crafting a Career in Cybersecurity Leadership: Key Steps and Advice" class="post-title">Crafting a Career in Cybersecurity Leadership: Key Steps and Advice</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2023-07-20T17:11:06+00:00">July 20, 2023</time></span></div><p class="short-description">The other day a neighbor of mine asked for advice. She wanted to know how to become a security executive. She has a few years…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/crafting-a-career-in-cybersecurity-leadership-key-steps-and-advice/" target="" aria-label="Read more about Crafting a Career in Cybersecurity Leadership: Key Steps and Advice" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-79764 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/ciso-security-initiatives/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Botnet Attacks and Their Prevention Techniques Explained" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/05/Botnet-Attacks-and-Their-Prevention-Techniques-Explained-Featured-image.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/05/Botnet-Attacks-and-Their-Prevention-Techniques-Explained-Featured-image.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/05/Botnet-Attacks-and-Their-Prevention-Techniques-Explained-Featured-image-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/05/Botnet-Attacks-and-Their-Prevention-Techniques-Explained-Featured-image-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/ciso-security-initiatives/" rel="bookmark" title="3 Initiatives Chief Information Security Officers (CISOs) Can Take for Their Security and Resilience Journey " class="post-title">3 Initiatives Chief Information Security Officers (CISOs) Can Take for Their Security and Resilience Journey </a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2023-06-30T04:09:05+00:00">June 30, 2023</time></span></div><p class="short-description">Information technology is now increasingly crucial for businesses of all sizes and industries. This means that the chief information security officer (Certified CISO) plays an…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/ciso-security-initiatives/" target="" aria-label="Read more about 3 Initiatives Chief Information Security Officers (CISOs) Can Take for Their Security and Resilience Journey " class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-79762 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/ciso-cloud-security-issues/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/ciso-cloud-security-issues/" rel="bookmark" title="Approach Towards Cloud Security Issues: A CISO’s Perspective " class="post-title">Approach Towards Cloud Security Issues: A CISO’s Perspective </a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2023-06-30T04:02:35+00:00">June 30, 2023</time></span></div><p class="short-description">The 2022 Check Point Cloud Security Report found that 27 percent of organizations experienced a security incident in their public cloud infrastructure in the past…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/ciso-cloud-security-issues/" target="" aria-label="Read more about Approach Towards Cloud Security Issues: A CISO’s Perspective " class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-78937 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/effective-vulnerability-management-strategies-ultimate-guide/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Why Cybersecurity Leadership Training and Knowledge is Crucial for Future Career Growth" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/07/Why-Cybersecurity-Leadership-Training-and-Knowledge-is-Crucial-for-Future-Career-Growth.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/07/Why-Cybersecurity-Leadership-Training-and-Knowledge-is-Crucial-for-Future-Career-Growth.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/07/Why-Cybersecurity-Leadership-Training-and-Knowledge-is-Crucial-for-Future-Career-Growth-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/07/Why-Cybersecurity-Leadership-Training-and-Knowledge-is-Crucial-for-Future-Career-Growth-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/effective-vulnerability-management-strategies-ultimate-guide/" rel="bookmark" title="What is the Role of Vulnerability Management in Cybersecurity?" class="post-title">What is the Role of Vulnerability Management in Cybersecurity?</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2023-05-18T08:19:10+00:00">May 18, 2023</time></span></div><p class="short-description">Vulnerability management in cybersecurity is crucial for businesses of all sizes and industries. In vulnerability management, organizations continuously assess their IT environments for security flaws,…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/effective-vulnerability-management-strategies-ultimate-guide/" target="" aria-label="Read more about What is the Role of Vulnerability Management in Cybersecurity?" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-78585 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/essential-ciso-learnings/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Essential CISO Learning" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/essential-ciso-learnings-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/essential-ciso-learnings-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/essential-ciso-learnings-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/essential-ciso-learnings-thumb-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/essential-ciso-learnings/" rel="bookmark" title="Essential CISO Learnings " class="post-title">Essential CISO Learnings </a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2023-03-29T13:34:29+00:00">March 29, 2023</time></span></div><p class="short-description">With cyberattacks on the rise, it’s no surprise that many enterprises are searching for a CISO to mitigate their security risk and bolster their defenses.…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/essential-ciso-learnings/" target="" aria-label="Read more about Essential CISO Learnings " class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-78568 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/chief-information-security-officer-kpis/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="KPIs for a Chief Information Security Officer (CISO)" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/KPIs-for-a-Chief-Information-Security-Officer-CISO-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/KPIs-for-a-Chief-Information-Security-Officer-CISO-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/KPIs-for-a-Chief-Information-Security-Officer-CISO-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/KPIs-for-a-Chief-Information-Security-Officer-CISO-thumb-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/chief-information-security-officer-kpis/" rel="bookmark" title="KPIs for a Chief Information Security Officer (CISO) " class="post-title">KPIs for a Chief Information Security Officer (CISO) </a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2023-03-27T12:15:48+00:00">March 27, 2023</time></span></div><p class="short-description">A Chief Information Security Officer (CISO) must track key performance indicators (KPIs) to ensure the organization’s cybersecurity posture is effective. KPIs are important to a…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/chief-information-security-officer-kpis/" target="" aria-label="Read more about KPIs for a Chief Information Security Officer (CISO) " class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-77719 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/information-security-programs-grow-businesses/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Information Security Program" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/11/information-security-programs-grow-businesses-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/11/information-security-programs-grow-businesses-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/11/information-security-programs-grow-businesses-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/11/information-security-programs-grow-businesses-thumb-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/information-security-programs-grow-businesses/" rel="bookmark" title="How Well Aligned Information Security Programs Help Business Grow" class="post-title">How Well Aligned Information Security Programs Help Business Grow</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2022-11-30T06:55:22+00:00">November 30, 2022</time></span></div><p class="short-description">Information security is a top priority for businesses, but ensuring that information security aligns with business objectives can be a challenge. Many factors need to…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/information-security-programs-grow-businesses/" target="" aria-label="Read more about How Well Aligned Information Security Programs Help Business Grow" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-77641 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/information-security-management-challenges/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Information Security Management Challenges" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/10/information-security-management-challenges-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/10/information-security-management-challenges-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/10/information-security-management-challenges-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/10/information-security-management-challenges-thumb-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/information-security-management-challenges/" rel="bookmark" title="The 3 Biggest Information Security Management Challenges for Leaders in 2022 " class="post-title">The 3 Biggest Information Security Management Challenges for Leaders in 2022 </a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2022-10-04T11:14:47+00:00">October 4, 2022</time></span></div><p class="short-description">Cybersecurity is one of the biggest concerns in business, with 48% of CEOs worried that their company might experience a devastating digital attack in the…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/information-security-management-challenges/" target="" aria-label="Read more about The 3 Biggest Information Security Management Challenges for Leaders in 2022 " class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-77573 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/how-to-become-ciso/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Chief Information Security Officer (CISO)" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/09/how-to-become-ciso-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/09/how-to-become-ciso-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/09/how-to-become-ciso-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/09/how-to-become-ciso-thumb-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/how-to-become-ciso/" rel="bookmark" title="How to Become a CISO (Chief Information Security Officer) " class="post-title">How to Become a CISO (Chief Information Security Officer) </a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2022-09-02T11:42:26+00:00">September 2, 2022</time></span></div><p class="short-description">The Chief Information Security Officer (CISO) is one of digital security’s most powerful and high-paying roles. As a CISO, you’ll have complete responsibility for all…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/how-to-become-ciso/" target="" aria-label="Read more about How to Become a CISO (Chief Information Security Officer) " class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-77499 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/2022-cwe-top-25-most-dangerous-software-weaknesses/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Dangerous Software Weaknesses" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/07/2022-cwe-top-25-most-dangerous-software-weaknesses-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/07/2022-cwe-top-25-most-dangerous-software-weaknesses-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/07/2022-cwe-top-25-most-dangerous-software-weaknesses-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/07/2022-cwe-top-25-most-dangerous-software-weaknesses-thumb-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/2022-cwe-top-25-most-dangerous-software-weaknesses/" rel="bookmark" title="25 Most Dangerous Software Weaknesses for 2022 Announced" class="post-title">25 Most Dangerous Software Weaknesses for 2022 Announced</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2022-07-01T03:47:17+00:00">July 1, 2022</time></span></div><p class="short-description">Out-of-bounds writes, cross-site scripting, and SQL injection topped this year’s list. On June 28, the Common Weakness Enumeration team announced the release of 2022’s Top…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/2022-cwe-top-25-most-dangerous-software-weaknesses/" target="" aria-label="Read more about 25 Most Dangerous Software Weaknesses for 2022 Announced" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-77491 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/federal-cybersecurity-laws-june-2022/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="U.S. Passes New Cybersecurity Legislation" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/06/federal-cybersecurity-laws-june-2022-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/06/federal-cybersecurity-laws-june-2022-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/06/federal-cybersecurity-laws-june-2022-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/06/federal-cybersecurity-laws-june-2022-thumb-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/federal-cybersecurity-laws-june-2022/" rel="bookmark" title="U.S. Passes New Cybersecurity Legislation in June 2022" class="post-title">U.S. Passes New Cybersecurity Legislation in June 2022</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2022-06-28T12:13:43+00:00">June 28, 2022</time></span></div><p class="short-description">The bills, signed into cybersecurity law on June 21, aim to strengthen the federal cyber workforce and foster collaboration across all levels of government. On…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/federal-cybersecurity-laws-june-2022/" target="" aria-label="Read more about U.S. Passes New Cybersecurity Legislation in June 2022" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-77320 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/top-ten-qualities-successful-ciso/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Qualities of a Successful CISO" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/top-ten-qualities-successful-ciso-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/top-ten-qualities-successful-ciso-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/top-ten-qualities-successful-ciso-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/top-ten-qualities-successful-ciso-thumb-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/top-ten-qualities-successful-ciso/" rel="bookmark" title="The Top 10 Qualities of a Successful CISO" class="post-title">The Top 10 Qualities of a Successful CISO</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2022-04-21T17:40:56+00:00">April 21, 2022</time></span></div><p class="short-description">A successful chief information security officer (CISO) needs to wear many hats. CISOs need to manage risk, protect their company’s data, and oversee its security…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/top-ten-qualities-successful-ciso/" target="" aria-label="Read more about The Top 10 Qualities of a Successful CISO" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-77279 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/cyber-risk-assessments-critical-business-strategy/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Information Security Leaders Need to Conduct Cyber Risk Assessment" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/cyber-risk-assessments-critical-business-strategy-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/cyber-risk-assessments-critical-business-strategy-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/cyber-risk-assessments-critical-business-strategy-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/cyber-risk-assessments-critical-business-strategy-thumb-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/cyber-risk-assessments-critical-business-strategy/" rel="bookmark" title="Why Information Security Leaders Need to Conduct Cyber Risk Assessments" class="post-title">Why Information Security Leaders Need to Conduct Cyber Risk Assessments</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2022-04-12T06:56:46+00:00">April 12, 2022</time></span></div><p class="short-description">Cybercrime is on the rise around the world, with thousands of cybersecurity breaches occurring each day. In 2020, the FBI reported that its Cyber Division…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/cyber-risk-assessments-critical-business-strategy/" target="" aria-label="Read more about Why Information Security Leaders Need to Conduct Cyber Risk Assessments" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-5920 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/test-disaster-recovery-plan/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Testing a Disaster Recovery Plan" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/02/test-disaster-recovery-plan-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/02/test-disaster-recovery-plan-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/02/test-disaster-recovery-plan-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/02/test-disaster-recovery-plan-thumb-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/test-disaster-recovery-plan/" rel="bookmark" title="How Can You Test the Strength of a Disaster Recovery Plan?" class="post-title">How Can You Test the Strength of a Disaster Recovery Plan?</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2022-02-09T16:29:00+00:00">February 9, 2022</time></span></div><p class="short-description">The widespread adoption of technology has changed how businesses process information. Employees today communicate using email and VoIP telephone systems and use electronic data interchanges…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/test-disaster-recovery-plan/" target="" aria-label="Read more about How Can You Test the Strength of a Disaster Recovery Plan?" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-76583 type-post status-publish format-standard has-post-thumbnail category-executive-management"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/effective-cybersecurity-risk-management-checklist/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Effectively Manage Cybersecurity Risk" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/10/effective-cybersecurity-risk-management-checklist-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/10/effective-cybersecurity-risk-management-checklist-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/10/effective-cybersecurity-risk-management-checklist-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/10/effective-cybersecurity-risk-management-checklist-thumb-150x150.jpg 150w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h4 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/effective-cybersecurity-risk-management-checklist/" rel="bookmark" title="How to Effectively Manage Cybersecurity Risk" class="post-title">How to Effectively Manage Cybersecurity Risk</a></h4><div class="entry-meta"><span class="meta-item category-link"><span>Executive Management</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2021-10-08T11:32:20+00:00">October 8, 2021</time></span></div><p class="short-description">Cybersecurity issues are becoming more problematic for businesses of all sizes: According to PurpleSec (2021), cybercrime surged by 600% during the COVID-19 pandemic, and the…</p><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/effective-cybersecurity-risk-management-checklist/" target="" aria-label="Read more about How to Effectively Manage Cybersecurity Risk" class="box-button elementor-button elementor-size-md">Read more<i aria-hidden="true" class="elementor-button-icon dt-icon-the7-arrow-552"></i></a> </div> </div> </article> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </section> </div> </div><!-- #content --> </div><!-- .wf-container --> </div><!-- .wf-wrap --> </div><!-- #main --> <!-- !Footer --> <footer id="footer" class="footer solid-bg elementor-footer"> <div class="wf-wrap"> <div class="wf-container-footer"> <div class="wf-container"> <div data-elementor-type="footer" data-elementor-id="21569" class="elementor elementor-21569 elementor-location-footer" data-elementor-post-type="elementor_library"> <section class="elementor-section elementor-top-section elementor-element elementor-element-99e335b elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="99e335b" data-element_type="section" data-settings="{"background_background":"classic"}"> <div class="elementor-container elementor-column-gap-wider"> <div class="elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-979bda7" data-id="979bda7" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-adef294 elementor-widget elementor-widget-image" data-id="adef294" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <img width="200" height="42" src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/EC-Council-logo-footer.png" class="attachment-full size-full wp-image-79960" alt="EC-Council Logo" /> </div> </div> </div> </div> <div class="elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-47645cf" data-id="47645cf" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-dc04426 elementor-shape-circle elementor-grid-6 e-grid-align-right e-grid-align-mobile-center elementor-widget elementor-widget-social-icons" data-id="dc04426" data-element_type="widget" data-widget_type="social-icons.default"> <div class="elementor-widget-container"> <div class="elementor-social-icons-wrapper elementor-grid"> <span class="elementor-grid-item"> <a class="elementor-icon elementor-social-icon elementor-social-icon-linkedin-in elementor-repeater-item-0224fa5" href="https://www.linkedin.com/company/ec-council" target="_blank"> <span class="elementor-screen-only">Linkedin-in</span> <svg class="e-font-icon-svg e-fab-linkedin-in" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"></path></svg> </a> </span> <span class="elementor-grid-item"> <a class="elementor-icon elementor-social-icon elementor-social-icon-twitter elementor-repeater-item-fe64f2d" href="https://twitter.com/ECCOUNCIL" target="_blank"> <span class="elementor-screen-only">Twitter</span> <svg class="e-font-icon-svg e-fab-twitter" viewBox="0 0 512 512" xmlns="http://www.w3.org/2000/svg"><path d="M459.37 151.716c.325 4.548.325 9.097.325 13.645 0 138.72-105.583 298.558-298.558 298.558-59.452 0-114.68-17.219-161.137-47.106 8.447.974 16.568 1.299 25.34 1.299 49.055 0 94.213-16.568 130.274-44.832-46.132-.975-84.792-31.188-98.112-72.772 6.498.974 12.995 1.624 19.818 1.624 9.421 0 18.843-1.3 27.614-3.573-48.081-9.747-84.143-51.98-84.143-102.985v-1.299c13.969 7.797 30.214 12.67 47.431 13.319-28.264-18.843-46.781-51.005-46.781-87.391 0-19.492 5.197-37.36 14.294-52.954 51.655 63.675 129.3 105.258 216.365 109.807-1.624-7.797-2.599-15.918-2.599-24.04 0-57.828 46.782-104.934 104.934-104.934 30.213 0 57.502 12.67 76.67 33.137 23.715-4.548 46.456-13.32 66.599-25.34-7.798 24.366-24.366 44.833-46.132 57.827 21.117-2.273 41.584-8.122 60.426-16.243-14.292 20.791-32.161 39.308-52.628 54.253z"></path></svg> </a> </span> <span class="elementor-grid-item"> <a class="elementor-icon elementor-social-icon elementor-social-icon-facebook-f elementor-repeater-item-50aa484" href="https://www.facebook.com/ECCouncil" target="_blank"> <span class="elementor-screen-only">Facebook-f</span> <svg class="e-font-icon-svg e-fab-facebook-f" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M279.14 288l14.22-92.66h-88.91v-60.13c0-25.35 12.42-50.06 52.24-50.06h40.42V6.26S260.43 0 225.36 0c-73.22 0-121.08 44.38-121.08 124.72v70.62H22.89V288h81.39v224h100.17V288z"></path></svg> </a> </span> <span class="elementor-grid-item"> <a class="elementor-icon elementor-social-icon elementor-social-icon-youtube elementor-repeater-item-e0f6049" href="https://www.youtube.com/user/eccouncilusa" target="_blank"> <span class="elementor-screen-only">Youtube</span> <svg class="e-font-icon-svg e-fab-youtube" viewBox="0 0 576 512" xmlns="http://www.w3.org/2000/svg"><path d="M549.655 124.083c-6.281-23.65-24.787-42.276-48.284-48.597C458.781 64 288 64 288 64S117.22 64 74.629 75.486c-23.497 6.322-42.003 24.947-48.284 48.597-11.412 42.867-11.412 132.305-11.412 132.305s0 89.438 11.412 132.305c6.281 23.65 24.787 41.5 48.284 47.821C117.22 448 288 448 288 448s170.78 0 213.371-11.486c23.497-6.321 42.003-24.171 48.284-47.821 11.412-42.867 11.412-132.305 11.412-132.305s0-89.438-11.412-132.305zm-317.51 213.508V175.185l142.739 81.205-142.739 81.201z"></path></svg> </a> </span> </div> </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-top-section elementor-element elementor-element-e154a21 elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default" data-id="e154a21" data-element_type="section" data-settings="{"background_background":"classic"}"> <div class="elementor-container elementor-column-gap-no"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6daae7a" data-id="6daae7a" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <section class="elementor-section elementor-inner-section elementor-element elementor-element-8104121 elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="8104121" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-3ccdafa" data-id="3ccdafa" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-23a6ff3 elementor-widget__width-auto elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor" data-id="23a6ff3" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>© 2024 EC-Council</p> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-5103789" data-id="5103789" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-b2cb538 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-the7_button_widget" data-id="b2cb538" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/cybersecurity-exchange/whitepaper/securing-the-future-of-finance-top-cybersecurity-best-practices-for-financial-institutions/" target="_blank" class="box-button elementor-button elementor-size-xs"> Get Training</a></div> </div> </div> <div class="elementor-element elementor-element-4e28cf5 elementor-widget__width-initial elementor-hidden-tablet elementor-hidden-mobile elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="4e28cf5" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-0d906de" data-id="0d906de" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-848d4d8 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-the7_button_widget" data-id="848d4d8" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/partner-with-us/" target="_blank" class="box-button elementor-button elementor-size-xs">Partner With Us</a></div> </div> </div> <div class="elementor-element elementor-element-8a377c0 elementor-widget__width-initial elementor-hidden-tablet elementor-hidden-mobile elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="8a377c0" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-56ba32b" data-id="56ba32b" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-6910c36 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget elementor-widget-the7_button_widget" data-id="6910c36" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/terms-of-use/" target="_blank" class="box-button elementor-button elementor-size-xs">Terms Of Use</a></div> </div> </div> <div class="elementor-element elementor-element-66ff94b elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="66ff94b" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-3ba6b66" data-id="3ba6b66" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-71f5d85 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget elementor-widget-the7_button_widget" data-id="71f5d85" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/privacy-policy/" target="_blank" class="box-button elementor-button elementor-size-xs">Privacy Policy</a></div> </div> </div> <div class="elementor-element elementor-element-f090837 elementor-widget__width-initial elementor-hidden-tablet elementor-hidden-mobile elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="f090837" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-01b2bf0" data-id="01b2bf0" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-b66dc68 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-the7_button_widget" data-id="b66dc68" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/errata/" target="_blank" class="box-button elementor-button elementor-size-xs">Report Issue</a></div> </div> </div> <div class="elementor-element elementor-element-43ed683 elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="43ed683" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-dddc90d" data-id="dddc90d" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-84f4523 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-the7_button_widget" data-id="84f4523" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://eccouncil.org/cybersecurity-exchange/publishing-guidelines/" class="box-button elementor-button elementor-size-xs">Publishing Guidelines</a></div> </div> </div> <div class="elementor-element elementor-element-d42b0f1 elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="d42b0f1" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-e1824d6" data-id="e1824d6" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-8c1fed7 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-the7_button_widget" data-id="8c1fed7" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/sitemap/" target="_blank" class="box-button elementor-button elementor-size-xs">Sitemap</a></div> </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-inner-section elementor-element elementor-element-bf9859a elementor-hidden-desktop elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="bf9859a" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-0125d26" data-id="0125d26" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-2995b92 elementor-widget__width-auto elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor" data-id="2995b92" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>© 2024 EC-Council</p> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-68fddc8" data-id="68fddc8" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-07f3308 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget-mobile__width-inherit elementor-widget elementor-widget-the7_button_widget" data-id="07f3308" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/get-certified-with-ec-council-with-form/" class="box-button elementor-button elementor-size-xs"> Get training</a></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-cfcdc94" data-id="cfcdc94" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-0e24fb8 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget-mobile__width-inherit elementor-widget elementor-widget-the7_button_widget" data-id="0e24fb8" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/partner-with-us/" class="box-button elementor-button elementor-size-xs">Partner With Us</a></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-657bb74" data-id="657bb74" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-5799907 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget-mobile__width-inherit elementor-widget elementor-widget-the7_button_widget" data-id="5799907" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/terms-of-use/" class="box-button elementor-button elementor-size-xs">Terms Of Use</a></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-a99c553" data-id="a99c553" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-53822b5 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget-mobile__width-inherit elementor-widget elementor-widget-the7_button_widget" data-id="53822b5" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/privacy-policy/" class="box-button elementor-button elementor-size-xs">Privacy Policy</a></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-19cbe1c" data-id="19cbe1c" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-8ba50f8 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget-mobile__width-inherit elementor-widget elementor-widget-the7_button_widget" data-id="8ba50f8" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/errata/" class="box-button elementor-button elementor-size-xs">Report Issue</a></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-bd8a105" data-id="bd8a105" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-465c68e elementor-align-left elementor-mobile-align-center elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-the7_button_widget" data-id="465c68e" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://eccouncil.org/cybersecurity-exchange/publishing-guidelines/" class="box-button elementor-button elementor-size-xs">Publishing Guidelines</a></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-e54f023" data-id="e54f023" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-2b562b1 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget-mobile__width-inherit elementor-widget elementor-widget-the7_button_widget" data-id="2b562b1" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/sitemap/" class="box-button elementor-button elementor-size-xs">Sitemap</a></div> </div> </div> </div> </div> </div> </section> </div> </div> </div> </section> </div> </div><!-- .wf-container --> </div><!-- .wf-container-footer --> </div><!-- .wf-wrap --> </footer><!-- #footer --> <a href="#" class="scroll-top"><svg version="1.1" id="Layer_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px" viewBox="0 0 16 16" style="enable-background:new 0 0 16 16;" xml:space="preserve"> <path d="M11.7,6.3l-3-3C8.5,3.1,8.3,3,8,3c0,0,0,0,0,0C7.7,3,7.5,3.1,7.3,3.3l-3,3c-0.4,0.4-0.4,1,0,1.4c0.4,0.4,1,0.4,1.4,0L7,6.4 V12c0,0.6,0.4,1,1,1s1-0.4,1-1V6.4l1.3,1.3c0.4,0.4,1,0.4,1.4,0C11.9,7.5,12,7.3,12,7S11.9,6.5,11.7,6.3z"/> </svg><span class="screen-reader-text">Go to Top</span></a> </div><!-- #page --> <div data-elementor-type="popup" data-elementor-id="73689" class="elementor elementor-73689 elementor-location-popup" data-elementor-settings="{"entrance_animation":"fadeInLeft","exit_animation":"fadeInLeft","entrance_animation_duration":{"unit":"px","size":0.3,"sizes":[]},"a11y_navigation":"yes","timing":[]}" data-elementor-post-type="elementor_library"> <section class="elementor-section elementor-top-section elementor-element elementor-element-53c57074 elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="53c57074" data-element_type="section"> <div class="elementor-container elementor-column-gap-wider"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7121ae2a" data-id="7121ae2a" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-6b9c16b widget-divider-yes dt-nav-menu_align-left dt-sub-menu_align-left elementor-widget elementor-widget-the7_nav-menu" data-id="6b9c16b" data-element_type="widget" data-settings="{"submenu_display":"on_click"}" data-widget_type="the7_nav-menu.default"> <div class="elementor-widget-container"> <nav class="dt-nav-menu--main dt-nav-menu__container dt-sub-menu-display-on_click dt-icon-align-side dt-icon-position-right dt-sub-icon-position-right dt-sub-icon-align-side first-item-border-hide last-item-border-hide"><ul class="dt-nav-menu"><li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-home menu-item-77187 first depth-0"><a href='https://www.eccouncil.org/cybersecurity-exchange/' data-level='1'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Articles</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-82842 has-children depth-0"><a data-level='1'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Online Degree</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a><ul class="the7-e-sub-nav vertical-sub-nav hover-style-bg"><li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82845 first depth-1"><a href='https://www.eccu.edu/online-cyber-security-degrees/master-degree-in-cyber-security-online/?utm_source=ecc&utm_medium=blog-menu-link&utm_campaign=mscs-degree' data-level='2'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Masters of Cyber Security</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82859 depth-1"><a href='https://www.eccu.edu/online-cyber-security-degrees/masters-of-science-in-computer-science-mcs/?utm_source=ecc&utm_medium=blog-menu-link&utm_campaign=mcs-degree' data-level='2'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Master of Science in Computer Science</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82860 depth-1"><a href='https://www.eccu.edu/online-cyber-security-degrees/mba-masters-business-administration/?utm_source=ecc&utm_medium=blog-menu-link&utm_campaign=mba-degree' data-level='2'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Masters In Business Administration</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82844 depth-1"><a href='https://www.eccu.edu/online-cyber-security-degrees/bachelor-of-science-in-cyber-security/?utm_source=ecc&utm_medium=blog-menu-link&utm_campaign=bscs-degree' data-level='2'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Bachelors of Science in Cyber Security</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82843 depth-1"><a href='https://www.eccu.edu/online-cyber-security-degrees/graduate-certificate-program/?utm_source=ecc&utm_medium=blog-menu-link&utm_campaign=graduate-degree' data-level='2'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Graduate Certificate Program</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a></li> </ul></li> <li class="menu-item menu-item-type-post_type menu-item-object-page menu-item-78453 depth-0"><a href='https://www.eccouncil.org/cybersecurity-exchange/whitepapers/' data-level='1'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Whitepapers</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a></li> <li class="menu-item menu-item-type-post_type menu-item-object-page menu-item-79632 depth-0"><a href='https://www.eccouncil.org/cybersecurity-exchange/cyber-talks/' data-level='1'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Cyber Talks</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-79998 depth-0"><a href='https://www.eccouncil.org/success-stories/is-ceh-worth-it/?utm_source=cyberxchange-homepage&utm_medium=website&utm_campaign=success%20stories' data-level='1'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Success Stories</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a></li> <li class="gcb-btn menu-item menu-item-type-custom menu-item-object-custom menu-item-78176 last depth-0"><a href='https://www.eccouncil.org/train-certify/?utm_source=ecc-train-certify&utm_medium=cybersecurity-exchange&utm_campaign=ecc-blog-referral' target='_blank' data-level='1'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Train & Certify</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a></li> </ul></nav> </div> </div> </div> </div> </div> </section> </div> <script> const lazyloadRunObserver = () => { const lazyloadBackgrounds = document.querySelectorAll( `.e-con.e-parent:not(.e-lazyloaded)` ); const lazyloadBackgroundObserver = new IntersectionObserver( ( entries ) => { entries.forEach( ( entry ) => { if ( entry.isIntersecting ) { let lazyloadBackground = entry.target; if( lazyloadBackground ) { lazyloadBackground.classList.add( 'e-lazyloaded' ); } lazyloadBackgroundObserver.unobserve( entry.target ); } }); }, { rootMargin: '200px 0px 200px 0px' } ); lazyloadBackgrounds.forEach( ( lazyloadBackground ) => { lazyloadBackgroundObserver.observe( lazyloadBackground ); } ); }; const events = [ 'DOMContentLoaded', 'elementor/lazyload/observe', ]; events.forEach( ( event ) => { document.addEventListener( event, lazyloadRunObserver ); } ); </script> <link rel='stylesheet' id='elementor-post-78556-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-78556.css?ver=1735024235' media='all' /> <link rel='stylesheet' id='widget-icon-list-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-icon-list.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='the7-icon-box-grid-widget-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-icon-box-grid-widget.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='elementor-post-73689-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-73689.css?ver=1739290173' media='all' /> <link rel='stylesheet' id='the7-vertical-menu-widget-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-vertical-menu-widget.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='e-animation-fadeInLeft-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/lib/animations/styles/fadeInLeft.min.css?ver=3.27.2' media='all' /> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/compatibility/elementor/frontend-common.min.js?ver=12.2.0" id="the7-elementor-frontend-common-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/main.min.js?ver=12.2.0" id="dt-main-js"></script> <script id="afl-wc-utm-public-js-extra"> var afl_wc_utm_public = {"ajax_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","action":"afl_wc_utm_view","nonce":"","cookie_prefix":"afl_wc_utm_","cookie_expiry":{"days":90},"cookie_renewal":"force","cookie_consent_category":"statistics","domain_info":{"domain":"www.eccouncil.org","path":"\/"},"last_touch_window":"1800","wp_consent_api_enabled":"","user_has_active_attribution":"0"}; </script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/afl-wc-utm/public/js/afl-wc-utm-public.min.js?ver=2.4.12" id="afl-wc-utm-public-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/compatibility/elementor/the7-horizontal-menu.min.js?ver=12.2.0" id="the7_horizontal-menu-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/lib/jquery-sticky/jquery-sticky.min.js?ver=12.2.0" id="the7-e-sticky-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/compatibility/elementor/sticky-effects.min.js?ver=12.2.0" id="the7-e-sticky-effect-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/compatibility/elementor/the7-simple-posts.min.js?ver=12.2.0" id="the7-elements-simple-posts-js"></script> <script id="gforms_recaptcha_recaptcha-js-extra"> var gforms_recaptcha_recaptcha_strings = {"site_key":"6LdJNX4oAAAAAGWiILMPLCGUp8ALa8TJXIWg55PV","ajaxurl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","nonce":"471e67795e"}; </script> <script src="https://www.google.com/recaptcha/api.js?render=6LdJNX4oAAAAAGWiILMPLCGUp8ALa8TJXIWg55PV&ver=1.6.0" id="gforms_recaptcha_recaptcha-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/legacy.min.js?ver=12.2.0" id="dt-legacy-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/lib/jquery-mousewheel/jquery-mousewheel.min.js?ver=12.2.0" id="jquery-mousewheel-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/lib/custom-scrollbar/custom-scrollbar.min.js?ver=12.2.0" id="the7-custom-scrollbar-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/dt-the7-core/assets/js/post-type.min.js?ver=2.7.10" id="the7-core-js"></script> <script id="eael-general-js-extra"> var localize = {"ajaxurl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","nonce":"cfecd3c697","i18n":{"added":"Added ","compare":"Compare","loading":"Loading..."},"eael_translate_text":{"required_text":"is a required field","invalid_text":"Invalid","billing_text":"Billing","shipping_text":"Shipping","fg_mfp_counter_text":"of"},"page_permalink":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/executive-management\/","cart_redirectition":"no","cart_page_url":"","el_breakpoints":{"mobile":{"label":"Mobile Portrait","value":767,"default_value":767,"direction":"max","is_enabled":true},"mobile_extra":{"label":"Mobile Landscape","value":880,"default_value":880,"direction":"max","is_enabled":false},"tablet":{"label":"Tablet Portrait","value":1024,"default_value":1024,"direction":"max","is_enabled":true},"tablet_extra":{"label":"Tablet Landscape","value":1200,"default_value":1200,"direction":"max","is_enabled":false},"laptop":{"label":"Laptop","value":1366,"default_value":1366,"direction":"max","is_enabled":false},"widescreen":{"label":"Widescreen","value":2400,"default_value":2400,"direction":"min","is_enabled":false}}}; </script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/essential-addons-for-elementor-lite/assets/front-end/js/view/general.min.js?ver=6.1.1" id="eael-general-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/compatibility/elementor/the7-vertical-menu.min.js?ver=12.2.0" id="the7_nav-menu-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor-pro/assets/js/webpack-pro.runtime.min.js?ver=3.25.5" id="elementor-pro-webpack-runtime-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/js/webpack.runtime.min.js?ver=3.27.2" id="elementor-webpack-runtime-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/js/frontend-modules.min.js?ver=3.27.2" id="elementor-frontend-modules-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-includes/js/dist/hooks.min.js?ver=4d63a3d491d11ffd8ac6" id="wp-hooks-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-includes/js/dist/i18n.min.js?ver=5e580eb46a90c2b997e6" id="wp-i18n-js"></script> <script id="wp-i18n-js-after"> wp.i18n.setLocaleData( { 'text direction\u0004ltr': [ 'ltr' ] } ); </script> <script id="elementor-pro-frontend-js-before"> var ElementorProFrontendConfig = {"ajaxurl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","nonce":"262f2515b0","urls":{"assets":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/plugins\/elementor-pro\/assets\/","rest":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/"},"settings":{"lazy_load_background_images":true},"popup":{"hasPopUps":true},"shareButtonsNetworks":{"facebook":{"title":"Facebook","has_counter":true},"twitter":{"title":"Twitter"},"linkedin":{"title":"LinkedIn","has_counter":true},"pinterest":{"title":"Pinterest","has_counter":true},"reddit":{"title":"Reddit","has_counter":true},"vk":{"title":"VK","has_counter":true},"odnoklassniki":{"title":"OK","has_counter":true},"tumblr":{"title":"Tumblr"},"digg":{"title":"Digg"},"skype":{"title":"Skype"},"stumbleupon":{"title":"StumbleUpon","has_counter":true},"mix":{"title":"Mix"},"telegram":{"title":"Telegram"},"pocket":{"title":"Pocket","has_counter":true},"xing":{"title":"XING","has_counter":true},"whatsapp":{"title":"WhatsApp"},"email":{"title":"Email"},"print":{"title":"Print"},"x-twitter":{"title":"X"},"threads":{"title":"Threads"}}, "facebook_sdk":{"lang":"en_US","app_id":""},"lottie":{"defaultAnimationUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/plugins\/elementor-pro\/modules\/lottie\/assets\/animations\/default.json"}}; </script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor-pro/assets/js/frontend.min.js?ver=3.25.5" id="elementor-pro-frontend-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-includes/js/jquery/ui/core.min.js?ver=1.13.3" id="jquery-ui-core-js"></script> <script id="elementor-frontend-js-before"> var elementorFrontendConfig = {"environmentMode":{"edit":false,"wpPreview":false,"isScriptDebug":false},"i18n":{"shareOnFacebook":"Share on Facebook","shareOnTwitter":"Share on Twitter","pinIt":"Pin it","download":"Download","downloadImage":"Download image","fullscreen":"Fullscreen","zoom":"Zoom","share":"Share","playVideo":"Play Video","previous":"Previous","next":"Next","close":"Close","a11yCarouselPrevSlideMessage":"Previous slide","a11yCarouselNextSlideMessage":"Next slide","a11yCarouselFirstSlideMessage":"This is the first slide","a11yCarouselLastSlideMessage":"This is the last slide","a11yCarouselPaginationBulletMessage":"Go to slide"},"is_rtl":false,"breakpoints":{"xs":0,"sm":480,"md":768,"lg":1025,"xl":1440,"xxl":1600},"responsive":{"breakpoints":{"mobile":{"label":"Mobile Portrait","value":767,"default_value":767,"direction":"max","is_enabled":true},"mobile_extra":{"label":"Mobile Landscape","value":880,"default_value":880,"direction":"max","is_enabled":false},"tablet":{"label":"Tablet Portrait","value":1024,"default_value":1024,"direction":"max","is_enabled":true},"tablet_extra":{"label":"Tablet Landscape","value":1200,"default_value":1200,"direction":"max","is_enabled":false},"laptop":{"label":"Laptop","value":1366,"default_value":1366,"direction":"max","is_enabled":false},"widescreen":{"label":"Widescreen","value":2400,"default_value":2400,"direction":"min","is_enabled":false}}, "hasCustomBreakpoints":false},"version":"3.27.2","is_static":false,"experimentalFeatures":{"e_font_icon_svg":true,"e_swiper_latest":true,"e_onboarding":true,"theme_builder_v2":true,"home_screen":true,"landing-pages":true,"editor_v2":true,"link-in-bio":true,"floating-buttons":true},"urls":{"assets":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/plugins\/elementor\/assets\/","ajaxurl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","uploadUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads"},"nonces":{"floatingButtonsClickTracking":"843129edce"},"swiperClass":"swiper","settings":{"page":[],"editorPreferences":[]},"kit":{"viewport_mobile":767,"viewport_tablet":1024,"active_breakpoints":["viewport_mobile","viewport_tablet"],"global_image_lightbox":"yes","lightbox_enable_counter":"yes","lightbox_enable_fullscreen":"yes","lightbox_enable_zoom":"yes","lightbox_enable_share":"yes","lightbox_title_src":"title","lightbox_description_src":"description"},"post":{"id":76841,"title":"Best%20Information%20Security%20Blogs%20%7C%20Executive%20Management%20%7C%20EC-Council","excerpt":"","featuredImage":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/Career-and-Leadership-1024x538.jpg"}}; </script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/js/frontend.min.js?ver=3.27.2" id="elementor-frontend-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor-pro/assets/js/elements-handlers.min.js?ver=3.25.5" id="pro-elements-handlers-js"></script> <script> jQuery(document).ready(function(){ jQuery('article.type-post .post-entry-content a, article.type-post .the7-simple-post-thumb a, article.type-post .post-thumbnail-wrap a').attr('target','_blank'); }); </script> <script> jQuery(document).ready(function () { var country = { "BD": "Bangladesh", "BE": "Belgium", "BF": "Burkina Faso", "BG": "Bulgaria", "BA": "Bosnia and Herzegovina", "BB": "Barbados", "WF": "Wallis and Futuna", "BL": "Saint Barthelemy", "BM": "Bermuda", "BN": "Brunei", "BO": "Bolivia", "BH": "Bahrain", "BI": "Burundi", "BJ": "Benin", "BT": "Bhutan", "JM": "Jamaica", "BV": "Bouvet Island", "BW": "Botswana", "WS": "Samoa", "BQ": "Bonaire, Saint Eustatius and Saba ", "BR": "Brazil", "BS": "Bahamas", "JE": "Jersey", "BY": "Belarus", "BZ": "Belize", "RU": "Russia", "RW": "Rwanda", "RS": "Serbia", "TL": "East Timor", "RE": "Reunion", "TM": "Turkmenistan", "TJ": "Tajikistan", "RO": "Romania", "TK": "Tokelau", "GW": "Guinea-Bissau", "GU": "Guam", "GT": "Guatemala", "GS": "South Georgia and the South Sandwich Islands", "GR": "Greece", "GQ": "Equatorial Guinea", "GP": "Guadeloupe", "JP": "Japan", "GY": "Guyana", "GG": "Guernsey", "GF": "French Guiana", "GE": "Georgia", "GD": "Grenada", "GB": "United Kingdom", "GA": "Gabon", "SV": "El Salvador", "GN": "Guinea", "GM": "Gambia", "GL": "Greenland", "GI": "Gibraltar", "GH": "Ghana", "OM": "Oman", "TN": "Tunisia", "JO": "Jordan", "HR": "Croatia", "HT": "Haiti", "HU": "Hungary", "HK": "Hong Kong", "HN": "Honduras", "HM": "Heard Island and McDonald Islands", "VE": "Venezuela", "PR": "Puerto Rico", "PS": "Palestinian Territory", "PW": "Palau", "PT": "Portugal", "SJ": "Svalbard and Jan Mayen", "PY": "Paraguay", "IQ": "Iraq", "PA": "Panama", "PF": "French Polynesia", "PG": "Papua New Guinea", "PE": "Peru", "PK": "Pakistan", "PH": "Philippines", "PN": "Pitcairn", "PL": "Poland", "PM": "Saint Pierre and Miquelon", "ZM": "Zambia", "EH": "Western Sahara", "EE": "Estonia", "EG": "Egypt", "ZA": "South Africa", "EC": "Ecuador", "IT": "Italy", "VN": "Vietnam", "SB": "Solomon Islands", "ET": "Ethiopia", "SO": "Somalia", "ZW": "Zimbabwe", "SA": "Saudi Arabia", "ES": "Spain", "ER": "Eritrea", "ME": "Montenegro", "MD": "Moldova", "MG": "Madagascar", "MF": "Saint Martin", "MA": "Morocco", "MC": "Monaco", "UZ": "Uzbekistan", "MM": "Myanmar", "ML": "Mali", "MO": "Macao", "MN": "Mongolia", "MH": "Marshall Islands", "MK": "Macedonia", "MU": "Mauritius", "MT": "Malta", "MW": "Malawi", "MV": "Maldives", "MQ": "Martinique", "MP": "Northern Mariana Islands", "MS": "Montserrat", "MR": "Mauritania", "IM": "Isle of Man", "UG": "Uganda", "TZ": "Tanzania", "MY": "Malaysia", "MX": "Mexico", "IL": "Israel", "FR": "France", "IO": "British Indian Ocean Territory", "SH": "Saint Helena", "FI": "Finland", "FJ": "Fiji", "FK": "Falkland Islands", "FM": "Micronesia", "FO": "Faroe Islands", "NI": "Nicaragua", "NL": "Netherlands", "NO": "Norway", "NA": "Namibia", "VU": "Vanuatu", "NC": "New Caledonia", "NE": "Niger", "NF": "Norfolk Island", "NG": "Nigeria", "NZ": "New Zealand", "NP": "Nepal", "NR": "Nauru", "NU": "Niue", "CK": "Cook Islands", "XK": "Kosovo", "CI": "Ivory Coast", "CH": "Switzerland", "CO": "Colombia", "CN": "China", "CM": "Cameroon", "CL": "Chile", "CC": "Cocos Islands", "CA": "Canada", "CG": "Republic of the Congo", "CF": "Central African Republic", "CD": "Democratic Republic of the Congo", "CZ": "Czech Republic", "CY": "Cyprus", "CX": "Christmas Island", "CR": "Costa Rica", "CW": "Curacao", "CV": "Cape Verde", "CU": "Cuba", "SZ": "Swaziland", "SY": "Syria", "SX": "Sint Maarten", "KG": "Kyrgyzstan", "KE": "Kenya", "SS": "South Sudan", "SR": "Suriname", "KI": "Kiribati", "KH": "Cambodia", "KN": "Saint Kitts and Nevis", "KM": "Comoros", "ST": "Sao Tome and Principe", "SK": "Slovakia", "KR": "South Korea", "SI": "Slovenia", "KP": "North Korea", "KW": "Kuwait", "SN": "Senegal", "SM": "San Marino", "SL": "Sierra Leone", "SC": "Seychelles", "KZ": "Kazakhstan", "KY": "Cayman Islands", "SG": "Singapore", "SE": "Sweden", "SD": "Sudan", "DO": "Dominican Republic", "DM": "Dominica", "DJ": "Djibouti", "DK": "Denmark", "VG": "British Virgin Islands", "DE": "Germany", "YE": "Yemen", "DZ": "Algeria", "US": "United States", "UY": "Uruguay", "YT": "Mayotte", "UM": "United States Minor Outlying Islands", "LB": "Lebanon", "LC": "Saint Lucia", "LA": "Laos", "TV": "Tuvalu", "TW": "Taiwan", "TT": "Trinidad and Tobago", "TR": "Turkey", "LK": "Sri Lanka", "LI": "Liechtenstein", "LV": "Latvia", "TO": "Tonga", "LT": "Lithuania", "LU": "Luxembourg", "LR": "Liberia", "LS": "Lesotho", "TH": "Thailand", "TF": "French Southern Territories", "TG": "Togo", "TD": "Chad", "TC": "Turks and Caicos Islands", "LY": "Libya", "VA": "Vatican", "VC": "Saint Vincent and the Grenadines", "AE": "United Arab Emirates", "AD": "Andorra", "AG": "Antigua and Barbuda", "AF": "Afghanistan", "AI": "Anguilla", "VI": "U.S. Virgin Islands", "IS": "Iceland", "IR": "Iran", "AM": "Armenia", "AL": "Albania", "AO": "Angola", "AQ": "Antarctica", "AS": "American Samoa", "AR": "Argentina", "AU": "Australia", "AT": "Austria", "AW": "Aruba", "IN": "India", "AX": "Aland Islands", "AZ": "Azerbaijan", "IE": "Ireland", "ID": "Indonesia", "UA": "Ukraine", "QA": "Qatar", "MZ": "Mozambique" } jQuery.getJSON('https://ipinfo.io/?token=0bf8c6f3cbc2ca', function (data) { countryName = data.country; var cntry = country[countryName]; jQuery("#input_30_6_6 option[value='" + cntry + "']").attr("selected", "selected"); jQuery("#input_31_51_6 option[value='" + cntry + "']").attr("selected", "selected"); //input_30_6_6 }); // Disable Form on submit jQuery(".gform_button").click(function () { jQuery(document).ready(function () { jQuery(':input[type="submit"]').prop('disabled', true); jQuery('input[type="text"]').keyup(function () { if (jQuery(this).val() != '') { Query(':input[type="submit"]').prop('disabled', false); } }); }); }) }); </script> <div class="pswp" tabindex="-1" role="dialog" aria-hidden="true"> <div class="pswp__bg"></div> <div class="pswp__scroll-wrap"> <div class="pswp__container"> <div class="pswp__item"></div> <div class="pswp__item"></div> <div class="pswp__item"></div> </div> <div class="pswp__ui pswp__ui--hidden"> <div class="pswp__top-bar"> <div class="pswp__counter"></div> <button class="pswp__button pswp__button--close" title="Close (Esc)" aria-label="Close (Esc)"></button> <button class="pswp__button pswp__button--share" title="Share" aria-label="Share"></button> <button class="pswp__button pswp__button--fs" title="Toggle fullscreen" aria-label="Toggle fullscreen"></button> <button class="pswp__button pswp__button--zoom" title="Zoom in/out" aria-label="Zoom in/out"></button> <div class="pswp__preloader"> <div class="pswp__preloader__icn"> <div class="pswp__preloader__cut"> <div class="pswp__preloader__donut"></div> </div> </div> </div> </div> <div class="pswp__share-modal pswp__share-modal--hidden pswp__single-tap"> <div class="pswp__share-tooltip"></div> </div> <button class="pswp__button pswp__button--arrow--left" title="Previous (arrow left)" aria-label="Previous (arrow left)"> </button> <button class="pswp__button pswp__button--arrow--right" title="Next (arrow right)" aria-label="Next (arrow right)"> </button> <div class="pswp__caption"> <div class="pswp__caption__center"></div> </div> </div> </div> </div> </body> </html>