{"id":77573,"date":"2022-09-02T11:42:26","date_gmt":"2022-09-02T11:42:26","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=77573"},"modified":"2026-01-16T05:13:50","modified_gmt":"2026-01-16T05:13:50","slug":"how-to-become-ciso","status":"publish","type":"post","link":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/how-to-become-ciso\/","title":{"rendered":"How to Become a CISO (Chief Information Security Officer)\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"77573\" class=\"elementor elementor-77573\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a165368 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a165368\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9e6e650\" data-id=\"9e6e650\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-939fd24 elementor-widget elementor-widget-text-editor\" data-id=\"939fd24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe Chief Information Security Officer (CISO) is one of digital security\u2019s most powerful and high-paying roles. As a CISO, you\u2019ll have complete responsibility for all aspects of your organization\u2019s data. You will also play a vital role in business strategy and help shape your company\u2019s future.\n\nBecoming a CISO is generally considered the final destination of one\u2019s cybersecurity career path. However, it\u2019s never too early to start planning a route that takes you all the way to the boardroom, even if you\u2019re only taking your first steps in the world of information security.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7390c1e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7390c1e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6185c4f\" data-id=\"6185c4f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ee20e44 elementor-widget elementor-widget-heading\" data-id=\"ee20e44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Are CISOs in Demand? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b0474d elementor-widget elementor-widget-text-editor\" data-id=\"7b0474d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>CISO is a relatively new position in the C-Suite. However, numerous companies are deciding to appoint a dedicated director of security. Around 55% of all companies currently have a dedicated CISO on the board. Of those that don\u2019t have a CISO, 58% say they will add this position (Navisite, 2021).<\/p><p>In the past, IT security was part of the remit of other senior IT leaders. The <a href=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/how-to-become-a-chief-technology-officer-cto\/\">Chief Technology Officer (CTO)<\/a> or the Chief Information Officer (CIO) generally took responsibility for preventing cyberattacks. These executives would work with cyber security experts within the IT team to create robust digital defenses.<\/p><p>However, the sheer scale of cyberthreats mean security is now a leadership issue. According to the FBI, cyber fraud has increased by almost 500% in the last five years (Federal Bureau of Investigation, 2021). The cost of a hack can run to USD 180 per individual file accessed (IBM Security, 2021).<\/p><p>Organizations are under constant threat from cybercriminals. That\u2019s why it makes sense to appoint an experienced security expert who can offer guidance and support at a strategic level.<\/p><p>CISO is a well-paid position with an average salary of around USD 231,000 (Salary, 2022). However, executive remuneration can vary, depending on the company\u2019s size and the job\u2019s nature. In recent years, top-tier CISOs have commanded salaries of over USD 2.3 million (Melin, 2019).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1e3b455 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1e3b455\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4a905b5\" data-id=\"4a905b5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2e5832f elementor-widget elementor-widget-heading\" data-id=\"2e5832f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What Does a Chief Information Security Officer's Do?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ed7b9f elementor-widget elementor-widget-text-editor\" data-id=\"9ed7b9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Chief Information Security Officer is an executive-level position. If you become a <a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\">CISO<\/a>, you will work directly with the organization\u2019s other executives, including the CEO.<\/p><p>Your primary duty will be to protect your organization\u2019s data. A Chief Information Security Officer\u2019s responsibilities include:<\/p><ul><li><strong>Developing a security infrastructure:<\/strong> You will work with a team of security managers and architects to build an operational security infrastructure. You will have a high-level overview of all groups, departments, and business units. You are also responsible for incident response and the disaster recovery plan. Keeping all these elements aligned will require excellent communication, delegation, and problem-solving skills.<\/li><li><strong>Supporting business strategy:<\/strong> Senior leaders spend most of their time talking about the future. What\u2019s the smartest next step? Is it time to grow or consolidate? As a CISO, you will help your C-Suite colleagues develop business strategies that are safe and secure. You need to be a strategic thinker with a keen eye for risks and opportunities.<\/li><li><strong>Approving technology investment:<\/strong> The CISO works closely with the CTO and CIO to make plans about the organization\u2019s IT infrastructure. Together, you\u2019ll identify technological solutions that support growth without creating additional risk.<\/li><li><strong>Overseeing regulatory compliance:<\/strong> Handling data raises several compliance issues especially if you have customers in different jurisdictions. As CISO, you will ensure that the organization always follows the correct rules and standards. You\u2019ll also alert the other board members if their plans might lead to compliance issues.<\/li><\/ul><p>Data is the lifeblood of every modern company. As CISO, your job is to ensure that data flows safely and reliably throughout your organization. With cyber security under control, the company will be free to focus on its long-term strategy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c66a347 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c66a347\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e018d58\" data-id=\"e018d58\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bf15833 elementor-widget elementor-widget-heading\" data-id=\"bf15833\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to Become a CISO<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-501cfa1 elementor-widget elementor-widget-text-editor\" data-id=\"501cfa1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>When a company hires a new <a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\">Chief Information Security Officer<\/a>, they\u2019re looking for someone they can trust completely. As CISO, you will have complete control over data security. You will also have a voice in the company\u2019s long-term strategy.<\/p><p>To become a CISO, you must prove that the company can trust you in the role. You can do this by building a compelling record of accomplishment in cybersecurity. Here are the steps you can take:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-364ef93 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"364ef93\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2f4129c\" data-id=\"2f4129c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8a1a052 elementor-widget elementor-widget-heading\" data-id=\"8a1a052\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Get the right education<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f47f46a elementor-widget elementor-widget-text-editor\" data-id=\"f47f46a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Your education will be the foundation of your CISO career. At a minimum, you should have a bachelor\u2019s degree in computer science or a related discipline. Most companies will also expect a postgraduate qualification such as a <a href=\"https:\/\/www.eccu.edu\/online-cyber-security-degrees\/master-in-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">Master of Science in Cybersecurity (MSCS)<\/a> (Indeed, 2021).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6ec2e4f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6ec2e4f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d2eb80b\" data-id=\"d2eb80b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-91d91a5 elementor-widget elementor-widget-heading\" data-id=\"91d91a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Build your technical experience<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-840bdb8 elementor-widget elementor-widget-text-editor\" data-id=\"840bdb8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tYou will need to have a substantial digital security background before applying for a CISO position. Ideally, you should have a diverse knowledge of different platforms and solutions. You should also have a broad understanding of cyber threats. Most roles require a minimum of five years\u2019 worth of hands-on experience (LinkedIn, 2021).\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2b564c8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2b564c8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8854929\" data-id=\"8854929\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ddb2d9 elementor-widget elementor-widget-heading\" data-id=\"6ddb2d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Get leadership experience<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4653aca elementor-widget elementor-widget-text-editor\" data-id=\"4653aca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>CISO is essentially a leadership role. Much of your energy will go into building an outstanding security team and helping them deliver your strategy. As such, you will need an exceptional background in managing, supporting, and communicating with a team. Seven years of management experience is often the minimum for CISO roles (LinkedIn, 2021).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-41d756d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"41d756d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-28c9040\" data-id=\"28c9040\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b52f3bb elementor-widget elementor-widget-heading\" data-id=\"b52f3bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4. Become qualified as a Chief Information Security Officer<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83739c3 elementor-widget elementor-widget-text-editor\" data-id=\"83739c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The hardest part of the journey is often the leap from <a href=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/\" target=\"_blank\" rel=\"noopener\">management to executive leadership<\/a>. You can give yourself a boost across this divide by obtaining an up-to-date qualification that will equip you with everything you need to succeed as a CISO. The<a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\" target=\"_blank\" rel=\"noopener\"> Certified Chief Information Officer<\/a> (CCISO) qualification can provide you with up-to-date information and crucial real-world experience.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-82aaa92 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"82aaa92\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b256f34\" data-id=\"b256f34\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cbcc7ff elementor-widget elementor-widget-heading\" data-id=\"cbcc7ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">5. Develop your strategic vision<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a525e2 elementor-widget elementor-widget-text-editor\" data-id=\"6a525e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>When a business hires a new executive, they\u2019re looking for someone who can lead them into the future. You will need to show that you are more than just a talented security manager you\u2019re someone who can support growth and innovation. What strategic vision will you bring to the boardroom?<\/p><p>The path to becoming a CISO is long and arduous. But, if you\u2019re genuinely passionate about security, this is your chance to become an innovative leader in the fight against cybercrime.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ff319a1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ff319a1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1c23ccf\" data-id=\"1c23ccf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fac2de3 elementor-widget elementor-widget-heading\" data-id=\"fac2de3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to Get Started on a CISO Career Path<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-847f6cc elementor-widget elementor-widget-text-editor\" data-id=\"847f6cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Every journey starts with a first step. If you\u2019re an IT professional considering moving into security, you could start by looking at the\u00a0<a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-network-security-course\/\" target=\"_blank\" rel=\"noopener\">Certified Network Defender (CND) <\/a>certificate. This beginner\u2019s level qualification will help you find your first job in InfoSec.<\/p><p>From there, it\u2019s a matter of staying focused on building your resume. Seek every opportunity to develop the three main strands of your professional experience:<\/p><ul><li><strong>Technical:<\/strong> Learn everything you can about cyber threats and countermeasures. Study security architecture across multiple platforms and learn everything about hacking methodologies.<\/li><li><strong>Managerial:<\/strong> Work on projects that give you a chance to manage a team. Learn leadership skills like communication, delegation, budgeting, reporting, and internal negotiations.<\/li><li><strong>Strategic:<\/strong> Take every chance to show initiative. Pay close attention to the way that business processes (such as cyber security measures) support business goals.<\/li><\/ul><p>There aren\u2019t any shortcuts on the way to the CISO office. CISO training is a matter of putting in the hours. You must spend time gaining experience, learning as you go.<\/p><p>Eventually, you\u2019ll reach a point where you have five years\u2019 experience (or relevant qualification) in the following areas:<\/p><ol><li>Governance, risk, and compliance<\/li><li>Information security controls and audit management<\/li><li>Security program management &amp; operations<\/li><li>Information security core competencies<\/li><li>Strategic planning, finance, procurement, and third-party management<\/li><\/ol><p>At this point, you\u2019re ready to pursue the <a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\">CCISO certification<\/a> from EC-Council. This globally recognized qualification gives you the knowledge to step into executive leadership and the practical experience to help you succeed.<\/p><p>Are you ready to step up to the C-Suite? Find out more about how chief information security officer training with CCISO can unlock your ultimate career goals.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7b40c37 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7b40c37\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8b196f2\" data-id=\"8b196f2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b3d6468 elementor-widget elementor-widget-heading\" data-id=\"b3d6468\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">References<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-599976c elementor-widget elementor-widget-text-editor\" data-id=\"599976c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Navisite. (2021). The state of cybersecurity leadership and readiness. <em>https:\/\/www.navisite.com\/resources\/reports-1\/state-of-cybersecurity-leadership-and-readiness-report<\/em><\/p><p>Federal Bureau of Investigation. (2021). Internet crime report 2021. <em>https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2021_IC3Report.pdf<\/em><\/p><p>IBM Security. (2021). Cost of a data breach report 2021. <em>https:\/\/www.ibm.com\/security\/data-breach<\/em><\/p><p>Indeed. (2021, April 5). How to become a chief information security officer. <em>https:\/\/www.indeed.com\/career-advice\/finding-a-job\/how-to-become-chief-information-security-officer<\/em><\/p><p>LinkedIn. (2021). Example career path: CISO (director). <em>https:\/\/www.linkedin.com\/learning\/it-security-careers-and-certifications-first-steps\/example-career-path-ciso-director<\/em><\/p><p>Salary.com. (2022). Chief information security officer salary in the United States. <em>https:\/\/www.salary.com\/research\/salary\/benchmark\/chief-information-security-officer-salary<\/em><\/p><p>Melin, A. (2019, August 7). Cybersecurity pros name their price as data hacking attacks swell. L.A. Times. <em>https:\/\/www.latimes.com\/business\/story\/2019-08-07\/cybersecurity-pros-name-their-price-as-hacker-attacks-swell<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Chief Information Security Officer (CISO) is one of digital security\u2019s most powerful and high-paying roles. As a CISO, you\u2019ll have complete responsibility for all aspects of your organization\u2019s data. You will also play a vital role in business strategy and help shape your company\u2019s future.<\/p>\n","protected":false},"author":33,"featured_media":80745,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[3444],"tags":[],"class_list":{"0":"post-77573","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-executive-management"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Become a CISO: Step-by-Step Guide to CISO Career Path<\/title>\n<meta name=\"description\" content=\"Discover how to become a CISO with EC-Council\u2019s expert guidance. Learn essential skills, qualifications, &amp; certifications to advance your cybersecurity leadership career.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/how-to-become-ciso\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Become a CISO: Step-by-Step Guide to CISO Career Path\" \/>\n<meta property=\"og:description\" content=\"Discover how to become a CISO with EC-Council\u2019s expert guidance. Learn essential skills, qualifications, &amp; certifications to advance your cybersecurity leadership career.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/how-to-become-ciso\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-02T11:42:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-16T05:13:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/09\/how-to-become-ciso-feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How to Become a CISO: Step-by-Step Guide to CISO Career Path\" \/>\n<meta name=\"twitter:description\" content=\"Discover how to become a CISO with EC-Council\u2019s expert guidance. Learn essential skills, qualifications, &amp; certifications to advance your cybersecurity leadership career.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/09\/how-to-become-ciso-feature.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/how-to-become-ciso\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/how-to-become-ciso\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\"},\"headline\":\"How to Become a CISO (Chief Information Security Officer)\u00a0\",\"datePublished\":\"2022-09-02T11:42:26+00:00\",\"dateModified\":\"2026-01-16T05:13:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/how-to-become-ciso\\\/\"},\"wordCount\":1427,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/how-to-become-ciso\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/how-to-become-ciso-thumb.jpg\",\"articleSection\":[\"Executive Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/how-to-become-ciso\\\/\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/how-to-become-ciso\\\/\",\"name\":\"How to Become a CISO: Step-by-Step Guide to CISO Career Path\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/how-to-become-ciso\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/how-to-become-ciso\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/how-to-become-ciso-thumb.jpg\",\"datePublished\":\"2022-09-02T11:42:26+00:00\",\"dateModified\":\"2026-01-16T05:13:50+00:00\",\"description\":\"Discover how to become a CISO with EC-Council\u2019s expert guidance. Learn essential skills, qualifications, & certifications to advance your cybersecurity leadership career.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/how-to-become-ciso\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/how-to-become-ciso\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/how-to-become-ciso\\\/#primaryimage\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/how-to-become-ciso-thumb.jpg\",\"contentUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/how-to-become-ciso-thumb.jpg\",\"width\":521,\"height\":521,\"caption\":\"Chief Information Security Officer (CISO)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/how-to-become-ciso\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Executive Management\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/executive-management\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"How to Become a CISO (Chief Information Security Officer)\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Become a CISO: Step-by-Step Guide to CISO Career Path","description":"Discover how to become a CISO with EC-Council\u2019s expert guidance. Learn essential skills, qualifications, & certifications to advance your cybersecurity leadership career.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/how-to-become-ciso\/","og_locale":"en_US","og_type":"article","og_title":"How to Become a CISO: Step-by-Step Guide to CISO Career Path","og_description":"Discover how to become a CISO with EC-Council\u2019s expert guidance. Learn essential skills, qualifications, & certifications to advance your cybersecurity leadership career.","og_url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/how-to-become-ciso\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2022-09-02T11:42:26+00:00","article_modified_time":"2026-01-16T05:13:50+00:00","og_image":[{"width":521,"height":521,"url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/09\/how-to-become-ciso-feature.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_title":"How to Become a CISO: Step-by-Step Guide to CISO Career Path","twitter_description":"Discover how to become a CISO with EC-Council\u2019s expert guidance. Learn essential skills, qualifications, & certifications to advance your cybersecurity leadership career.","twitter_image":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/09\/how-to-become-ciso-feature.jpg","twitter_misc":{"Written by":"EC-Council","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/how-to-become-ciso\/#article","isPartOf":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/how-to-become-ciso\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd"},"headline":"How to Become a CISO (Chief Information Security Officer)\u00a0","datePublished":"2022-09-02T11:42:26+00:00","dateModified":"2026-01-16T05:13:50+00:00","mainEntityOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/how-to-become-ciso\/"},"wordCount":1427,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/how-to-become-ciso\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/09\/how-to-become-ciso-thumb.jpg","articleSection":["Executive Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/how-to-become-ciso\/","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/how-to-become-ciso\/","name":"How to Become a CISO: Step-by-Step Guide to CISO Career Path","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/how-to-become-ciso\/#primaryimage"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/how-to-become-ciso\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/09\/how-to-become-ciso-thumb.jpg","datePublished":"2022-09-02T11:42:26+00:00","dateModified":"2026-01-16T05:13:50+00:00","description":"Discover how to become a CISO with EC-Council\u2019s expert guidance. Learn essential skills, qualifications, & certifications to advance your cybersecurity leadership career.","breadcrumb":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/how-to-become-ciso\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/how-to-become-ciso\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/how-to-become-ciso\/#primaryimage","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/09\/how-to-become-ciso-thumb.jpg","contentUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/09\/how-to-become-ciso-thumb.jpg","width":521,"height":521,"caption":"Chief Information Security Officer (CISO)"},{"@type":"BreadcrumbList","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/how-to-become-ciso\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/test1.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Executive Management","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/category\/executive-management\/"},{"@type":"ListItem","position":4,"name":"How to Become a CISO (Chief Information Security Officer)\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/77573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=77573"}],"version-history":[{"count":0,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/77573\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/80745"}],"wp:attachment":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=77573"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=77573"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=77573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}