{"id":79971,"date":"2023-08-18T12:10:36","date_gmt":"2023-08-18T12:10:36","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=79971"},"modified":"2025-09-29T12:47:39","modified_gmt":"2025-09-29T12:47:39","slug":"eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security","status":"publish","type":"post","link":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\/","title":{"rendered":"EC-Council&#8217;s Certified Chief Information Security Officer (CCISO) Program Trusted at the Highest Level of Cyber Leadership and Strategy for Cyber Workforce Job Billets Critical to National Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"79971\" class=\"elementor elementor-79971\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-165cb4c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"165cb4c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d63b7d3\" data-id=\"d63b7d3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-05a05d8 elementor-widget elementor-widget-text-editor\" data-id=\"05a05d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The future of national security lies in the hands of our cyber leaders, as they set policies, make workforce decisions, manage vendors and contractors, and run the entire supply chain. Providing decisive support with escalating global tensions and fighting a war on an invisible shifting battlefield are just a couple tasks our nation\u2019s cyber leaders confront every day.<\/p><p>Focusing on the advanced level qualifications, DoD 8140 recognized the <a href=\"https:\/\/test1.eccouncil.org\/\">EC-Council<\/a>&#8216;s <a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\">Certified Chief Information Security Officer (CCISO)<\/a> program as meeting the qualification standards for some of the most demanding cyber leadership roles across the defense community. As the United States pursues the execution of its cyber strategy, the DoD will rely on the CCISO certification to qualify its top leaders in their roles.<\/p><h2>31 DCWF Job Roles that Recognize EC-Council Certifications.<br \/>(DCWF Job roles that Recognize CCISO are highlighted)<\/h2><div class=\"table-responsive\"><table class=\"table1\"><thead><tr><th>Role<\/th><th>Basic<\/th><th>Intermediate<\/th><th>Advanced<\/th><\/tr><\/thead><tbody><tr><td>(211) Forensic Analyst<\/td><td>\u00a0<\/td><td><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/computer-hacking-forensic-investigator-chfi\/\">CHFI<\/a><\/td><td>\u00a0<\/td><\/tr><tr><td>(212) Cyber Defense Forensics Analyst<\/td><td>\u00a0<\/td><td><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/computer-hacking-forensic-investigator-chfi\/\">CHFI<\/a><\/td><td>\u00a0<\/td><\/tr><tr><td>(221) Cyber Crime Investigator<\/td><td>\u00a0<\/td><td><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/computer-hacking-forensic-investigator-chfi\/\">CHFI<\/a><\/td><td>\u00a0<\/td><\/tr><tr><td>(411) Technical Support Specialist<\/td><td>\u00a0<\/td><td><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-network-security-course\/\">CND<\/a><\/td><td>\u00a0<\/td><\/tr><tr><td class=\"hy\">(422) Data Analyst<\/td><td>\u00a0<\/td><td>\u00a0<\/td><td class=\"hy\"><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\">CCISO<\/a><\/td><\/tr><tr><td>(441) Network Operations Specialist<\/td><td><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-network-security-course\/\">CND<\/a><\/td><td><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\">CEH<\/a><\/td><td>\u00a0<\/td><\/tr><tr><td>(451) System Administrator<\/td><td><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-network-security-course\/\">CND<\/a><\/td><td>\u00a0<\/td><td>\u00a0<\/td><\/tr><tr><td>(461) Systems Security Analyst<\/td><td><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-network-security-course\/\">CND<\/a><\/td><td>\u00a0<\/td><td>\u00a0<\/td><\/tr><tr><td>(511) Cyber Defense Analyst<\/td><td><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\">CEH<\/a><\/td><td>\u00a0<\/td><td>\u00a0<\/td><\/tr><tr><td>(521) Cyber Defense Infrastructure Support Specialist<\/td><td><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-network-security-course\/\">CND<\/a><\/td><td><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\">CEH<\/a><\/td><td>\u00a0<\/td><\/tr><tr><td>(541) Vulnerability Assessment Analyst<\/td><td><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\">CEH<\/a><\/td><td>\u00a0<\/td><td>\u00a0<\/td><\/tr><tr><td class=\"hy\">(611) Authorizing Official\/Designating Representative<\/td><td>\u00a0<\/td><td>\u00a0<\/td><td class=\"hy\"><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\">CCISO<\/a><\/td><\/tr><tr><td class=\"hy\">(612) Security Control Assessor<\/td><td>\u00a0<\/td><td>\u00a0<\/td><td class=\"hy\"><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\">CCISO<\/a><\/td><\/tr><tr><td>(631) Information Systems Security Developer<\/td><td><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-network-security-course\/\">CND<\/a><\/td><td>\u00a0<\/td><td>\u00a0<\/td><\/tr><tr><td>(632) Systems Developer<\/td><td><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-network-security-course\/\">CND<\/a><\/td><td>\u00a0<\/td><td>\u00a0<\/td><\/tr><tr><td>(641) Systems Requirements Planner<\/td><td><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-network-security-course\/\">CND<\/a><\/td><td>\u00a0<\/td><td>\u00a0<\/td><\/tr><tr><td>(651) Enterprise Architect<\/td><td><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-network-security-course\/\">CND<\/a><\/td><td>\u00a0<\/td><td>\u00a0<\/td><\/tr><tr><td>(661) R&amp;D Specialist<\/td><td>\u00a0<\/td><td>\u00a0<\/td><td><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\">CEH<\/a><\/td><\/tr><tr><td>(671) System Testing &amp; Evaluation Specialist<\/td><td><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-network-security-course\/\">CND<\/a><\/td><td><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\">CEH<\/a><\/td><td>\u00a0<\/td><\/tr><tr><td class=\"hy\">(722) Information Systems Security Manager<\/td><td>\u00a0<\/td><td class=\"hy\"><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\">CCISO<\/a><\/td><td>\u00a0<\/td><\/tr><tr><td class=\"hy\">(751) Cyber Workforce Developer and Manager<\/td><td>\u00a0<\/td><td>\u00a0<\/td><td class=\"hy\"><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\">CCISO<\/a><\/td><\/tr><tr><td class=\"hy\">(752) Cyber Policy and Strategy Planner<\/td><td>\u00a0<\/td><td>\u00a0<\/td><td class=\"hy\"><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\">CCISO<\/a><\/td><\/tr><tr><td class=\"hy\">(801) Program Manager<\/td><td>\u00a0<\/td><td>\u00a0<\/td><td class=\"hy\"><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\">CCISO<\/a><\/td><\/tr><tr><td class=\"hy\">(802) IT Project Manager<\/td><td>\u00a0<\/td><td>\u00a0<\/td><td class=\"hy\"><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\">CCISO<\/a><\/td><\/tr><tr><td class=\"hy\">(803) Product Support Manager<\/td><td>\u00a0<\/td><td>\u00a0<\/td><td class=\"hy\"><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\">CCISO<\/a><\/td><\/tr><tr><td class=\"hy\">(804) IT Investment\/Portfolio Manager<\/td><td>\u00a0<\/td><td>\u00a0<\/td><td class=\"hy\"><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\">CCISO<\/a><\/td><\/tr><tr><td class=\"hy\">(805) IT Program Auditor<\/td><td>\u00a0<\/td><td>\u00a0<\/td><td class=\"hy\"><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\">CCISO<\/a><\/td><\/tr><tr><td class=\"hy\">(901) Executive Cyber Leadership<\/td><td>\u00a0<\/td><td>\u00a0<\/td><td class=\"hy\"><a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\">CCISO<\/a><\/td><\/tr><\/tbody><\/table><\/div><h2>\u00a0<\/h2><h2>\u00a0<\/h2><h2>\u00a0<\/h2><h2>\u00a0<\/h2><h2>What are DoD 8140 and DoDM 8140?<\/h2><p>DoD 8140, also referred to as Department of Defense Directive 8140, together with DoDM 8140 and DoDI 8140, jointly establish the directive, instruction, and manual that govern the classification and qualification requirements for individuals working in cyber security capacities within the United States Department of Defense.<\/p><p>These three documents collectively accomplish the following:<\/p><ul><li>Establish the mandate for the required qualification of members working in the DoD cyberspace workforce on a wide scale<\/li><li>Identify members of the DoD cyberspace workforce based on their assigned work role(s)<\/li><li>Implement policies, assign job role-based responsibilities, and define procedures for qualifying personnel in the DoD cyberspace workforce<\/li><\/ul><p>Furthermore, since 2007, EC-Council has held multiple approved certifications that have a global impact on the training and certification of DoD members, aiding in the qualification and capability development of US military forces and DoD components.<\/p><h2>\u00a0<\/h2><h2>\u00a0<\/h2><h2>\u00a0<\/h2><h2>\u00a0<\/h2><h2>What is the DoD Cyberspace Workforce Framework (DCWF)?<\/h2><p>The DoD Cyberspace Workforce Framework (DCWF) establishes a taxonomy for cyberspace work roles and outlines the associated responsibilities in terms of requirements for tasks, knowledge, and skills. When combined with DoD 8140, the DCWF defines both work role requirements and qualification criteria for members of the DoD Cyber Workforce.<\/p><h2>CCISO: Certified Chief Information Security Officer<\/h2><h3><span style=\"color: var(--the7-h3-color); letter-spacing: var(--the7-h3-letter-spacing); text-transform: var(--the7-h3-text-transform); word-spacing: var(--the7-h3-word-spacing);\">About the CCISO Program:<\/span><\/h3><p>EC-Council\u2019s Chief Certified Information Security Officer (CCISO) program is an industry-leading certification designed to help infosec professionals advance to C-suite roles. With comprehensive learning in the five CCISO domains, the CCISO program perfectly bridges the gap between technical, executive management, and financial functions, helping professionals seamlessly transition to management roles. <a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\">Certified CISOs<\/a> gain an upper management perspective in planning, strategizing, and executing information security portfolios and acquire leadership skills and business acumen to succeed at the top positions in information security.<\/p><h3>CCISO Course Outline<\/h3><p><strong>DOMAIN 1:<\/strong><br \/>Governance and Risk Management: This domain covers the development of a comprehensive information security program, risk management strategies, and legal and regulatory compliance.<\/p><p><strong>DOMAIN 2: <\/strong><\/p><p>Information Security Controls, Compliance, and Audit Management: This domain covers the management of information security controls, compliance with industry standards and regulations, and the execution of security audits.<\/p><p><strong>DOMAIN 3:<\/strong><\/p><p>Security Program Management and Operations: This domain covers the management and operation of an information security program, including incident response, disaster recovery, and business continuity planning.<\/p><p><strong>DOMAIN 4:<\/strong><\/p><p>Information Security Core Competencies: This domain covers the fundamental concepts of information security, including cryptography, network security, application security, and access control.<\/p><p><strong>DOMAIN 5:<\/strong><\/p><p>Strategic Planning, Finance, Procurement, and Vendor Management: This domain covers the management of financial resources, procurement of technology, and vendor management.<\/p><h3>CCISO Training and Examination Information to Get Certified<\/h3><p>Please visit the <strong>CCISO<\/strong> training page, complete the form, and speak with a career advisor to receive guidance regarding the certification process and any other queries regarding the course.<\/p><p><strong>Training<\/strong><\/p><ul><li>Instructor-Led Program<\/li><li>Live War Game Sessions<\/li><\/ul><p><strong>Examination Format<\/strong><\/p><ul><li>Test Format: Scenario-Based Multiple-Choice Questions<\/li><li>Number of Questions: 150<\/li><li>Duration: 2.5 Hours<\/li><\/ul><p>For more information, visit: <a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\">CCISO certification program<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-26485dd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"26485dd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e186b6e\" data-id=\"e186b6e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-035a698 elementor-widget elementor-widget-heading\" data-id=\"035a698\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FAQs <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c09a4f elementor-widget elementor-widget-heading\" data-id=\"9c09a4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">DoDD 8140 Job Roles Mapped with Certified Chief Information Security Officer (CCISO) <\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e4c636 elementor-widget elementor-widget-accordion\" data-id=\"2e4c636\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4851\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-4851\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is a Data Analyst? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4851\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-4851\"><p>The main role of a data analyst is to collect, analyze, and interpret data to provide critical insights and make business decisions. The average salary in the US for a data analyst is $82,901. (Salary.com, 2023).<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4852\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-4852\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is a Security Control Assessor? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4852\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-4852\"><p>A security control assessor (SCA) evaluates and assesses the overall effectiveness of security controls in information systems by performing comprehensive security risk assessments. The average salary of a Security Control Assessor in the United States is $64,520 per year. (Glassdoor, 2023).<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4853\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-4853\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is an Information Systems Security Manager? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4853\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-4853\"><p>Information systems security managers are responsible for overseeing and protecting an organization&#8217;s networks, systems, and databases against security breaches. The average base salary of these professionals in the United States is $147,115 (Salary.com, 2023).<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4854\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-4854\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is a Cyber Workforce Developer and Manager? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4854\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-4854\"><p>Cyber workforce developers and managers are responsible for ideating and strategizing cyber workforce plans to support and train personnel.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4855\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-4855\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is a Cyber Policy and Strategy Planner? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4855\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-4855\"><p>Cyber policy and strategy planners are primarily responsible for developing plans and strategies to help organizations meet their cyber security goals and achieve regulatory compliance. The average salary of junior-level cyber strategy, planning, and policy analysts at certain companies in the United States is $107,200.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4856\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-4856\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"> What is a Program Manager? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4856\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-4856\"><p>Program managers are responsible for driving multiple project initiatives through strategic management and advancing an organization&#8217;s goals. The average salary for these professionals in the United States is $146,598 per year (Salary.com, 2023)<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4857\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-4857\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is an IT Project Manager?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4857\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-4857\"><p>An IT project manager manages the entire lifecycle of an IT project, from conception to execution. The average salary for these professionals in the United States is $98,600 annually (Indeed, 2023).<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4858\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-4858\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"> What is a Product Support Manager?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4858\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-4858\"><p>Product support managers guide teams that provide technical support for IT products and services. The average salary for a product support manager is $89,512 per year in the US (Glassdoor, 2023).<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4859\" class=\"elementor-tab-title\" data-tab=\"9\" role=\"button\" aria-controls=\"elementor-tab-content-4859\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is an IT Investment\/Portfolio Manager? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4859\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"region\" aria-labelledby=\"elementor-tab-title-4859\"><p>These professionals manage a company&#8217;s IT investments and projects, including allocating resources, assessing risks, and controlling costs. The average salary for IT investment\/portfolio managers in the United States is $103,058 per year (Salary.com).<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-48510\" class=\"elementor-tab-title\" data-tab=\"10\" role=\"button\" aria-controls=\"elementor-tab-content-48510\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is an IT Auditor? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-48510\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"10\" role=\"region\" aria-labelledby=\"elementor-tab-title-48510\"><p>Information technology auditors are responsible for conducting and monitoring audits of a company&#8217;s IT systems and ensuring they comply with industry standards. The average salary for an IT auditor in the US is $84,535 per year (Glassdoor, 2023).<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-48511\" class=\"elementor-tab-title\" data-tab=\"11\" role=\"button\" aria-controls=\"elementor-tab-content-48511\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is an Executive Cyber Leader?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-48511\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"11\" role=\"region\" aria-labelledby=\"elementor-tab-title-48511\"><p>An executive cyber leader holds a position of authority in an organization and is charged with determining and implementing its long-term cyber security goals. The average salary for an executive director with cyber security skills is $ 251,827 annually in the US (Payscale, 2023).<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b599940 elementor-widget elementor-widget-heading\" data-id=\"b599940\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">References <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-592bc98 elementor-widget elementor-widget-text-editor\" data-id=\"592bc98\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Glassdoor. (2023, August 6). How much does an IT Auditor make? <em>https:\/\/www.glassdoor.com\/Salaries\/it-auditor-salary-SRCH_KO0,10.htm<\/em><\/p><p>Glassdoor. (2023, August 6). Product Support Manager Salaries. <em>https:\/\/www.glassdoor.com\/Salaries\/product-support-manager-salary-SRCH_KO0,23.htm<\/em><\/p><p>Glassdoor. (2023, June 14). Security Control Assessor Salaries. How much does a Security Control Assessor make? <em>https:\/\/www.glassdoor.com\/Salaries\/security-control-assessor-salary-SRCH_KO0,25.htm<\/em><\/p><p>Indeed. (August 8, 2023). IT Project Manager Salary in the United States. <em>https:\/\/www.indeed.com\/career\/it-project-manager\/salaries<\/em><\/p><p>Payscale. (2023). Average Executive Director with Cyber Security Skills Salary. <em>https:\/\/www.payscale.com\/research\/US\/Job=Executive_Director\/Salary\/d5ce12e1\/Cyber-Security <\/em><\/p><p>Salary.com. (2023, July 25). BOOZ ALLEN HAMILTON Cyber Strategy, Planning, and Policy Analyst, Junior. <em>https:\/\/www.salary.com\/research\/salary\/employer\/booz-allen-hamilton\/cyber-strategy-planning-and-policy-analyst-junior-salary<\/em><\/p><p>Salary.com. (2023, July 25). Experienced Data Analyst Salary in the United States. <em>https:\/\/www.salary.com\/research\/salary\/alternate\/experienced-data-analyst-salary<\/em><\/p><p>Salary.com. (2023, July 25). Information Security Manager Salary in the United States. <em>https:\/\/www.salary.com\/research\/salary\/benchmark\/information-security-manager-salary<\/em><\/p><p>Salary.com. (2023. July 25). IT Portfolio Manager Salary. <em>https:\/\/www.salary.com\/research\/salary\/recruiting\/it-portfolio-manager-salary<\/em><\/p><p>Salary.com. (2023, July 25). Program Manager Salary in the United States. <em>https:\/\/www.salary.com\/research\/salary\/benchmark\/program-manager-salary<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The future of national security lies in the hands of our cyber leaders, as they set policies, make workforce decisions, manage vendors and contractors, and run the entire supply chain. Providing decisive support with escalating global tensions and fighting a war on an invisible shifting battlefield are just a couple tasks our nation\u2019s cyber leaders confront every day.<\/p>\n","protected":false},"author":33,"featured_media":80044,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[3444],"tags":[],"class_list":{"0":"post-79971","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-executive-management"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CCISO Program: Trusted Cyber Leadership &amp; Strategy for National Security<\/title>\n<meta name=\"description\" content=\"Empowering Cyber Leaders: Unveiling EC-Council&#039;s CCISO program, a trusted qualification for top-level cyber security strategy and leadership in 12 key DoD job billets (DoD 8140). Learn more in our authoritative blog.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EC-Council&#039;s Certified Chief Information Security Officer (CCISO) Program Trusted at the Highest Level of Cyber Leadership and Strategy for Cyber Workforce Job Billets Critical to National Security\" \/>\n<meta property=\"og:description\" content=\"Empowering Cyber Leaders: Unveiling EC-Council&#039;s CCISO program, a trusted qualification for top-level cyber security strategy and leadership in 12 key DoD job billets (DoD 8140). Learn more in our authoritative blog.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-18T12:10:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-29T12:47:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/CCISO-eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security-feature.png\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\"},\"headline\":\"EC-Council&#8217;s Certified Chief Information Security Officer (CCISO) Program Trusted at the Highest Level of Cyber Leadership and Strategy for Cyber Workforce Job Billets Critical to National Security\",\"datePublished\":\"2023-08-18T12:10:36+00:00\",\"dateModified\":\"2025-09-29T12:47:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\\\/\"},\"wordCount\":1413,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/EC-Councils-CCISO-Program-Recognized-for-12-Job-Billets-of-the-Department-of-Defense-fetured.jpg\",\"articleSection\":[\"Executive Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\\\/\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\\\/\",\"name\":\"CCISO Program: Trusted Cyber Leadership & Strategy for National Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/EC-Councils-CCISO-Program-Recognized-for-12-Job-Billets-of-the-Department-of-Defense-fetured.jpg\",\"datePublished\":\"2023-08-18T12:10:36+00:00\",\"dateModified\":\"2025-09-29T12:47:39+00:00\",\"description\":\"Empowering Cyber Leaders: Unveiling EC-Council's CCISO program, a trusted qualification for top-level cyber security strategy and leadership in 12 key DoD job billets (DoD 8140). Learn more in our authoritative blog.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/EC-Councils-CCISO-Program-Recognized-for-12-Job-Billets-of-the-Department-of-Defense-fetured.jpg\",\"contentUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/EC-Councils-CCISO-Program-Recognized-for-12-Job-Billets-of-the-Department-of-Defense-fetured.jpg\",\"width\":521,\"height\":521},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Executive Management\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/executive-management\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"EC-Council&#8217;s Certified Chief Information Security Officer (CCISO) Program Trusted at the Highest Level of Cyber Leadership and Strategy for Cyber Workforce Job Billets Critical to National Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CCISO Program: Trusted Cyber Leadership & Strategy for National Security","description":"Empowering Cyber Leaders: Unveiling EC-Council's CCISO program, a trusted qualification for top-level cyber security strategy and leadership in 12 key DoD job billets (DoD 8140). Learn more in our authoritative blog.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\/","og_locale":"en_US","og_type":"article","og_title":"EC-Council's Certified Chief Information Security Officer (CCISO) Program Trusted at the Highest Level of Cyber Leadership and Strategy for Cyber Workforce Job Billets Critical to National Security","og_description":"Empowering Cyber Leaders: Unveiling EC-Council's CCISO program, a trusted qualification for top-level cyber security strategy and leadership in 12 key DoD job billets (DoD 8140). Learn more in our authoritative blog.","og_url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-08-18T12:10:36+00:00","article_modified_time":"2025-09-29T12:47:39+00:00","og_image":[{"width":521,"height":521,"url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/CCISO-eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security-feature.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\/#article","isPartOf":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd"},"headline":"EC-Council&#8217;s Certified Chief Information Security Officer (CCISO) Program Trusted at the Highest Level of Cyber Leadership and Strategy for Cyber Workforce Job Billets Critical to National Security","datePublished":"2023-08-18T12:10:36+00:00","dateModified":"2025-09-29T12:47:39+00:00","mainEntityOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\/"},"wordCount":1413,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/EC-Councils-CCISO-Program-Recognized-for-12-Job-Billets-of-the-Department-of-Defense-fetured.jpg","articleSection":["Executive Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\/","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\/","name":"CCISO Program: Trusted Cyber Leadership & Strategy for National Security","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\/#primaryimage"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/EC-Councils-CCISO-Program-Recognized-for-12-Job-Billets-of-the-Department-of-Defense-fetured.jpg","datePublished":"2023-08-18T12:10:36+00:00","dateModified":"2025-09-29T12:47:39+00:00","description":"Empowering Cyber Leaders: Unveiling EC-Council's CCISO program, a trusted qualification for top-level cyber security strategy and leadership in 12 key DoD job billets (DoD 8140). Learn more in our authoritative blog.","breadcrumb":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\/#primaryimage","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/EC-Councils-CCISO-Program-Recognized-for-12-Job-Billets-of-the-Department-of-Defense-fetured.jpg","contentUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/EC-Councils-CCISO-Program-Recognized-for-12-Job-Billets-of-the-Department-of-Defense-fetured.jpg","width":521,"height":521},{"@type":"BreadcrumbList","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/eccouncil-cciso-program-trusted-cyber-leadership-and-strategy-for-national-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/test1.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Executive Management","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/category\/executive-management\/"},{"@type":"ListItem","position":4,"name":"EC-Council&#8217;s Certified Chief Information Security Officer (CCISO) Program Trusted at the Highest Level of Cyber Leadership and Strategy for Cyber Workforce Job Billets Critical to National Security"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=79971"}],"version-history":[{"count":0,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79971\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/80044"}],"wp:attachment":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=79971"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=79971"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=79971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}