{"id":81708,"date":"2024-03-11T02:49:40","date_gmt":"2024-03-11T02:49:40","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81708"},"modified":"2026-01-16T05:21:53","modified_gmt":"2026-01-16T05:21:53","slug":"what-next-after-cissp","status":"publish","type":"post","link":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/what-next-after-cissp\/","title":{"rendered":"What Next After CISSP"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81708\" class=\"elementor elementor-81708\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e41162d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e41162d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c47d97c\" data-id=\"c47d97c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3877974 elementor-widget elementor-widget-text-editor\" data-id=\"3877974\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: justify;\">EC-Council supports your continued leadership journey and that\u2019s why we encourage you to pursue the CCISO after you finish the CISSP. After all, CCISO was created by an Advisory Board full of CISSPs who recognized the need for an executive-level training program to follow CISSP!<\/p><p style=\"text-align: justify;\">We cannot afford to just teach managerial skills to leaders who are responsible for protecting the valuable information of organizations or to just deep dive on technical skills without hands-on War Games that test a CISO\u2019s ability to respond swiftly and effectively to cyber-attacks! Our program goes way beyond basic management and <a href=\"https:\/\/ciso.eccouncil.org\/cciso-assessment\/\" target=\"_blank\" rel=\"noopener\">tech skills<\/a> to teach a <a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\">CISO<\/a> about determining which projects to fund and which to push off to future years, what technology to replace, what roles to outsource, what training to send their staff to, etc.<\/p><p style=\"text-align: justify;\">Our goal is for you get the best leadership jobs in the market. Why? Because we cannot afford to rest on our past laurels and leave you to fend for yourself.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e3542f elementor-widget elementor-widget-heading\" data-id=\"1e3542f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The CCISO or the CISSP?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98c5617 elementor-widget elementor-widget-text-editor\" data-id=\"98c5617\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Many people think they need to decide between pursuing the CCISO or the CISSP but this is really a false dichotomy. The programs are suited for people at different stages of their careers. The CISSP covers middle management skills, while the CCISO teaches executive cybersecurity leadership skills. This is why you should consider taking a CCISO after your CISSP certification.<\/p>\n<p>Moreover, a major difference between these two programs is the hands-on element that CCISO has incorporated into the training program, called War Games. War Games test a CISO\u2019s ability to <a href=\"\/cybersecurity-exchange\/career-and-leadership\/effective-cybersecurity-risk-management-checklist\/\" target=\"_blank\" rel=\"noopener\">handle a cyberattack effectively<\/a> and help to develop essential muscle memory to address crises. CISOs need to think and act fast to develop a commensurate response to breaches and other cyber incidents. War games in the cyber world were inspired by national defense approaches and tactics. They are used by executives all the time to test the readiness of their staff and programs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40e8838 elementor-widget elementor-widget-image\" data-id=\"40e8838\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/cciso-or-cisso.png.webp\" class=\"attachment-large size-large wp-image-81712\" alt=\"\" srcset=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/cciso-or-cisso.png.webp 400w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/cciso-or-cisso.png-300x300.webp 300w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/cciso-or-cisso.png-150x150.webp 150w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a3b67c elementor-widget elementor-widget-text-editor\" data-id=\"3a3b67c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The exercises in the CCISO class prepare students for handling real-world scenarios as well as allow them to apply what they just learned while still in class in order to cement the new concepts. The exercises take place toward the end of the class week as they build on the material in the class and <a href=\"https:\/\/ciso.eccouncil.org\/\" target=\"_blank\" rel=\"noopener\">CCISO Body of Knowledge<\/a>. The class is split up into teams and during the games, each team must create an incident response plan based on the scenario chosen by the instructor. The response plans are evaluated by the instructor based on the communications approach, decision making effectiveness, cyberattack containment, data breach stakeholder notification, as well as other criteria. The class also responds to each plan presented, and they are encouraged to point out deficiencies and areas for improvement.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49e4346 elementor-widget elementor-widget-heading\" data-id=\"49e4346\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CISSP for Cybersecurity Managers<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6c43f4 elementor-widget elementor-widget-text-editor\" data-id=\"d6c43f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhile the CISSP helps create a strong foundation for successful managers and even allows you to specialize in areas important to your current job or future goals. Depending on how you\u2019d like to further your career, you can choose one of the three courses of CISSP concentration, which are engineering, architecture, and management. This choice will largely depend on your job description and career goals. There are lots of cybersecurity management certifications to further specialize your training, including the <a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-soc-analyst-csa\/\" target=\"_blank\" rel=\"noopener\">CSA certification<\/a> for cloud security, or Lead Auditor, ISO 27001, or ISACA CISA, among others for auditing.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3875d94 elementor-widget elementor-widget-heading\" data-id=\"3875d94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What\u2019s Better, CISM or CISSP?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f31a363 elementor-widget elementor-widget-text-editor\" data-id=\"f31a363\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The CISM Certification concentrates on management and approach and only slightly touches on technical subjects. The CISSP certification by contrast is both technical and managerial and digs deeper into both of these areas. Created by (ISC)2, the CISSP certification has been the leading training program for and validation of IT security management skills since its inception in 1994. In the late 1980s to early 1990s, CISSP created baselines for managing an <a href=\"https:\/\/ciso.eccouncil.org\/\" target=\"_blank\" rel=\"noopener\">information security program<\/a> at a time when the highest-ranking person responsible for security was the organization\u2019s security manager.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f6ac92 elementor-widget elementor-widget-heading\" data-id=\"5f6ac92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Is CISSP a Good Cert?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65105b9 elementor-widget elementor-widget-text-editor\" data-id=\"65105b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: justify;\">Knowledge of the CISSP domains helps create a solid foundation for your cybersecurity leadership journey. For business-oriented security professionals, it is best to first go for a CISSP, before considering other leading certifications such as <a href=\"https:\/\/ciso.eccouncil.org\/cciso-certification\/\" target=\"_blank\" rel=\"noopener\">Certified Chief Information security officer (CCISO)<\/a>, Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Risk and Information Systems Control Certification (RISCC), or CompTIA Advanced Security Practitioner (CASP).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2956122 elementor-widget elementor-widget-heading\" data-id=\"2956122\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Long is CISSP Valid?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94cde5b elementor-widget elementor-widget-text-editor\" data-id=\"94cde5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tYour CISSP certification is valid for a period of three years. CISSP holders revalidate their (ISC)2 certification by presenting CPE credits and paying the yearly membership fee.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-665d1db elementor-widget elementor-widget-heading\" data-id=\"665d1db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why take the CCISO after CISSP?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-199809d elementor-widget elementor-widget-text-editor\" data-id=\"199809d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Executives need to understand how to manage the budget of their programs in a strategic way because no one ever has enough money to fund all the projects they need or want. How a CISO goes about determining which projects to fund and which to push off to future years, what technology to replace, what roles to outsource, what training to send their staff to, etc. are some of the most important parts of a CISO\u2019s job. CISSP did not serve this need. That\u2019s why, back in 2011, EC-Council launched the <a href=\"https:\/\/ciso.eccouncil.org\/cciso-certification\/\" target=\"_blank\" rel=\"noopener\">CCISO program<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a958f7a elementor-widget elementor-widget-text-editor\" data-id=\"a958f7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: justify;\">EC-Council, known for its <a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\" target=\"_blank\" rel=\"noopener\">Certified Ethical Hacker (CEH) program<\/a>, launched CCISO with the intent of helping their members bridge the gap between middle management and executive management. Many EC-Council members, like most security professionals, had gone on from technical programs to earn the CISSP but felt they needed something to help them get to the next step in their careers. That is how CCISO began \u2013 as a way to support an underserved sector of the market: executive cybersecurity management.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3f1202 elementor-widget elementor-widget-heading\" data-id=\"a3f1202\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">By CISOs, for CISOs, after CISSP<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8555911 elementor-widget elementor-widget-text-editor\" data-id=\"8555911\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The CCISO was built by groups of CISOs invited to form the advisory board, exam writing committee, and to write different sections of the CCISO BOK. These CISO advisors were interested in creating something that went beyond the CISSP to teach the skills truly needed to be an executive leader in information security. They debated and discussed via a long process and eventually determined there should be five domains to the program:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-be11473 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"be11473\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-be122d0\" data-id=\"be122d0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8db7291 content-align-left icon-box-vertical-align-top icon-vertical-align-start elementor-widget elementor-widget-the7_image_box_widget\" data-id=\"8db7291\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7_image_box_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"the7-box-wrapper the7-elementor-widget the7_image_box_widget-8db7291\">\t\t\t<div class=\"box-content-wrapper\">\n\t\t\t\t\n\t\t\t\t<div class=\"box-content\">\n\t\t\t\t\t<h4 class=\"box-heading\"><a >1. Governance and Risk Management<br><br><\/a><\/h4>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-856ea56\" data-id=\"856ea56\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ee2fa9c content-align-left icon-box-vertical-align-top icon-vertical-align-start elementor-widget elementor-widget-the7_image_box_widget\" data-id=\"ee2fa9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7_image_box_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"the7-box-wrapper the7-elementor-widget the7_image_box_widget-ee2fa9c\">\t\t\t<div class=\"box-content-wrapper\">\n\t\t\t\t\n\t\t\t\t<div class=\"box-content\">\n\t\t\t\t\t<h4 class=\"box-heading\"><a >2. Information Security Controls, Compliance, and Audit Management<\/a><\/h4>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-ba3fdba\" data-id=\"ba3fdba\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b22f23 content-align-left icon-box-vertical-align-top icon-vertical-align-start elementor-widget elementor-widget-the7_image_box_widget\" data-id=\"4b22f23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7_image_box_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"the7-box-wrapper the7-elementor-widget the7_image_box_widget-4b22f23\">\t\t\t<div class=\"box-content-wrapper\">\n\t\t\t\t\n\t\t\t\t<div class=\"box-content\">\n\t\t\t\t\t<h4 class=\"box-heading\"><a >3. Security Program Management &amp; Operations<\/a><\/h4>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3ab1879 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3ab1879\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-09031af\" data-id=\"09031af\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e935c9b content-align-left icon-box-vertical-align-top icon-vertical-align-start elementor-widget elementor-widget-the7_image_box_widget\" data-id=\"e935c9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7_image_box_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"the7-box-wrapper the7-elementor-widget the7_image_box_widget-e935c9b\">\t\t\t<div class=\"box-content-wrapper\">\n\t\t\t\t\n\t\t\t\t<div class=\"box-content\">\n\t\t\t\t\t<h4 class=\"box-heading\"><a >4. Information Security Core Competencies<br><br><\/a><\/h4>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-2410598\" data-id=\"2410598\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2bbeb41 content-align-left icon-box-vertical-align-top icon-vertical-align-start elementor-widget elementor-widget-the7_image_box_widget\" data-id=\"2bbeb41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7_image_box_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"the7-box-wrapper the7-elementor-widget the7_image_box_widget-2bbeb41\">\t\t\t<div class=\"box-content-wrapper\">\n\t\t\t\t\n\t\t\t\t<div class=\"box-content\">\n\t\t\t\t\t<h4 class=\"box-heading\"><a >5. Strategic Planning, Finance, Procurement, and Vendor Management<\/a><\/h4>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-aafee86\" data-id=\"aafee86\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d59537 elementor-widget elementor-widget-text-editor\" data-id=\"3d59537\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"\" style=\"margin-top: 0px;margin-bottom: 0px;\">\n\n<a href=\"\/cybersecurity\/cciso-vs-cissp\/\" target=\"_blank\" rel=\"noopener\">The CCISO was positioned from the beginning as the next step after CISSP<\/a>. Almost all the founding members of the CCISO advisory board held their CISSP credential and none had any interest in reinventing what CISSP had already accomplished. The domains were selected to complement and build upon the CISSP program to help create executives from middle managers.<p><\/p>\n<p>Comparing the domains, we see that while the first domains of each program line up more or less, <a href=\"https:\/\/ciso.eccouncil.org\/cciso-certification\/cciso-domain-details\/\" target=\"_blank\" rel=\"noopener\">domain 5 of the CCISO program<\/a> is not part of the CISSP program at all. While some of the same concepts are covered in each program, the CCISO program covers them from the perspective of executive management, so while it is interesting to compare the subject matter, it\u2019s important to remember that the CCISO covering these topics differently from CISSP.<\/p>\n<p>The following is an illustration of how several CISSP domains constitute a part of the CCISO program.<br>\n<\/p><div class=\"su-spacer\" style=\"height:20px\"><\/div>\n<div class=\"su-table su-table-alternate\">\n<table style=\"text-align: left\" width=\"100%\">\n<tbody>\n<tr>\n<td><strong>CISSP Domain<\/strong><\/td>\n<td><strong>CCISO Domain<\/strong><\/td>\n<\/tr>\n<tr>\n<td>1. Security and Risk Management<\/td>\n<td>Governance and Risk Management<\/td>\n<\/tr>\n<tr>\n<td>2. Asset Security<\/td>\n<td>Governance and Risk Management<\/td>\n<\/tr>\n<tr>\n<td>3. Security Architecture and Engineering<\/td>\n<td>Security Program Management &amp; Operations<\/td>\n<\/tr>\n<tr>\n<td>4. Communications and Network Security<\/td>\n<td>Information Security Core Competencies<\/td>\n<\/tr>\n<tr>\n<td>5. Identity and Access Management<\/td>\n<td>Information Security Core Competencies<\/td>\n<\/tr>\n<tr>\n<td>6. Security Assessment and Testing<\/td>\n<td>Governance and Risk Management<\/td>\n<\/tr>\n<tr>\n<td>7. Security Operations<\/td>\n<td>Security Program Management &amp; Operations<\/td>\n<\/tr>\n<tr>\n<td>8. Software Development Security<\/td>\n<td>Information Security Core Competencies<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"su-spacer\" style=\"height:30px\"><\/div>\n\n\t\t<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4cf54c elementor-widget elementor-widget-heading\" data-id=\"f4cf54c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Packed with more, much more<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff36b06 elementor-widget elementor-widget-text-editor\" data-id=\"ff36b06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In its 2020 version, the live CCISO training program comes with two other training programs: Risk Management Approach and Practice and Certified Project Manager in order to give students deep dives into risk and project management. The Program also includes an annual standing invitation to the <a href=\"https:\/\/ciso.eccouncil.org\/ciso-events\/ciso-awards\/\" target=\"_blank\" rel=\"noopener\">Global CISO Forum<\/a>, EC-Council\u2019s executive conference, to help CISOs boost their networks; a free <a href=\"https:\/\/ciso.eccouncil.org\/phishing-solutions\/\" target=\"_blank\" rel=\"noopener\">OhPhish<\/a> license that enables CCISO to run a phishing simulation to test their company\u2019s user awareness; and a 100-user license of <a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-secure-computer-user-cscu\/\">EC-Council\u2019s Certified Secure Computer User<\/a> class to train end-users. CCISOs can tailor their OhPhish campaign to match their industry, company, and more to find out where the weak links are. EC-Council\u2019s philosophy is they need to both <a href=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/career-and-leadership\/how-to-become-ciso\/\">train the CISOs as well as give them the resources to create the best security programs<\/a> possible.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>EC-Council supports your continued leadership journey and that\u2019s why we encourage you to pursue the CCISO after you finish the CISSP. After all, CCISO was created by an Advisory Board full of CISSPs who recognized the need for an executive-level training program to follow CISSP! We cannot afford to just teach managerial skills to leaders&hellip;<\/p>\n","protected":false},"author":32,"featured_media":81709,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[3444],"tags":[],"class_list":{"0":"post-81708","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-executive-management"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What\u2019s Next After CISSP? Top Career Paths &amp; Certifications<\/title>\n<meta name=\"description\" content=\"Discover what to do after CISSP certification. Explore advanced cybersecurity certifications and leadership roles to elevate your infosec career.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/what-next-after-cissp\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What\u2019s Next After CISSP? Top Career Paths &amp; Certifications\" \/>\n<meta property=\"og:description\" content=\"Discover what to do after CISSP certification. Explore advanced cybersecurity certifications and leadership roles to elevate your infosec career.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/what-next-after-cissp\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-11T02:49:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-16T05:21:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-next-after-cissp-feature1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What\u2019s Next After CISSP? Top Career Paths &amp; Certifications\" \/>\n<meta name=\"twitter:description\" content=\"Discover what to do after CISSP certification. Explore advanced cybersecurity certifications and leadership roles to elevate your infosec career.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-next-after-cissp-feature1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/what-next-after-cissp\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/what-next-after-cissp\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"What Next After CISSP\",\"datePublished\":\"2024-03-11T02:49:40+00:00\",\"dateModified\":\"2026-01-16T05:21:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/what-next-after-cissp\\\/\"},\"wordCount\":1403,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/what-next-after-cissp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/what-next-after-cissp-blog1.jpg\",\"articleSection\":[\"Executive Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/what-next-after-cissp\\\/\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/what-next-after-cissp\\\/\",\"name\":\"What\u2019s Next After CISSP? Top Career Paths & Certifications\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/what-next-after-cissp\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/what-next-after-cissp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/what-next-after-cissp-blog1.jpg\",\"datePublished\":\"2024-03-11T02:49:40+00:00\",\"dateModified\":\"2026-01-16T05:21:53+00:00\",\"description\":\"Discover what to do after CISSP certification. Explore advanced cybersecurity certifications and leadership roles to elevate your infosec career.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/what-next-after-cissp\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/what-next-after-cissp\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/what-next-after-cissp\\\/#primaryimage\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/what-next-after-cissp-blog1.jpg\",\"contentUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/what-next-after-cissp-blog1.jpg\",\"width\":1024,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/what-next-after-cissp\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Executive Management\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/executive-management\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"What Next After CISSP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What\u2019s Next After CISSP? Top Career Paths & Certifications","description":"Discover what to do after CISSP certification. Explore advanced cybersecurity certifications and leadership roles to elevate your infosec career.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/what-next-after-cissp\/","og_locale":"en_US","og_type":"article","og_title":"What\u2019s Next After CISSP? Top Career Paths & Certifications","og_description":"Discover what to do after CISSP certification. Explore advanced cybersecurity certifications and leadership roles to elevate your infosec career.","og_url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/what-next-after-cissp\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-03-11T02:49:40+00:00","article_modified_time":"2026-01-16T05:21:53+00:00","og_image":[{"width":521,"height":521,"url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-next-after-cissp-feature1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_title":"What\u2019s Next After CISSP? Top Career Paths & Certifications","twitter_description":"Discover what to do after CISSP certification. Explore advanced cybersecurity certifications and leadership roles to elevate your infosec career.","twitter_image":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-next-after-cissp-feature1.jpg","twitter_misc":{"Written by":"EC-Council","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/what-next-after-cissp\/#article","isPartOf":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/what-next-after-cissp\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"What Next After CISSP","datePublished":"2024-03-11T02:49:40+00:00","dateModified":"2026-01-16T05:21:53+00:00","mainEntityOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/what-next-after-cissp\/"},"wordCount":1403,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/what-next-after-cissp\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-next-after-cissp-blog1.jpg","articleSection":["Executive Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/what-next-after-cissp\/","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/what-next-after-cissp\/","name":"What\u2019s Next After CISSP? Top Career Paths & Certifications","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/what-next-after-cissp\/#primaryimage"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/what-next-after-cissp\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-next-after-cissp-blog1.jpg","datePublished":"2024-03-11T02:49:40+00:00","dateModified":"2026-01-16T05:21:53+00:00","description":"Discover what to do after CISSP certification. Explore advanced cybersecurity certifications and leadership roles to elevate your infosec career.","breadcrumb":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/what-next-after-cissp\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/what-next-after-cissp\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/what-next-after-cissp\/#primaryimage","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-next-after-cissp-blog1.jpg","contentUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-next-after-cissp-blog1.jpg","width":1024,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/executive-management\/what-next-after-cissp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/test1.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Executive Management","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/category\/executive-management\/"},{"@type":"ListItem","position":4,"name":"What Next After CISSP"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81708"}],"version-history":[{"count":0,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81708\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81709"}],"wp:attachment":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}