CCISO New Blueprint v2
CCISO New Blueprint v2
CCISO
Blueprint v2
01
CCISO Blueprint v1
Domains Sub Domain Description Number of Weightage
Questions
1. Governance, Risk, Governance • Define, implement, manage and maintain 11 21%
Compliance an information security governance
program that includes leadership,
organizational structures, and processes.
• Align information security governance
framework with organizational goals and
governance, i.e., leadership style,
philosophy, values, standards, and policies.
• Establish information security management
structure.
• Establish a framework for information
security governance monitoring
(considering cost/benefits analyses of
controls and ROI).
• Understand standards, procedures,
directives, policies, regulations, and legal
issues that affect the information security
program.
• Understand the enterprise information
security compliance program and manage
the compliance team.
Risk • Create a risk management program policy 11
Management and charter
• Create a risk assessment methodology and
framework
• Create and manage risk register
• Create risk assessment schedule and check
lists
• Create risk reporting metrics and processes
Compliance • Analyze and understand common external 10
laws, regulations, standards, best practices
applicable to the organization, and
organizational ethics.
• Be familiar with international security and
risk standards such as ISO 27000 and 31000
series
• Implement and manage information
security strategies, plans, policies, and
procedures to reduce regulatory risk
• Understand the importance of regulatory
information security organizations and
appropriate industry groups and
stakeholders
1|Page Certified Chief Information Security Officer (CCISO) Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
• Understand information security changes,
trends, and best practices
• Understand and manage enterprise
compliance program controls, information
security compliance process and
procedures, compliance auditing, and
certification programs
• Understand the information security
compliance process and procedures
• Compile, analyze, and report compliance
programs
• Understand the compliance auditing and
cortication programs
• Follow organizational ethics
2. Information Information • Identify the organization’s operational 16 20%
Security Controls and Security process and objectives
Audit Management Management • Design information systems controls in
Controls alignment with the operational needs and
goals and conduct testing prior to
implementation to ensure effectiveness
• Identify and select the resources required
to effectively implement and maintain
information systems controls. Such
resources can include human capital,
information, infrastructure, and
architecture (e.g., platforms, operating
systems, networks, databases, applications)
• Design and implement information systems
controls to mitigate risk. Monitor and
document the information systems control
performance in meeting organizational
objectives by identifying and measuring
metrics and key performance indicators
• Design and conduct testing of information
security controls to ensure effectiveness,
discover deficiencies, and ensure alignment
with the organization’s risk management
program
• Design and implement processes to
appropriately remediate deficiencies and
evaluate problem management practices to
ensure that errors are recorded, analyzed,
and resolved in a timely manner