INFORMATION SECURITY TRACK
Become a certified CISO with the SECO CISO Certification track
Information Security is where it all started for SECO. It’s our flagship curriculum that laid the foundation for where we are today. Our complete information security training programme, spearheaded by experienced CISOs and leadership educators, brings you from zero to CISO. The programme includes trainings for all levels, from information security basics to the highest levels of security management and leadership.
Lies Alderlieste-de Wit
Author & Trainer
Global Director Cybersecurity Governance at Danone
Author & Trainer
Security Transition Manager,
Agile & Security Leadership
Cyber Security Leader
at PwC Luxembourg
Senior Risk Manager,
Interim CISO &
Founder at Pro CISO®
Information Security Courses
Information Security Foundation
Anyone looking for a fundamental understanding of information security and information security management. Entry-level information security professionals.
Understand and apply fundamental information security principles and best practices.
Get a comprehensive introduction to information security and information security management.
Understand the basics of ISO 27001 and ISO 27002, the most widely used international information security standards.
Learn to chart potential information security threats. Explore physical, technical and organisational control measures to protect information.
Learn the basics of information security risk management and risk assessment.
Understand information security roles and responsibilities within and outside of the internal information security organisation.
Understand legal and regulatory requirements relevant to information security.
Information Security Practitioner
Aspiring information security professionals looking to advance their career to an Information Security Officer or a Security Manager role.
Manage information security.
Integrate information security into strategic management and organisational culture. Ensure compliance with laws, regulations and standards.
Adopt a risk-based approach to information security. Balance interests and threats. Apply resilience management principles. Contribute to effective information security governance. Plan and perform information security risk assessments. Develop an implementation plan for the ISO/IEC 27001 standard.
Understand and improve information security policies. Compose a project team and draft implementation plans for information security projects in line with best-practice project management principles.
Identify and assess information security risks posed by human behaviour. Develop an effective information security awareness action plan based on behavioural, learning and change management theories.
Understand how to coordinate and oversee Identity & Access Management and Incident Response activities.
Review an information security audit report and create an actionable improvement plan.
Expert (CISO certification)
Experienced information security professionals aspiring to lead security in a CISO role or similar. Ideal for information security managers, information security officers and senior security consultants.
Lead information security.
Align IT, business and security. Shift from a technology and risk-based approach to business-aligned security governance and leadership. Understand organisational security structures and their impact on the CISO’s role and mandate.
Align cyber security with business strategy and drive cyber security improvement. Build strong alliances with compliance and assurance departments to enable a sustainable security culture.
Position the CISO as a trusted strategic advisor. Build a strong information security team and organisation with appropriate funding and executive support.
Establish a good relationship with internal and external stakeholders. Lead cyber security instead of being led. Use effective communication strategies to engender maximum support and participation. Position yourself as a business enabler, not as a business inhibitor.
Translate strategic information security goals to an information security plan with realistic targets and goals. Plan resources and budgets. Build a strong business case for information security.
Manage information security in operations, programs, projects and supply chains across different geographical locations and business units. Report to the board and external stakeholders.