top of page
RSSI externalisé Grenoble

CISO COACHING

The CISO expert

A Chief Information Security Officer (CISO) has a role of advice, assistance, information, training and alert. He or she defines and develops the company's security strategy (preferably through an ISSP), and ensures its follow-up and proper implementation. 

 

The CISO also keeps a technological watch by monitoring major developments in the sector that could impact on the risks to information systems.

Train an in-house CISO

Regardless of the company’s line of business, having a CISO is now essential, and this role can no longer be entrusted to just any employee: the CISO plays a central role in the security of the information systems of the company they work for.

However, you may not currently have someone with this profile on your team, nor the resources to hire such a person right away. You may also not wish to outsource this function.

For these reasons, we have developed an in-house CISO training program: Saghar Estehghari, founder of CyberSecura and cybersecurity expert, will mentor the employee you designate and train them for their new CISO responsibilities.

Why choose CyberSecura to train an in-house CISO?

To make cybersecurity a strategic asset for competitiveness, compliance, and business continuity.

To fully embrace the role of CISO through role-playing exercises and practical case studies.

To identify, assess, and prioritize risks, and to better protect the organization against threats.

To develop and implement a security strategy: governance, reporting to senior management, and concrete action plans.

To respond effectively to crises and incidents by coordinating teams and stakeholders.

THE PROGRAM

First half-day: Cybersecurity fundamentals and risk management

Objectives

Understanding the basics of cybersecurity

Master the essential technical principles

Learn about risk management

1- Cybersecurity overview

1.1- Cybersecurity: a strategic imperative for the sustainability and competitiveness of organizations (business continuity, reputation, compliance).

1.2- The three dimensions of cybersecurity: organizational, managerial, and technical/technological.

1.3- Key standards and regulations to be aware of (ISO 27001, GDPR, NIS2, etc.).

2. Essential technical foundations for the CISO

2.1- The fundamentals of security: confidentiality, integrity, availability (CIA).

2.2- Essential concepts: traceability, authentication, non-repudiation.

2.3- Key security topics: access control, network security, malware protection, security awareness.

2.4- The ability to explain these concepts in layman’s terms to management and business units.

3- Risk management: the CISO’s core mission

3.1- Terminology: definitions of security risk, vulnerabilities, threats, etc.

3.2- Introduction to risk management methodologies tailored to cybersecurity: EBIOS RM, ISO 27005.

3.3- Identifying threats and understanding types of attackers

3.4- Concepts of probability and impact for assessing risks and prioritizing actions.

4- Practical application

4.1- Simplified risk analysis exercise

4.2- Quiz to Assess Learning

rssi externalisé

Second half-day: The strategic, human, and organizational role of the CISO

Objectives

Assume the strategic role of CISO

Develop the human and organizational aspects

Know how to manage a crisis

1- The CISO as the driving force behind the security strategy

1.1- Who is the CISO? (The role of the CISO)

1.2- Defining a strategy and clear objectives based on the company’s context

1.3- Defining roles and responsibilities

1.4- Effective communication with management: reporting, dashboards, metrics

1.5- Interaction with internal and external stakeholders

1.6- Audits, assessments, monitoring, and continuous improvement

2. Governance and organizational structure

2.1- Development and maintenance of policies, procedures, and guidelines

2.2- Regulatory monitoring and compliance: anticipating changes

3- The human factor: awareness and safety culture

3.1- Foster a safety culture within the company

3.2- Train, educate, and empower employees

4- Crisis management and business recovery

4.1- Organization and management of the crisis response team

4.2- Technical and organizational management during a major incident

5- Practical application

5.1- Case Study and Practical Exercise

5.2- Quiz to Assess Learning 

Third half-day: Putting theory into practice

Objectives

Familiarize yourself with the CISO’s frameworks and tools

Apply the CISO’s role to real-world scenarios

Consolidate your knowledge 

1. Methods for organizing the work of the CISO

1.1- Introduction to the ISO 27001 and NIST frameworks

1.2- Definition of an ISMS

2. Operational tools for the CISO

2.1- Practical implementation for managing security in a structured manner: introduction to the ISMS Toolkit

2.2- Operational management of security through action plans and audit plans

3. Practical case study: role-playing as a CISO

3.1- Risk assessment for a fictitious organization

3.2- Development of a concrete action plan

3.3- Implementation of a tailored ISMS

3.4- Response to a simulated incident under realistic conditions

4- Practical application

4.1- Final quiz and group debrief

4.2- Technical and organizational management during a major incident

Additional sessions included

4 hours of coaching in the form of one-hour sessions

As part of this training program, each participant receives 4 hours of one-on-one coaching with the CISO trainer.

This customized time can be used at your discretion for:

Ask specific questions related to your own context or field assignments.

Work on your own challenges and improve your performance.

Get practical advice on how to excel in your role as a future CISO.

Session to define performance metrics

1- Best practices and skills to master in order to effectively fulfill the role of CISO.

2- Developing a personalized action plan to apply what you’ve learned within your organization.

Are you interested in outsourcing this role and leveraging CyberSecura’s expert CISO services?

Learn more about our part-time outsourced CISO services.

ISO-IEC-27001-Lead-Implementer.png
Saghar Estehghari, consultante experte en cybersécurité.JPG

Our CISO coaching services are carried out by Saghar Estehghari, founder, CTO and expert cybersecurity consultant, certified PECB/IEC ISO 27001 Lead Implementer.

WHAT THEY SAY

Denis Chincholle, RSI Mairie Vif

Denis Chincholle, Head of Information Systems for Vif Town of Hall

"What we really appreciated was the personalised response. CyberSecura clearly understood that, as a local authority, we have specific problems and that the resources had to be adapted [...]. We really had the impression that we were talking as equals, which is very interesting, and we have the feeling that we are understood and heard."

Batiste Roger, Directeur Technique Odonatech

Batiste Roger, Technical Director at Odonatech

"I've found that being able to call on a single service provider for cybersecurity and GDPR compliance has been a real plus. Firstly for confidentiality issues [...], but also because certain aspects displaying significant intersections can then be dealt with together."

bottom of page