CISO-Verification Form
CISO-Verification Form
Monitor and document the information systems control performance in meeting organizational
objectives by identifying and measuring metrics and key performance indicators (KPIs), and share
with relevant stakeholders to support executive decision-making.
Execute the audit process in accordance with established standards and interpret results against
de�ined criteria to ensure that the information systems are protected, controlled and effective in
supporting organization's objectives.
Assign clear information security personnel job functions and provide continuous training to ensure
effective performance and accountability.
Identify stakeholders, manage stakeholders’ expectations and communicate effectively to report
progress and performance.
1
Verification Form
Certified Chief Information Security Officer (C|CISO) EC-Council
Design a systematic and structured risk assessment process and establish, in coordination with
stakeholders, an information security risk management program based on standards and procedures
and ensure alignment with organizational goals and objectives.
Identify changes to risk management policies and processes and ensure the risk management
program remains current with the emerging risk and threat environment and in alignment with the
organizational goals and objectives.
Define the scope of the enterprise continuity of operations program to address business continuity,
business recovery, contingency planning, and disaster recovery/related activities.
Develop a plan to identify a potential security violation and take appropriate action to report the
incident.
Design, develop and maintain enterprise information security architecture (EISA) by aligning
business processes, software and hardware, local and wide area networks, people, operations, and
projects with the organization’s overall security strategy.
Define a forward-looking, visionary and innovative strategic plan for the role of the information
security program with clear goals, objectives and targets that support the operational needs of the
organization.
Analyze, forecast and develop the operational budget of the information security department.
Monitor and oversee cost management of information security projects, return on investment (ROI)
of key purchases related to security infrastructure and security and ensure alignment with the
strategic plan.
2
Verification Form
Certified Chief Information Security Officer (C|CISO) EC-Council
TO BE COMPLETED BY THE VERIFIER
Please Print
Name
Title Company
Address
Email Telephone
How long have you known the candidate and in what capacity?
Would you recommend the candidate for EC-Council's Certified Chief Information Security Officer
(C|CISO) certification program?
Yes, without reservation Yes, with some reservation Not at this time
If you checked "With some reservation" or "Not at this time" please address this in your statement.
In a brief statement, please decree the major strengths and weaknesses of the applicant as a Certified
Chief Information Security Officer and attach it to this form.
Verifier's Signature