Professional profiles, responsibilities and competencies in the field of cybersecurity.
π Executive Leadership
CISO (Chief Information Security Officer)
Chief Information Security Officer
VCISO (Virtual Chief Information Security Officer)
Virtual CISO or External Advisor
CTO (Chief Technology Officer)
Chief Technology Officer
π Offensive Security
Ethical Hacking
Ethical Hacking and Security Auditing
Penetration Testing
Penetration Testing and Vulnerability Assessment
Ethical Phishing
Ethical Phishing Simulations
π― Social Engineering
Social Engineering
Psychological manipulation techniques
π Service Management
SLA (Service Level Agreement)
Service Level Agreements
π Related Concepts
- Information Security Governance - Framework for roles
- Policies and Procedures - Documents that define responsibilities
- Risk Assessment - Process led by CISO
- Security Roadmap - Strategic planning
- Budget and Resources - Resource management
- Metrics and KPIs - Performance measurement
- Awareness Programs - Staff education
- Phishing Simulations - Security training
- Audits - Control verification
- Nessus - Vulnerability assessment tool