Certified Cyber (Governance Risk and Compliance) Professional - CC(GRC)P, distance learning and online certification program
Cybersecurity has become a major priority for companies and organizations around the world. There are millions of cybersecurity positions open and unfilled, and a shortage of cyber security talent.
Companies and organizations need cybersecurity professionals equipped with the knowledge, skills, and abilities to stay ahead of, and to cope with, evolving threats and vulnerabilities.
Cybersecurity risk management comprises the full range of activities undertaken to protect IT and data from unauthorized access and other cyber threats, to maintain awareness of cyber threats, to detect anomalies and incidents adversely affecting IT and data, and to mitigate the impact of, respond to, and recover from incidents.
Effective risk management involves more than just protecting IT and data currently in place. It also requires planning so that maintenance, improvements, and modernization occur in a coordinated way and with appropriate regularity.
The CC(GRC)P program has been designed to provide with the knowledge and skills needed to understand and support firms and organizations in cyber risk and compliance management. The course provides with the skills needed to pass the Certified Cyber (Governance Risk and Compliance) Professional - CC(GRC)P exam.
Target AudienceThe CC(GRC)P certification program is beneficial to:
- Managers and employees working at the strategic, tactical, and operational levels of information security, IT and risk management.
- Information security managers, employees, auditors, and consultants.
- Threat analysts.
- Vulnerability assessment managers, employees, auditors, and consultants.
- Risk and compliance managers, employees, auditors, and consultants.
- IT managers, employees, auditors, and consultants.
- Network, systems and security administrators.
- Senior managers involved in risk and compliance management.
- Data protection and privacy managers, employees, auditors and consultants.
- IT, information security, risk and compliance management vendors, suppliers, and service providers.
Part 1: Introduction
- Demand for Cyber Risk / Information Security Professionals … and compensation.
- Introduction to Cyber (Governance, Risk, Compliance).
- From Cyberspace to Information Operations (IO) to Cyber Espionage.
- Cyber risks today, and what is different for organizations and employees.
Part 2: Attacks and Modus Operandi
- Who is the attacker?
- Eleven types of internet security attacks.
- 1. Attacks on the critical infrastructure.
- 2. Attacks on the internet infrastructure.
- 3. Deliberate persistent attacks on specific resources.
- 4. Widespread automated attacks against internet sites.
- 5. Threats, harassment, and other criminal offences involving individual user accounts.
- 6. New types of attacks or new vulnerabilities.
- 7. Botnets.
- 8. Denial of Service (DoS) and Distributed Denial of Service (DDoS).
- 9. Forgery and misrepresentation.
- 10. Compromise of single desktop systems.
- 11. Copyright violations.
Step 1 - Collecting information about persons and systems
- Reconnaissance: The research phase used to identify and select targets.
- Looking for information about the systems.
- Looking for information about the persons working in the target organization (or for the target organization).
- Outsourcing and budget cuts can have hidden costs.
- Who has signed a confidentiality agreement? A good list of prime targets for all adversaries.
- Looking at our daily activities from the adversaries' point of view.
- More prime targets: Disgruntled employees, ideologists, employees having a lavish lifestyle, employees having “weaknesses”, lawyers having access to trade secrets and sensitive information.
Step 2 - Identifying possible targets and victims
- Hardware attacks, software attacks.
- Malicious hardware modifications: Acquiring hardware components with a backdoor, and how it affects all other information security policies.
- Phishing, social phishing, spear phishing, watering hole attacks.
- Which systems and which persons? The hit list.
Step 3 - Evaluation, recruitment and testing
- Exploiting more vulnerabilities in certain systems.
- Deciding to work more with certain persons.
- Blackmailing employees: The art and the science.
- Testing the asset.
- The problem with the sleeper agents.
Step 4 - Privilege escalation
- A. Vertical privilege escalation, where adversaries grant themselves higher privileges.
- B. Horizontal privilege escalation, where adversaries use the identity of other users with similar privileges.
- Obtaining customer account details.
- Internal information, social engineering.
Step 5 - Identification of important clients and stakeholders
- Attackers have access to personal information. What is next?
- Identifying important clients and stakeholders working in the public and the private sector.
- Repeating the process - Steps 1 to 4.
Step 6 - Critical infrastructure
- Creating backdoors.
- Covering their tracks.
- Ticking time bombs and backdoor triggers based on specific input data.
- Selling information in the secondary markets (to other attackers, competitors, spies and the organized crime).
- The deep web.
- The dark web.
- Examples and case studies.
Part 3: Information Warfare, Cyber Espionage
- The famous paradoxical trinity of Clausewitz.
- Cyberspace – a domain of war.
- Jus ad bellum, jus in bello, jus post bellum.
- Article 2(4) and Article 51, United Nations (UN) Charter.
- Interpretations of Article 2(4) and Article 51.
- From the International Strategy for Cyberspace, to the G7 Finance Ministers and Central Bank Governors, to the Law of War Manual, Cyber Operations.
- Information Operations (IO).
- 1. Electronic warfare (EW).
- 2. Computer network operations (CNO).
- 3. Psychological operations (PSYOP).
- 4. Military deception (MILDEC), and
- 5. Operations security (OPSEC).
- Information Operations and their supporting capabilities.
- 1. Information Assurance.
- 2. Physical Security.
- 3. Physical Attack.
- 4. Counter Intelligence.
- 5. Combat Camera.
- Defensive Information Operations.
- Net-centric warfare.
- Cyberspace and national security.
- Hackers, Spies, or Hybrid Warfare?
- The Gerasimov’s Doctrine.
- Case Studies.
- Espionage, Intelligence.
- Political, Economic, Military Intelligence.
- Competitive Intelligence vs. Economic or Industrial Espionage.
- From UK, MI5.
- From UK SIS, MI6.
- From UK, Centre for the Protection of National Infrastructure (CPNI).
- Counterintelligence (CI).
- Cyber Espionage.
- Case studies.
- Strategic counterintelligence.
- The Ten Commandments of Counterintelligence (from James M. Olson that served in the Directorate of Operations of the CIA) that apply in Cybersecurity.
- Gentlemen don’t read each other’s mail?
Part 4: Defense
- Cyber Hygiene.
- The U.S. National Institute of Standards and Technology Cybersecurity Framework (NIST CSF).
- 1. The Framework Core.
- 2. The Framework Implementation Tiers.
- 3. The Framework Profile.
- The Functions:
- a. Identify.
- b. Protect.
- c. Detect.
- d. Respond.
- e. Recover.
- From ID.AM-1: Physical devices and systems within the organization are inventoried, to ID.AM-6: Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established.
- From ID.BE-1: The organization’s role in the supply chain is identified and communicated, to ID.BE-5: Resilience requirements to support delivery of critical services are established.
- From ID.GV-1: Organizational information security policy is established, to ID.GV-4: Governance and risk management processes address cybersecurity risks.
- From ID.RA-1: Asset vulnerabilities are identified and documented, to ID.RA-6: Risk responses are identified and prioritized.
- From ID.RM-1: Risk management processes are established, managed, and agreed to by organizational stakeholders, to ID.RM-3: The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis.
- From PR.AC-1: Identities and credentials are managed for authorized devices and users, to PR.AC-5: Network integrity is protected, incorporating network segregation where appropriate.
- From PR.AT-1: All users are informed and trained, to PR.AT-5: Physical and information security personnel understand roles & responsibilities.
- From PR.DS-1: Data-at-rest is protected, to PR.DS-7: The development and testing environment(s) are separate from the production environment.
- From PR.IP-1: A baseline configuration of information technology/industrial control systems is created and maintained, to PR.IP-12: A vulnerability management plan is developed and implemented.
- From PR.MA-1: Maintenance and repair of organizational assets is performed and logged in a timely manner, with approved and controlled tools, to PR.MA-2: Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access.
- From PR.PT-1: Audit/log records are determined, documented, implemented, and reviewed in accordance with policy, to PR.PT-4: Communications and control networks are protected.
- From DE.AE-1: A baseline of network operations and expected data flows for users and systems is established and managed, to DE.AE-5: Incident alert thresholds are established.
- From DE.CM-1: The network is monitored to detect potential cybersecurity events, to DE.CM-8: Vulnerability scans are performed.
- From DE.DP-1: Roles and responsibilities for detection are well defined to ensure accountability, to DE.DP-5: Detection processes are continuously improved.
- RS.RP-1: Response plan is executed during or after an event.
- From RS.CO-1: Personnel know their roles and order of operations when a response is needed, to RS.CO-5: Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness.
- From RS.AN-1: Notifications from detection systems are investigated, to RS.AN-4: Incidents are categorized consistent with response plans.
- From RS.MI-1: Incidents are contained, to RS.MI-3: Newly identified vulnerabilities are mitigated or documented as accepted risks.
- From RS.IM-1: Response plans incorporate lessons learned, to RS.IM-2: Response strategies are updated.
- RC.RP-1: Recovery plan is executed during or after an event.
- From RC.IM-1: Recovery plans incorporate lessons learned, to RC.IM-2: Recovery strategies are updated.
- From RC.CO-1: Public relations are managed, to RC.CO-3: Recovery activities are communicated to internal stakeholders and executive and management teams.
- The Framework Implementation Tiers (“Tiers”).
- From Partial (Tier 1) to Adaptive (Tier 4).
- The Framework Profile.
- Coordination of Framework Implementation.
- Establishing or Improving a Cybersecurity Program.
- Step 1: Prioritize and Scope.
- Step 2: Orient.
- Step 3: Create a Current Profile.
- Step 4: Conduct a Risk Assessment.
- Step 5: Create a Target Profile.
- Step 6: Determine, Analyze, and Prioritize Gaps.
- Step 7: Implement Action Plan.
- Methodology to Protect Privacy and Civil Liberties.
- Governance of cybersecurity risk.
- Awareness and training measures.
- Penetration Testing.
- Guidance from the Securities and Exchange Commission (SEC), Division of Corporation Finance, regarding disclosure obligations relating to cybersecurity risks and cyber incidents.
- The new international standards for cyber security after Regulation (EU) 2016/679 (General Data Protection Regulation).
Part 5: The future
- The attribution problem.
- The second attribution problem.
- Plausible deniability.
- Misinformation, disinformation, deception, fabrication.
- Disinformation management.
- ENISA, Disinformation operations in cyber-space.
- ENISA, Active Defense and Offensive Countermeasures.
Become a Certified Cyber (Governance Risk and Compliance) Professional - CC(GRC)P
For secure payment we work with PayPal, the faster and safer way to make online payments. With PayPal we minimize the cost of administration and compliance with national and international laws, so we can keep the cost of our programs and services so low.
Only PayPal receives your credit card number and your financial information. We receive your full name, your email, and your mail address. According to the PayPal rules, you have the option to ask for a full refund up to 60 days after the payment. If you do not want one of our programs or services for any reason, all you must do is to send us an email and we will refund the payment, no questions asked.
When you click "Buy Now" below, you will be redirected to the PayPal web site. Your payment will be received by our strategic partner and service provider, Cyber Risk GmbH (Rebackerstrasse 7, 8810 Horgen, Switzerland, Handelsregister des Kantons Zürich, Firmennummer: CHE-244.099.341). Cyber Risk GmbH may also send certificates to all members.
We will send the program up to 24 hours after the payment. Please remember to check the spam folder of your email client too, as emails with attachments or heavier than 100KB are often landed in the spam folder.
The all-inclusive cost is $297. There is no additional cost, now or in the future, for this program.
What is included in the price:
A. The official presentations (1,010 slides)
The presentations are effective and appropriate to study online or offline. Busy professionals have full control over their own learning and are able to study at their own speed. They are able to move faster through areas of the course they feel comfortable with, but slower through those that they need a little more time on.
B. Up to 3 online exam attempts per year
Candidates must pass only one exam to become CC(GRC)Ps. If they fail, they must study the official presentations and retake the exam. Candidates are entitled to 3 exam attempts every year.
If candidates do not achieve a passing score on the exam the first time, they can retake the exam a second time.
If they do not achieve a passing score the second time, they can retake the exam a third time.
If candidates do not achieve a passing score the third time, they must wait at least one year before retaking the exam. There is no additional cost for any additional exam attempts.
To learn more, you may visit:
C. The certificate
Processing and posting via registered mail with tracking number.
Frequently Asked Questions
1. I want to learn more about the International Association of Risk and Compliance Professionals (IARCP).
The IARCP is wholly owned by Compliance LLC, a company incorporated in Wilmington NC and offices in Washington DC, a provider of risk and compliance training in 36 countries.
Several business units of Compliance LLC are very successful associations that offer standard, premium, and lifetime membership, weekly or monthly updates, training, certification, Authorized Certified Trainer (ACT) programs, advocacy, and other services to their members.
2. Does the association offer training?
The IARCP offers distance learning and online certification programs in all countries, and in-house instructor-led training in companies and organizations in many countries.
A. Distance learning and online certification programs.
A1. Certified Risk and Compliance Management Professional (CRCMP). To learn more, you may visit: www.risk-compliance-association.com/Distance_Learning_and_Certification.htm
A2. Certified Information Systems Risk and Compliance Professional (CISRCP). To learn more, you may visit: www.risk-compliance-association.com/CISRCP_Distance_Learning_and_Certification.htm
A3. Certified Risk and Compliance Management Professional in Insurance and Reinsurance CRCMP(Re)I. To learn more, you may visit: www.risk-compliance-association.com/CRCMP_Re_I.htm
A4. Certified Cyber (Governance Risk and Compliance) Professional CC(GRC)P. To learn more, you may visit: www.risk-compliance-association.com/CC_GRC_P_Distance_Learning_and_Certification.htm
B. Instructor-led training.
The association develops and maintains four certification programs, and tailors presentations and training programs for directors, executive managers, risk and compliance managers, internal and external auditors, data owners, process owners, consultants, suppliers, and service providers.
For instructor-led training, you may contact Lyn Spooner.
3. Is there any discount available for the distance learning programs?
Unfortunately, we do not offer any discount for the first program. We want to keep the cost of the programs so low for all members.
You have a $100 discount only after you purchase one of our programs. The discount applies to each additional program of the association.
For example, you can purchase the CRCMP program for $297, and then purchase the CISRCP program for $197 (instead of $297), and/or the CC(GRC)P program for $197 (instead of $297), and/or the CRCMP(Re)I program for $197 (instead of $297).
4. Why do you accept payments via PayPal only, for the distance learning programs?
There are important threats to data security in today's IT landscape. On top of that, new data protection regulations around the world put tough requirements on organisations that store “personally identifiable data”, including credit card information. These two factors could increase the cost of our programs dramatically.
We accept payments via PayPal for the distance learning programs, to minimize the cost of compliance and administration. PayPal keeps and protects your financial information, not us, so we can keep the cost of the program so low.
With PayPal you have some additional benefits. You can keep the program for 59 days to evaluate it, and if you do not like it, you can simply send us an email and ask for a full refund, no questions asked. We will refund your payment in less than 24 hours. PayPal offers this escrow service (an escrow generally refers to money held by a third-party, PayPal, on behalf of the transacting parties). In this way, there is absolutely no risk for you.
If you do not have a PayPal account and you do not want to create one, somebody else with a PayPal account can also pay for you. After the payment, just let us know, and we will update the record.
5. Are your training and certification programs vendor neutral?
Yes. We do not promote any products or services, and we are 100% independent.
6. I want to learn more about the exam.
You will be given 90 minutes to complete a 35-question multiple-choice exam. You must score 70% or higher. We do not send sample questions. If you study the presentations, you can score 100%.
7. How comprehensive are the presentations? Are they just bullet points?
The presentations are not bullet points. They are effective and appropriate to study online or offline.
8. Do I need to buy books to pass the exam?
No. If you study the presentations, you can pass the exam. All the exam questions are clearly answered in the presentations. If you fail the first time, you must study more. Print the presentations and use Post-it to attach notes, to know where to find the answer of a question.
9. Is it an open book exam? Why?
Yes, it is an open book exam. Risk and compliance management is something you must understand and learn, not memorize. You must acquire knowledge and skills, not commit something to memory.
10. Do I have to sit for the exam soon after receiving the presentations?
No. You can sit for the exam from your office or home, any time in the future. Your account never expires and there is no restriction of any kind.
11. Do I have to spend more money in the future to remain certified?
No. Your certificates never expire. They will be valid, without the need to spend money or to sit for another exam in the future.
12. Ok, the certificates never expire, but things change.
Recertification would be a great recurring revenue stream for the association, but it would also be a recurring expense for our members. We resisted the temptation to "introduce multiple recurring revenue streams to keep business flowing", as we were consulted. No recertification is needed for our programs.
Things change, and this is the reason you need to become (at no cost) a member of the association. Every Monday you can visit the "Reading Room" of the association and read our newsletter with updates, alerts and opportunities, to stay current.
13. How many hours do I need to study to pass the exam?
You must study the presentations at least twice, to ensure you have learned the details. The average time needed is 32 hours for the CRCMP program, 26 hours for the CISRCP program, 35 hours for the CC(GRC)P program, and 34 hours for the CRCMP(Re)I program, but there are important differences.
14. Why should I get certified?
Firms and organizations hire and promote "fit and proper" professionals who can provide evidence that they are qualified. Employers need assurance that employees have the knowledge and skills needed to mitigate risks and accept responsibility. Supervisors and auditors ask for independent evidence that the process owners are qualified, and that the controls can operate as designed, because the persons responsible for these controls have the necessary knowledge and experience.
The marketplace is clearly demanding qualified professionals in risk and compliance management. Certified professionals enjoy industry recognition and have more and better job opportunities. It is important to get certified and to belong to professional associations. You prove that you are somebody who cares, learns, and belongs to a global community of professionals.
15. Why should I choose your certification programs?
We strongly believe that we offer very good value for money.
a. The all-inclusive cost of our programs is very low. There is no additional cost for each program, now or in the future, for any reason.
b. If you purchase a second program from the association, you have a $100 discount. The all-inclusive cost for your second (and each additional) program is $197.
c. There are 3 exam attempts per year that are included in the cost of each program, so you do not have to spend money again if you fail.
d. No recertification is required. Your certificates never expire.
e. You become a member of the association, you get certified, and you receive weekly updates, news and alerts.