{"id":10655,"date":"2024-07-02T16:01:42","date_gmt":"2024-07-02T14:01:42","guid":{"rendered":"https:\/\/cyberacademy.altaydagistan.com\/?post_type=mec-events&#038;p=10655"},"modified":"2026-01-16T12:26:08","modified_gmt":"2026-01-16T11:26:08","slug":"pecb-certified-chief-information-security-officer","status":"publish","type":"mec-events","link":"http:\/\/acgcyberacademy.fr\/en\/events\/pecb-certified-chief-information-security-officer\/","title":{"rendered":"PECB CERTIFIED Chief Information Security Officer"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"10655\" class=\"elementor elementor-10655\" data-elementor-post-type=\"mec-events\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c0c232 e-flex e-con-boxed e-con e-child\" data-id=\"6c0c232\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-42f62ef3 e-flex e-con-boxed e-con e-child\" data-id=\"42f62ef3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-29d1e74 e-con-full e-flex e-con e-child\" data-id=\"29d1e74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b7cc85 elementor-widget elementor-widget-image\" data-id=\"8b7cc85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"203\" height=\"248\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/04\/images-removebg-preview-1.png\" class=\"attachment-medium size-medium wp-image-14850\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c96b31 elementor-widget__width-initial elementor-widget elementor-widget-spacer\" data-id=\"2c96b31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f6ff9b elementor-widget elementor-widget-image\" data-id=\"7f6ff9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"500\" height=\"200\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/03\/pecb.png\" class=\"attachment-large size-large wp-image-6392\" alt=\"\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/03\/pecb.png 500w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/03\/pecb-300x120.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9078d38 elementor-widget elementor-widget-spacer\" data-id=\"9078d38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b0eb856 e-flex e-con-boxed e-con e-child\" data-id=\"5b0eb856\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-32887ac4 elementor-widget elementor-widget-text-editor\" data-id=\"32887ac4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"description td td-subTitle text-white opacity-90\">Take the PECB Chief Information Security Officer course to find out more about the role of the CISO.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ad7b056 elementor-widget elementor-widget-heading\" data-id=\"4ad7b056\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The target audience for training<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25da03fa elementor-widget elementor-widget-text-editor\" data-id=\"25da03fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul class=\"list-none\"><li>Professionals actively involved in information security management<\/li><li>IT managers responsible for overseeing information security programmes<\/li><li>Security professionals who aspire to management positions, such as security architects, security analysts and security auditors<\/li><li>Professionals responsible for information security risk management and compliance within organisations<\/li><li>Experienced CISOs wishing to enhance their knowledge, keep abreast of the latest trends and hone their leadership skills<\/li><li>Managers, including CIOs, CEOs and COOs, who play a crucial role in information security decision-making processes<\/li><li>Professionals wishing to move into management positions in the field of information security<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d6e3ac1 e-flex e-con-boxed e-con e-child\" data-id=\"5d6e3ac1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d4b68c9 elementor-widget elementor-widget-heading\" data-id=\"4d4b68c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What you will learn<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57a3c7d5 elementor-widget elementor-widget-text-editor\" data-id=\"57a3c7d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>There is no longer any doubt that organisations need to appoint someone who has the necessary skills to take on information security responsibilities effectively. As a result, the role of CISO has emerged as a senior position, taking on information security responsibilities that were previously carried out by staff within the IT department. Organisations can now rely on a dedicated professional to oversee and manage all aspects of information security, ensuring a more comprehensive and specialised approach to protecting information and information assets.<\/p><p>By completing the PECB CISO course, you will acquire the expertise needed to oversee and manage information security, ensuring the implementation of robust security measures, the identification and mitigation of information security risks, and the development of effective security strategies tailored to the specific needs of the organisation. What's more, by obtaining PECB CISO certification, you will demonstrate your commitment to professional development and your ability to assume responsibilities at a high level. What's more, you'll be able to enhance your career development prospects, positioning yourself as a highly qualified candidate for management positions in the field of information security.<\/p><p>Training<b> PECB Chief Information Security Officer<\/b> (CISO) provides you with valuable information and enables you to develop a comprehensive understanding of the role of a CISO and the steps required to effectively manage information security within an organisation. The course covers a wide range of topics, including security frameworks, risk assessment, regulatory compliance and governance. This training will enable you to gain knowledge of new trends and best practices in security. You will also learn about<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71419de5 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"71419de5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ca12bed elementor-widget elementor-widget-heading\" data-id=\"1ca12bed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Training programme <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10905e70 elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"10905e70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-hourglass-half\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Duration: 5 days<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8268162 elementor-widget elementor-widget-n-accordion\" data-id=\"8268162\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Module 1: Fundamentals of System and Network Security\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1360\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1360\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Day 1: Fundamentals of information security and the role of a CISO <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1360\" class=\"elementor-element elementor-element-118b734 e-flex e-con-boxed e-con e-child\" data-id=\"118b734\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1360\" class=\"elementor-element elementor-element-df08c1c e-con-full e-flex e-con e-child\" data-id=\"df08c1c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48f1c85 elementor-widget elementor-widget-text-editor\" data-id=\"48f1c85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"text-2xl\">Objectives and structure of the course<\/li><li class=\"text-2xl\">Fundamentals of information security<\/li><li class=\"text-2xl\">Information System Security Manager (ISSM)<\/li><li class=\"text-2xl\">Information security programme<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1361\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1361\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Day 2: Information security compliance programme, risk management, security architecture and design <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1361\" class=\"elementor-element elementor-element-3bc0d62 e-flex e-con-boxed e-con e-child\" data-id=\"3bc0d62\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1361\" class=\"elementor-element elementor-element-7452713 e-con-full e-flex e-con e-child\" data-id=\"7452713\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c50834 elementor-widget elementor-widget-text-editor\" data-id=\"7c50834\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"text-2xl\">Information security compliance programme<\/li><li class=\"text-2xl\">Analysis of existing information security capabilities<\/li><li class=\"text-2xl\">Information security risk management<\/li><li class=\"text-2xl\">Security design and architecture<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1362\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1362\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Day 3: Security measures, incident management and change management <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1362\" class=\"elementor-element elementor-element-8bb5fd8 e-flex e-con-boxed e-con e-child\" data-id=\"8bb5fd8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1362\" class=\"elementor-element elementor-element-c3093a6 e-con-full e-flex e-con e-child\" data-id=\"c3093a6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-37d910f elementor-widget elementor-widget-text-editor\" data-id=\"37d910f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"text-2xl\">Information security measures<\/li><li class=\"text-2xl\">Information security incident management<\/li><li class=\"text-2xl\">Change management<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1363\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1363\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Day 4: Raising awareness of information security, monitoring and measurement, continuous improvement <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1363\" class=\"elementor-element elementor-element-4474f8a e-flex e-con-boxed e-con e-child\" data-id=\"4474f8a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1363\" class=\"elementor-element elementor-element-ba60bb2 e-con-full e-flex e-con e-child\" data-id=\"ba60bb2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c459747 elementor-widget elementor-widget-text-editor\" data-id=\"c459747\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"text-2xl\">Awareness and training programmes<\/li><li class=\"text-2xl\">Monitoring and measurement<\/li><li class=\"text-2xl\">Warranty programme<\/li><li class=\"text-2xl\">Continuous improvement<\/li><li class=\"text-2xl\">Closing the course<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1364\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1364\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Day 5: Certification exam <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1364\" class=\"elementor-element elementor-element-ce6c52a e-con-full e-flex e-con e-child\" data-id=\"ce6c52a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1364\" class=\"elementor-element elementor-element-5b748ac e-con-full e-flex e-con e-child\" data-id=\"5b748ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1364\" class=\"elementor-element elementor-element-3ebbd182 e-con-full e-flex e-con e-child\" data-id=\"3ebbd182\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-600ea5cc elementor-widget elementor-widget-text-editor\" data-id=\"600ea5cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div style=\"text-align: justify;\"><span style=\"color: var( --e-global-color-text ); letter-spacing: 0px; text-align: var(--text-align); background-color: var( --e-global-color-c696dce );\">Examination <b>\"PECB Chief Information Security Officer<\/b> meets the requirements of the PECB Examination and Certification Programme (ECP). The examination covers the following areas of competence:<\/span><b style=\"color: var( --e-global-color-text ); letter-spacing: 0px; background-color: var( --e-global-color-c696dce );\">\u00a0 Duration:\u00a0<\/b><span style=\"color: var( --e-global-color-text ); letter-spacing: 0px; background-color: var( --e-global-color-c696dce );\"><b> 3 hours<\/b><\/span><\/div><div style=\"text-align: justify;\"><b style=\"color: var( --e-global-color-text ); letter-spacing: 0px; background-color: var( --e-global-color-c696dce );\">\u00a0<\/b><\/div><ul><li class=\"text-2xl\"><b>Area 1:<\/b> Fundamental concepts of information security<\/li><li class=\"text-2xl\"><b>Area 2:<\/b> The role of the CISO in an information security programme<\/li><li class=\"text-2xl\"><b>Area 3:<\/b> Selection of a security compliance programme, risk management, security architecture and design<\/li><li class=\"text-2xl\"><b>Area 4:<\/b> Operational aspects of information security measures, incident management and change management<\/li><li class=\"text-2xl\"><b>Area 5:<\/b> Promoting a culture of information security, monitoring and improving an information security programme hours\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3add2827 e-flex e-con-boxed e-con e-child\" data-id=\"3add2827\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-796b392b e-flex e-con-boxed e-con e-child\" data-id=\"796b392b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39dfad0 elementor-widget elementor-widget-heading\" data-id=\"39dfad0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Training objectives<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a33cab7 elementor-widget elementor-widget-text-editor\" data-id=\"2a33cab7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At the end of this course, participants will be able to :<\/p><ul><li>Explain the fundamental principles and concepts of information security<\/li><li>Understand the roles and responsibilities of the CISO, the ethical considerations involved and address the challenges associated with this role<\/li><li>Designing and developing an effective information security programme tailored to the needs of the organisation<\/li><li>Adopt applicable frameworks, laws and regulations. Communicate and implement effective policies to ensure information security compliance.<\/li><li>Identify, analyse, assess and deal with information security risks, using a systematic and effective approach<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f051be3 e-flex e-con-boxed e-con e-child\" data-id=\"4f051be3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52b552e6 elementor-widget elementor-widget-heading\" data-id=\"52b552e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Training prerequisites<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cfa19f0 elementor-widget elementor-widget-text-editor\" data-id=\"2cfa19f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"has-show-more-inner-content\"><div class=\"td td-prerequisites\"><div class=\"has-show-more-inner-content\"><div class=\"td td-prerequisites\"><p>The main prerequisite for taking part in this course is a basic understanding of the principles and concepts of information security.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b52a59 e-flex e-con-boxed e-con e-parent\" data-id=\"5b52a59\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-158a494 elementor-button-info elementor-align-center elementor-widget elementor-widget-button\" data-id=\"158a494\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/06\/Chief-Information-Security-Officer-4p-FR-Partner.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">See the brochure for this course<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Suivez la formation PECB Chief Information Security Officer pour en savoir plus sur le r\u00f4le du RSSI. L&rsquo; audience cibl\u00e9e par la formation Professionnels activement impliqu\u00e9s dans la gestion de la s\u00e9curit\u00e9 de l\u2019information Responsables informatiques charg\u00e9s de superviser les programmes de s\u00e9curit\u00e9 de l\u2019information Professionnels de la s\u00e9curit\u00e9 qui aspirent \u00e0 acc\u00e9der \u00e0 des [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":10658,"comment_status":"closed","ping_status":"closed","template":"","tags":[],"accesibilite":[145],"certification":[87],"duree":[153],"examen":[146],"langue":[144],"niveau":[90],"formateur":[89],"cpf":[],"organismes":[],"organisme":[],"mec_category":[96],"class_list":["post-10655","mec-events","type-mec-events","status-publish","has-post-thumbnail","hentry","accesibilite-oui","certification-oui","duree-5-jours","examen-oui","langue-francais","niveau-fondamental","formateur-pecb","mec_category-management-de-la-securite-de-linformation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PECB CERTIFIED Chief Information Security Officer - ACG CyberAcademy<\/title>\n<meta name=\"description\" content=\"Suivez la formation PECB Chief Information Security Officer pour en savoir plus sur le r\u00f4le du RSSI.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/events\/pecb-certified-chief-information-security-officer\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PECB CERTIFIED Chief Information Security Officer - ACG CyberAcademy\" \/>\n<meta property=\"og:description\" content=\"Suivez la formation PECB Chief Information Security Officer pour en savoir plus sur le r\u00f4le du RSSI.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/events\/pecb-certified-chief-information-security-officer\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-16T11:26:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Chief_Information_Security_Officer-4p-FR-Partner_4-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1184\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-chief-information-security-officer\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-chief-information-security-officer\\\/\",\"name\":\"PECB CERTIFIED Chief Information Security Officer - ACG CyberAcademy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-chief-information-security-officer\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-chief-information-security-officer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Chief_Information_Security_Officer-4p-FR-Partner_4-3.jpg\",\"datePublished\":\"2024-07-02T14:01:42+00:00\",\"dateModified\":\"2026-01-16T11:26:08+00:00\",\"description\":\"Suivez la formation PECB Chief Information Security Officer pour en savoir plus sur le r\u00f4le du RSSI.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-chief-information-security-officer\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-chief-information-security-officer\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-chief-information-security-officer\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Chief_Information_Security_Officer-4p-FR-Partner_4-3.jpg\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Chief_Information_Security_Officer-4p-FR-Partner_4-3.jpg\",\"width\":1920,\"height\":1184,\"caption\":\"Nos conseillers vous aident \u00e0 monter votre dossier de financement \u00e9tape par \u00e9tape.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-chief-information-security-officer\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formations\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"PECB CERTIFIED Chief Information Security Officer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PECB CERTIFIED Chief Information Security Officer - ACG CyberAcademy","description":"Take the PECB Chief Information Security Officer course to find out more about the role of the CISO.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/events\/pecb-certified-chief-information-security-officer\/","og_locale":"en_GB","og_type":"article","og_title":"PECB CERTIFIED Chief Information Security Officer - ACG CyberAcademy","og_description":"Suivez la formation PECB Chief Information Security Officer pour en savoir plus sur le r\u00f4le du RSSI.","og_url":"https:\/\/acgcyberacademy.fr\/en\/events\/pecb-certified-chief-information-security-officer\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2026-01-16T11:26:08+00:00","og_image":[{"width":1920,"height":1184,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Chief_Information_Security_Officer-4p-FR-Partner_4-3.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-certified-chief-information-security-officer\/","url":"https:\/\/acgcyberacademy.fr\/events\/pecb-certified-chief-information-security-officer\/","name":"PECB CERTIFIED Chief Information Security Officer - ACG CyberAcademy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-certified-chief-information-security-officer\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-certified-chief-information-security-officer\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Chief_Information_Security_Officer-4p-FR-Partner_4-3.jpg","datePublished":"2024-07-02T14:01:42+00:00","dateModified":"2026-01-16T11:26:08+00:00","description":"Take the PECB Chief Information Security Officer course to find out more about the role of the CISO.","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-certified-chief-information-security-officer\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/events\/pecb-certified-chief-information-security-officer\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-certified-chief-information-security-officer\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Chief_Information_Security_Officer-4p-FR-Partner_4-3.jpg","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Chief_Information_Security_Officer-4p-FR-Partner_4-3.jpg","width":1920,"height":1184,"caption":"Nos conseillers vous aident \u00e0 monter votre dossier de financement \u00e9tape par \u00e9tape."},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-certified-chief-information-security-officer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Formations","item":"https:\/\/acgcyberacademy.fr\/events\/"},{"@type":"ListItem","position":3,"name":"PECB CERTIFIED Chief Information Security Officer"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/10655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events"}],"about":[{"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/mec-events"}],"author":[{"embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=10655"}],"version-history":[{"count":4,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/10655\/revisions"}],"predecessor-version":[{"id":17151,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/10655\/revisions\/17151"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/10658"}],"wp:attachment":[{"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=10655"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/tags?post=10655"},{"taxonomy":"accesibilite","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/accesibilite?post=10655"},{"taxonomy":"certification","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/certification?post=10655"},{"taxonomy":"duree","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/duree?post=10655"},{"taxonomy":"examen","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/examen?post=10655"},{"taxonomy":"langue","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/langue?post=10655"},{"taxonomy":"niveau","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/niveau?post=10655"},{"taxonomy":"formateur","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/formateur?post=10655"},{"taxonomy":"cpf","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/cpf?post=10655"},{"taxonomy":"organismes","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organismes?post=10655"},{"taxonomy":"organisme","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organisme?post=10655"},{"taxonomy":"mec_category","embeddable":true,"href":"http:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec_category?post=10655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}