Understanding Grandfathering Processes & How Cybersecurity Professionals can take advantage of the EC-Council’s Associate C|CISO Grandfathering Program before it ends.

Reggie Menacherry
5 min readDec 13, 2023

In the dynamic landscape of cybersecurity, staying ahead of the curve is imperative for professionals aspiring to take on leadership roles. Recognizing the evolving nature of the Chief Information Security Officer (CISO) role, the EC-Council, a prominent player in cybersecurity training and certification, has introduced the Associate C|CISO Grandfathering Program. This initiative aims to empower seasoned cybersecurity professionals with an expedited pathway to obtain an industry-recognized credential, validating their competencies and readiness to assume a CISO’s role.

What is the Grandfathering Process in Certification Programs? Grandfathering, in the context of certification programs, refers to a process that allows individuals with substantial, relevant experience and expertise in a particular field to obtain a certification without necessarily completing the standard requirements. It recognizes the knowledge and skills acquired through practical experience and provides a streamlined pathway for highly competent professionals in a given domain.

Legitimacy of Grandfathering Processes Across Industries: The legitimacy of grandfathering processes in certification programs is discussed across various industries. Critics have argued in the past. Proponents contend that recognizing real-world experience is a practical way to identify and acknowledge seasoned professionals who may not have followed the conventional educational or certification paths.

The legitimacy of grandfathering processes often hinges on the certifying body's credibility and the evaluation process's thoroughness. In the case of EC-Council’s Associate C|CISO Grandfathering Program, the emphasis on subject matter expertise and meticulous evaluation of applicants adds credibility to the process. The program targets cybersecurity professionals with at least 5 years of cumulative experience in key C|CISO domains or those holding recognized certifications like CISSP, CISM, or CISA.

Understanding the CCISO Program: The Certified Chief Information Security Officer (C|CISO) program, pioneered by the EC-Council, is a comprehensive certification designed for experienced information security professionals aspiring to step into leadership roles. It goes beyond technical cybersecurity skills, focusing on risk management, governance, strategic planning, and leadership. The CCISO program aims to produce well-rounded cybersecurity leaders who can align security strategies with organizational objectives.

Significance of the CISO Role in the Evolving Cybersecurity Landscape: The role of a CISO has evolved significantly in response to the ever-changing threat landscape. Modern CISOs are expected to possess technical cybersecurity acumen and a deep understanding of business objectives, risk management, and compliance. The CISO’s office shoulders diverse responsibilities, including developing and implementing security strategies, managing risk, ensuring compliance, and safeguarding sensitive information. This evolution underscores the importance of certifications like CCISO that go beyond technical skills and emphasize a holistic approach to cybersecurity leadership.

Associate C|CISO Grandfathering Program: A Strategic Move: EC-Council’s decision to introduce the Associate C|CISO Grandfathering Program is a strategic move to tap into the pool of experienced cybersecurity professionals who may not have taken the traditional certification route. The program recognizes the changing demands of the CISO role and acknowledges that practical experience is a valuable asset in the cybersecurity domain.

Advantages of the Associate C|CISO Grandfathering Program:

  1. Expedited Recognition for Seasoned Professionals: The program offers an expedited pathway for seasoned professionals to obtain a recognized credential, saving them time compared to traditional certification routes.
  2. Acknowledgment of Real-world Experience: By allowing professionals with a minimum of 5 years of cumulative experience or holding recognized certifications to apply, the program acknowledges the value of real-world experience in shaping effective cybersecurity leaders.
  3. Support for Cybersecurity Leadership Growth: The program not only validates the skills of candidates but also supports their growth in crucial areas such as governance, risk management, program management, and strategic planning. This aligns with the evolving requirements of the CISO role.
  4. Credibility through Thorough Evaluation: The application process involves meticulously evaluating subject matter experts, ensuring that those granted the Associate C|CISO credential have demonstrated proficiency and competence in cybersecurity leadership.
  5. Alignment with Industry Trends: The initiative aligns with broader industry trends, recognizing the importance of experience alongside traditional certifications. It reflects a pragmatic approach to assessing the capabilities of cybersecurity professionals.

Which known courses have initiated the Grandfathering Program in the past?

  1. (ISC)² Certified Information Systems Security Professional (CISSP): (ISC)², the International Information System Security Certification Consortium, has employed grandfathering processes for its CISSP certification. In certain instances, individuals with substantial experience in the information security domain were allowed to bypass the traditional examination by demonstrating their extensive work history and contributions to the field.
  2. Project Management Professional (PMP) Certification: The Project Management Professional (PMP) certification, offered by the Project Management Institute (PMI), has utilized grandfathering processes in the past. PMI recognized that some professionals had acquired significant project management experience without obtaining formal education in the field.
  3. Cisco Certified Internetwork Expert (CCIE): Cisco’s CCIE certification, a prestigious credential in the networking industry, has previously implemented grandfathering processes. Recognizing the expertise of seasoned networking professionals, Cisco allowed individuals with substantial experience in designing, implementing, and managing complex networking solutions to bypass certain examination requirements.
  4. Certified Information Systems Auditor (CISA): ISACA’s Certified Information Systems Auditor (CISA) certification, focused on information systems auditing, has also implemented grandfathering processes. ISACA recognized that some professionals had acquired extensive auditing experience without completing the standard examination.
  5. Microsoft Certified Systems Engineer (MCSE): In the past, Microsoft’s MCSE certification, which validates expertise in designing and implementing Microsoft-based solutions, has utilized grandfathering processes. Microsoft acknowledged the experience of professionals actively working with Microsoft technologies, allowing them to demonstrate their skills and knowledge without necessarily completing all the standard certification exams.

Conclusion: In the ever-evolving field of cybersecurity, certifications play a pivotal role in validating the skills and knowledge of professionals. When implemented judiciously, grandfathering processes offer a pragmatic way to recognize the expertise of seasoned professionals who may not have followed conventional certification paths. EC-Council’s Associate C|CISO Grandfathering Program is a timely response to the changing demands of the CISO role and provides a valuable opportunity for experienced cybersecurity professionals to gain industry-recognized credentials. The program’s emphasis on thorough evaluation ensures that the legitimacy and credibility of the certification are maintained, making it a strategic advantage for professionals with vast experience in cybersecurity.

Here are a few examples of certifications in various domains that have conducted grandfathering programs:

  1. Chartered Financial Analyst (CFA): The CFA Institute, which awards the Chartered Financial Analyst (CFA) designation, has implemented grandfathering processes.
  2. Six Sigma Certification: Organizations offering Six Sigma certifications, such as the American Society for Quality (ASQ), have employed grandfathering programs.
  3. Human Resources Certification Institute (HRCI): HRCI, which offers certifications such as the Professional in Human Resources (PHR) and Senior Professional in Human Resources (SPHR), has utilized grandfathering processes.
  4. Certified ScrumMaster (CSM): The Scrum Alliance, which provides certifications like Certified ScrumMaster (CSM), has implemented grandfathering programs. Professionals with substantial experience in applying Scrum practices and principles could obtain certification without completing the standard training courses.
  5. American Board of Pediatrics (ABP) — Maintenance of Certification (MOC): Medical certifications, such as those offered by the American Board of Pediatrics, have implemented grandfathering programs as part of their Maintenance of Certification (MOC) processes.

--

--

Reggie Menacherry

Sec+ CEH CISSP CPENT Writer Product Developer Designer Marketer Traveller Chef Artist