CDAIO
Chief Data & AI Officer Certificate
The Chief Data & AI Officer (CDAIO) Certificate program provides you with emerging AI knowledge that you need to set up a 21st century data utilization and responsible AI program.
The role of the CISO is gaining in prominence. Are you ready?
The challenges and demands facing information security leaders grow increasingly complex.
The reality is no longer “if” your company has been hacked, or even “when.” The reality today is, “You’ve been hacked, you just don’t know it yet.” The need is growing for individuals with a cross-section of business acumen, technical ability, and expertise in cybersecurity.
In the CISO Certificate Program, you will learn the skills you need to be an effective CISO through targeted interdisciplinary coursework and hands-on practical application, led by world-renowned faculty from Carnegie Mellon University’s Heinz College and Software Engineering Institute (SEI). Named a National Center of Academic Excellence in Information Assurance Education by the NSA and U.S. Department of Homeland Security, Heinz College is a crucial asset to cybersecurity education and practice in the United States
This six-month program, co-administered by Heinz College and the CERT Division of SEI, blends on-campus and synchronous distance learning and is designed to enhance the careers of cyber leaders and technology managers.
All students admitted to the CISO Certificate Program will have at least seven years of relevant experience managing projects and/or people, giving you the chance to collaborate with similarly experienced peers and build exciting new relationships and networks with your cohort.
Earning a Chief Information Security Officer certificate from Heinz College helped Joe Lewis become the CISO of the Centers for Disease Control and Prevention.
The CISO program helped me to step into my role as a Chief Information Security Officer. The program prepared me to address the many challenges facing a CISO—operational resilience, threat management, cyber risk management, insider threat. The practicum allowed me to work with cyber experts from great organizations and guided us in framing the communications necessary to lead an organization through cybersecurity problems, and communicate with our Boards.Greg Crabb | Chief Information Security Officer, Vice President | United States Postal Service
Please note: Due to the non-credit bearing nature of the CISO Certificate Program, students are unable to apply for tuition assistance, scholarship, or VA benefits. Program costs cannot be itemized.
Applications are currently being accepted for Cohort 25, which begins September 2025.
Virtual Orientation: 12:00 - 5:00 p.m. EDT
September 3-5, 2025
Virtual Modules: 4:00 - 9:00 p.m. EST
(Note: all virtual class dates are Thursdays)
September 18, 25 (2025)
October 9, 16, 23 (2025)
Program Mid-Session: 9:00 a.m. - 5:00 p.m. EST (Pittsburgh, PA; virtual option available)
October 28-30, 2025
Virtual Modules: 4:00 - 9:00 p.m. EST
(Note: all virtual class dates are Thursdays)
November 6, 13, 20 (2025)
December 4, 11, 18 (2025)
January 8, 15, 22, 29 (2026)
Practicum: 9:00 a.m.- 5:00 p.m. EST (Pittsburgh, PA; virtual option available)
February 25-26, 2026
Virtual Orientation: 12:00 - 5:00 p.m. EST
January 14-16, 2025
Virtual Modules: 4:00 - 9:00 p.m. EST
(Note: all virtual class dates are Thursdays)
January 23, 30 (2025)
February 6, 13, 27 (2025)
Program Mid-Session: 9:00 a.m. - 5:00 p.m. EDT (Pittsburgh, PA; virtual option available)
March 11-13, 2025
Virtual Modules: 4:00 - 9:00 p.m. EDT
(Note: all virtual class dates are Thursdays)
March 27 (2025)
April 3, 10, 24 (2025)
May 8, 15, 29 (2025)
June 12 (2025)
Practicum: 9:00 a.m.- 5:00 p.m. EDT (Pittsburgh, PA; virtual option available)
June 16-18, 2025
Earning your executive education certificate is just the beginning of a lifelong relationship with CMU; we're here to help you advance your career throughout your professional life. The Heinz College Executive Advantage program is meant for people who always want to be ahead of the curve—those who want to lead the conversation, not just be a part of it.
Executive Advantage was designed with you—C-suite executives and lifelong learners—in mind. In addition to the valuable skills you gain through our executive certificate programs, you now have access to workshops, leadership summits, and conferences.
Instructor:
Alan Levine | Board Chair, Carnegie Mellon University CISO Executive Program
This module is focused on discussing the CISO roles and responsibilities; how the CISO integrates effectively in organizational governance and operations; and leadership and management practices that enhance the ability of today’s CISO to succeed in any organization. This module will help to set the stage for the overall CISO certificate program and the modules that follow.
Instructor:
Dr. Earl Crane | Owner, Risk Executive/Strategic Advisor, Earl Crane LLC
This module will provide an overview of cyber risk management concepts and techniques, and then provide a tangible deep-dive into real-world examples and scenarios. Students will be asked to bring their real-world expertise and risk management challenges to share with their colleagues. Discussions will include an overview of cyber risk management frameworks, relevant regulations, and available tools. We will cover the three lines of defense, the latest thinking in risk-based assessments, and how to represent cyber risk as a decision-making framework for business unit leaders, executives, and your board.
Instructor:
Jack Jones | Executive Advisor, Risk Management Insight
This module will assist students, via the FAIR methodology, to accurately assess IT and cybersecurity loss exposure, to learn how to identify the significance of control weaknesses, determine how to optimize security budgets and priorities, and understand how to support governance and compliance requirements.
Instructor:
Matt Butkovic | Technical Director of Cybersecurity Risk and Resilience, CERT Division of SEI
This module is focused on an increasingly common challenge; how to ensure the security and resilience of your organization’s critical services when many of the assets – technology, people, facilities, and information – required to deliver the service are provided by outside entities. This module is also intended to provide an overview of the concept of resilience, operational resilience, resilience management, and related subjects and challenges.
Instructor:
Randy Trzeciak | Director, CERT Insider Threat Center at SEI
Insider threats are influenced by a combination of technical, behavioral, and organizational issues and must be addressed by policies, procedures, and technologies. Decision makers across the enterprise should understand the overall scope of the insider threat problem and communicate it to all the organization’s employees.
This module discusses how organizations can effectively mitigate the potential of insider threats and build an effective program.
Instructor:
Rick Howard | Chief Security Officer, N2K
To understand the network defender's current strategy and toolset, it is more than helpful to understand what came before and how we got here. In order for you to build your own strategies and choose your own toolsets, you must understand the decisions that were made by your predecessors to judge for yourselves if they are still key and essential to the purpose of your own programs. This module will cover the history of the network defender movement from the early 1990s up to 2020, and end with the current set of best practices, strategies, and current thinking of the network defender community.
Instructor:
Omar Khawaja | CISO, Databricks
This module is an overview of practical “day-to-day" operations. The module will cover how to properly plan, structure, and report on your security team, as well as obtain “buy-in” from your organization. This clear outline of the security structure will better enable CISOs to demonstrate the charter and effectiveness of the security team to their organizations.
Instructor:
Summer Fowler | CISO, Torc Robotics
In this module, students will use real-world strategic objectives to develop specific business goals and the applicable questions, indicators, and actionable metrics that they can implement at their own organizations to improve their ability to manage operational risks, particularly cybersecurity risks.
Instructor:
Chris Labash | Associate Teaching Professor, Carnegie Mellon University's Heinz College
This module will discuss effective ways to communicate security related organizational goals to the board. Incident summary board presentations will also occur during this module delivery, with the instructors and invited guests providing constructive feedback to the teams as they are delivered.
Instructor:
Brigadier General (ret.) Gregory J. Touhill | Director, CERT Division at the Software Engineering Institute
This module is focused on the requirement for today’s CISOs to develop a budget that aligns with the annual strategic planning process and is supported by key organizational stakeholders. This often needs to be developed in environments with significant third-party managed services and where growth strategies include regular business acquisitions and divestitures.
Instructor:
Rich Friedberg | CISO, Live Oak Bank
As more organizations embrace the benefits of cloud-based infrastructures and services, they face significant challenges in how to secure their information and applications. In addition, new pressures are placed on security teams to automate and deliver at speed, while key security roles and responsibilities move into development teams.
This module will examine the changes to risks, threats, and vulnerabilities when companies move from on-prem to cloud services. The module will also discuss how to develop a business-focused security strategy to balance enabling transformation with protecting the organization through their cloud journey.
Instructor:
Josh Corman | Adjunct Instructor, Carnegie Mellon University's Heinz College
This module teaches students to recognize the knowledge area critical to software security and product assurance to secure the organization and to support its strategic mission.
Instructor:
Mark Fabro | President and Chief Security Strategist, Lofty Perch, Inc.
This module will address specific OT and IIOT concerns faced by organizations and their supply-chain partners. It is designed to explore best practices used by industry to ensure that OT and IIOT achieves functional goals and meets security requirements.
Instructor:
Bob Rudis | V.P. Data Science, Security Research, & Detection Engineering, GreyNoise Intelligence
In an era of rapidly evolving threats, data-driven threat intelligence is essential for proactive and informed cybersecurity leadership. This module equips CISOs with the frameworks and tools to harness internal and external data sources—such as telemetry, behavioral analytics, open-source intelligence (OSINT), and threat feeds—to generate actionable insights. Participants will explore methods for operationalizing threat intelligence, integrating it into risk management strategies, and aligning intelligence programs with business objectives. Through case studies and practical exercises, the module emphasizes the strategic value of intelligence-led decision-making in anticipating threats, reducing risk, and enhancing organizational resilience.
Instructor:
Omar Khawaja | Field CISO, Databricks
As artificial intelligence becomes deeply integrated into enterprise systems and critical infrastructure, securing AI and leveraging AI for cybersecurity have emerged as dual imperatives for today’s CISOs. This module explores the unique risks posed by AI systems—such as data poisoning, model inversion, and adversarial attacks—while also examining how AI can be a powerful tool for enhancing cyber defense capabilities. Participants will gain practical insights into threat modeling for AI systems, governance frameworks, and the ethical considerations of AI deployment. Real-world case studies and hands-on exercises will prepare CISOs to lead secure AI adoption while strengthening overall cyber resilience.
Instructor:
Greg Porter | Adjunct Professor, Carnegie Mellon University's Heinz College; Founder, Allegheny Digital
This module will begin with an overview of the current threat landscape and examine the array of adversary classes facing organizations. The session will then provide CISO students with a pragmatic overview of common issues and challenges in developing, maintaining, and operating an effective incident management and forensics capability. The module will also cover the current state of security operations center best practices, and will conclude with an overview of supporting frameworks, and the types of tools and infrastructure needed to be effective to respond to cyber incidents and increase end-users' resilience.
Instructor:
Matthew Meade | Chair, Cybersecurity, Data Protection & Privacy Group, Eckert Seamans
While CISOs are well-prepared to handle IT and forensic issues, guidance on the legal consequences and legal obligations is often siloed to in-house counsel and not part of a collaborative effort. Through this practical and interactive session, students will learn about the following:
(1) the legal aspects of a proactive approach to cybersecurity;
(2) state and federal law issues associated with responding and reacting to a security incident; and
(3) litigation and regulatory investigations arising from data breaches.
Instructor:
Larry Kamer | CEO, Kamer Consulting Group
This module explores the CISO’s role in developing and executing an effective internal and external communications strategy when faced with a large scale breach that impacts the operations of the organization. This module will reference various relevant case studies to help students develop a comprehensive approach.
Graduates of the Chief Information Security Officer Certificate Program will have access to new CISO Program modules created in the future, providing you with continuing education after the program ends. Approval is required.
Please note: This benefit does not extend to future CIO, CRO, CDAIO, or CDigitalO program modules, unless the student is also a graduate of those programs.
Students who complete the Chief Information Security Officer Certificate Program and who subsequently apply for and are admitted into the Heinz College MSIT Degree Program are eligible for a tuition discount scholarship. Program costs that have been paid for completing any or all of the Heinz College Executive Education certificate programs (up to $40,000) by the individual student or their sponsor/employer will be matched with a tuition discount from the MSIT program—reducing the cost to complete the MSIT degree by up to $40,000.
In order to be considered, applicants to the MSIT program should indicate their enrollment status with the CIO, CISO, CRO, CDAIO, and/or CDigitalO program(s) on the Application for Admission.
Please note: The tuition discount is only available once a student has completed all of the certificate program’s requirements. Completion of a certificate program does not guarantee admission to the MSIT program.
A non-refundable, non-transferable deposit of 1/6 of the total program cost is required to reserve a seat in the program.
Should a student withdraw from the program after the deposit has been paid but prior to the program start date, students may have 5/6 of the program costs either refunded to them or transferred to the following cohort of the program.
After the program start date, no refunds will be issued. However, under extenuating circumstances and with program director approval, students may petition to postpone their attendance to a future cohort and have 5/6 of the program costs applied accordingly.
While both roles require leadership and strategic thinking, the CISO role is more specialized in cybersecurity, whereas the CIO role has a broader organizational technology focus.
Don't know which technology management certificate program is the best for you? Reach out to someone on our team. We'd love to help you figure out which path works best for you.
Explore our suite of executive education programs to find the one that best fits you:
Chief Data & AI Officer Certificate
The Chief Data & AI Officer (CDAIO) Certificate program provides you with emerging AI knowledge that you need to set up a 21st century data utilization and responsible AI program.
Chief Information and Digital Officer Certificate
The Chief Information & Digital Officer (CIDO) Certificate program takes an interdisciplinary approach to information and technology management for executives with IT oversight responsibilities.
Chief Risk Officer Certificate
The Chief Risk Officer (CRO) Certificate program provides the latest skills and best practices impacting risk management, as well as effective strategies for addressing and analyzing enterprise risks.
Master of Science in Information Technology (Online)
The Master of Science in Information Technology (MSIT) is our part-time online program for professionals seeking graduate degrees in IT; Heinz certificate program graduates are eligible for a MSIT tuition discount.
Have questions? Reach out to us to find out more:
Check out our detailed program guide.
Ready to apply?