Maintaining Your CGEIT Certification: Renewal Requirements


The CGEIT certification is offered by the Information System Audit and Control Association (ISACA). It is based on the framework for governing enterprise IT with focused areas including strategic management, benefits realization, and risk and resource optimization.

The certification is very useful for professionals working in industries like media, finance, and health. Acquiring CGEIT requires registration on ISACA’s platform [1]. A candidate must have at least five years of relevant work experience in the field of Information Technology to apply for this certification.

Renewal Requirements

CGEIT certification is valid for a period of three years. To maintain it, the one must fulfill specific renewal requirements. For example, certification holders are required to keep knowledge base up to date with the current IT governance knowledge.

The CGEIT’s Continuing Professional Education (CPE) policy is specifically designed for this purpose. It demands that CGEIT’s professionals carry out CPE related activities to validate their knowledge and expertise in IT governance. This then must be reported to the certifying authorities.

ISACA offers CPE credits through a variety of activities including training courses, journal quizzes, webinars, and conferences. The CGEIT professional needs to take at least 20 CPE hours annually or 120 CPE hours for a three-year period. The CPE hours must be reported online to the certification committee. The individual must comply with ISACA’s code of professional ethics [2] to retain the CGEIT certification.

CGEIT Maintenance Fee

CGEIT certification renewal requires annual maintenance fee that can be submitted online through ISACA sends the invoice copy to the certificate owners in the hard form and via email in the third quarter of each calendar year.

CGEIT CPE Requirements

The CGEIT Certification Board is responsible for setting up the CPE requirements. ISACA may even ask the professionals to submit their CPE activities for (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Ifeanyi Egede. Read the original post at: