How InfoSec Institute Alum Rexson Serrao Earned the World’s Highest CGEIT Score

InfoSec Institute alum Rexson Serrao is Senior Director of IT, PMO and Planning at the Workers’ Compensation Insurance Rating Bureau (WCIRB) in San Francisco. After enrolling in InfoSec Institute’s Certified in the Governance of Enterprise IT (CGEIT) Boot Camp and sitting his exam, Rex recieved global recognition from ISACA for earning the world’s highest CGEIT exam score.

Rex is no stranger to certification prep. In addition to passing his CGEIT exam, Rex holds seven other certifications: PMP, CSM, CSPO, ITIL, COBIT, Microsoft Certified Excel Analyst and Microsoft Professional for Data Science.

We sat down with Rex to chat about his certification experience and the strategies he used to take home the world’s highest CGEIT score in 2017.

Why Did You Decide to Earn Your CGEIT Certification?

Rex: Security and IT certifications help me speak with a voice of authority. I’ve earned seven certifications and received them in order of how I wanted my career to progress.

For example, I earned my ITIL certification because I wanted to take on application support, and later earned my COBIT to assist with IT governance. Having practical experience is important, but being able to ground my experience in best-practice frameworks where possible has really helped me professionally. COBIT and the CGEIT in particular tie IT and security investments to ROI, business value and IT business alignment. Sharing this perspective with my leadership team and knowing the best words to use really helped capture my executive team’s attention.

I pursued the CGEIT as my firm started to explore risk management. At the same time, there was also a push to do better benefits realization. I saw the CGEIT certification as the next level up from my COBIT foundation certification. It was a natural extension of COBIT’s fifth principal, Separating Governance from Management. This (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Megan Sawle. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/_eE_E4zDAto/

Recent Posts

VMRay Closes $25 Million Series B

Digital+ Partners Leads Continuation Funding Round in Growing Automated Threat Analysis & Detection Provider, Closing its Series B Round at…

2 hours ago

The Hacker Mind Podcast: Hacking OpenWRT

For three years OpenWRT had a severe validation problem with its download package manager, until a fuzz tester found and…

2 hours ago

Goodbye to Flash – if you’re still running it, uninstall Flash Player now

It’s time to say a final “Goodbye” to Flash. (Or should that be “Good riddance”?) With earlier this week seeing…

2 hours ago

Smart DNS: Delivering the Best Subscriber Experience

This is the second in a series of blog posts that discuss how smart DNS resolvers can enhance ongoing network…

3 hours ago

New Microsoft Spear-Phishing Attack Uses Exact Domain Spoofing Tactic

Security researchers detected a new spear-phishing attack that’s using an exact domain spoofing tactic in order to impersonate Microsoft. On…

5 hours ago

6 ways to use analytics to deliver an exceptional end-user experience: Part 3

Welcome back to the last part of our three-part blog series on how to leverage analytics to deliver an exceptional…

5 hours ago