CISM: Information Security Governance (Part 3)
Experienced IT security professionals seeking to pass the Certified Information Security Manager (CISM) exam or otherwise gain knowledge in managing, designing, and overseeing an enterprise’s information security
Please contact us for information about prerequisites.
In order for information security governance to succeed, there must be an action plan put into place to lay the groundwork for success. This course examines the assets, departments, resources, and people that play a role in bringing an action plan to life. This course will also examine the components and constraints of an action plan, along with providing a sample information security strategy to bring it all together. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2015 ISACA Candidate Information Guide.
Resources for Information Security
- match organizational resources with descriptions of how they are used in developing an information security strategy
- distinguish between policies, standards, procedures, and guidelines
- match employee-related resources with descriptions of how they impact development of an information security strategy
- identify risk-related resources that become part of an information security strategy
- match strategies for addressing risk to corresponding examples
- recognize key concepts related to information security strategy resources
Information Security Strategy Action Plan
- match the components of an information security action plan with their corresponding roles within the strategy
- identify types of metrics used to monitor progress toward achieving information security objectives
- match indicators that security objectives have been met with their corresponding descriptions
- recognize the key facts about the components of an information security strategy