Certified Information Security Manager® (CISM®) ISACA Exam Voucher

Original price was: $ 1,250.00 USD.Current price is: $ 599.00 USD.

Included in Purchase:

  • ISACA Certified Information Security Manager Exam voucher with 12 months of validity.

Availability: 7 in stock



   
Categories: , Tag:

The Certified Information Security Manager® (CISM®) exam consists of 150 questions covering 4 job practice domains, all testing your knowledge and ability on real-life job practices leveraged by expert professionals.

Below are the key domains, subtopics and tasks candidates will be tested on:

  • Domain 1: Information Security Governance
  • Domain 2: Information Security Risk Management
  • Domain 3: Information Security Program
  • Domain 4: Incident Management

SUPPORTING TASKS

  • Identify internal and external influences on the organization that impact the information security strategy.
  • Establish and/or maintain an information security strategy in alignment with organizational goals and objectives.
  • Establish and/or maintain an information security governance framework.
  • Integrate information security governance into corporate governance.
  • Establish and maintain information security policies to guide the development of standards, procedures and guidelines.
  • Develop business cases to support investments in information security.
  • Gain ongoing commitment from senior leadership and other stakeholders to support the successful implementation of the information security strategy.
  • Define, communicate and monitor information security responsibilities throughout the organization and lines of authority.
  • Compile and present reports to key stakeholders on the activities, trends and overall effectiveness of the information security program.
  • Evaluate and report information security metrics to key stakeholders.
  • Establish and/or maintain the information security program in alignment with the information security strategy.
  • Align the information security program with the operational objectives of other business functions.
  • Establish and maintain information security processes and resources to execute the information security program.
  • Establish, communicate and maintain organizational information security policies, standards, guidelines, procedures and other documentation.
  • Establish, promote and maintain a program for information security awareness and training.
  • Integrate information security requirements into organizational processes to maintain the organization’s security strategy.
  • Integrate information security requirements into contracts and activities of external parties.
  • Monitor external parties’ adherence to established security requirements.
  • Define and monitor management and operational metrics for the information security program.
  • Establish and/or maintain a process for information asset identification and classification.
  • Identify legal, regulatory, organizational and other applicable compliance requirements.
  • Participate in and/or oversee the risk identification, risk assessment and risk treatment process.
  • Participate in and/or oversee the vulnerability assessment and threat analysis process.
  • Identify, recommend or implement appropriate risk treatment and response options to manage risk to acceptable levels based on organizational risk appetite.
  • Determine whether information security controls are appropriate and effectively manage risk to an acceptable level.
  • Facilitate the integration of information risk management into business and IT processes.
  • Monitor for internal and external factors that may require reassessment of risk.
  • Report on information security risk, including noncompliance and changes in information risk, to key stakeholders to facilitate the risk management decision-making process.
  • Establish and maintain an incident response plan, in alignment with the business continuity plan and disaster recovery plan.
  • Establish and maintain an information security incident classification and categorization process.
  • Develop and implement processes to ensure the timely identification of information security incidents.
  • Establish and maintain processes to investigate and document information security incidents in accordance with legal and regulatory requirements.
  • Establish and maintain incident handling process, including containment, notification, escalation, eradication and recovery.
  • Organize, train, equip and assign responsibilities to incident response teams.
  • Establish and maintain incident communication plans and processes for internal and external parties.
  • Evaluate incident management plans through testing and review, including table-top exercises, checklist review and simulation testing at planned intervals.
  • Conduct post-incident reviews to facilitate continuous improvement, including root-cause analysis, lessons learned, corrective actions and reassessment of risk.