No products added!
Certified Information Security Manager (CISM)
The ISACA uniquely management-focused Certified Information Security Manager (CISM) certification promotes international security practices and recognizes the individual who manages designs, oversees, and assesses an enterprise’s information security. CISM is an advanced certification that provides validation for individuals who have demonstrated they possess the knowledge and experience required to develop and manage an enterprise information security program.
Learning Objectives:
After this course you will be able to:
Explain the relationship between executive leadership, enterprise governance and information security governance.
Outline the components used to build an information security strategy.
Explain how the risk assessment process influences the information security strategy.
Articulate the process and requirements used to develop an effective information risk response strategy.
Describe the components of an effective information security program.
Explain the process to build and maintain an enterprise information security program.
Outline techniques used to assess the enterprise’s ability and readiness to manage an information security incident.
Outline methods to measure and improve response and recovery capabilities
- Key Regulatory Frameworks (ISO 27001, GDPR, HIPAA, etc.)
- Identifying Applicable Legal & Organizational Requirements
- Ensuring Compliance with Security Standards
- Reporting & Addressing Non-Compliance Issues
- Auditing & Continuous Compliance Monitoring
- Establishing & Managing an Information Security Program
- Aligning Security Programs with Business Goals
- Developing Security Architectures
- Managing Internal & External Security Resources
- Security Awareness & Training Programs
Module 7: Integrating Security into Business & IT Processes
- Embedding Security in Organizational Processes
- Security Considerations for Third-Party Vendors
- Security in Contracts & Supply Chain Management
- Monitoring & Evaluating Security Performance Metrics
- Reporting Security Progress to Management
- Defining Security Incidents & Severity Hierarchies
- Developing an Incident Response Plan
- Identifying & Reporting Security Incidents
- Investigating & Documenting Security Breaches
- Escalation & Notification Processes
- Building & Training an Incident Response Team
- Testing & Reviewing Incident Response Plans
- Communication & Coordination During Incidents
- Conducting Post-Incident Reviews & Lessons Learned
- Integrating Incident Response with Disaster Recovery & Business Continuity Plans
- Measuring Security Program Effectiveness
- Key Performance Indicators (KPIs) for Security Governance
- Emerging Trends in Information Security Governance
- The Role of AI & Automation in Security
- Future Challenges & Best Practices
Related Courses
Course Info
- Cyber Security
- 9
- 18 hours