TOIT Training
(909) 252-7584
[email protected]
Search
Log in
Menu
Home
Library
IT Library
Developer Courses
User Cuorses
Plans & Pricing
Features
About Us
Contact Sales
Roadmap
Home
Courses
ISACA
Certified Information Security Manager (CISM)
Curriculum
4 Sections
37 Lessons
19 Hours
Expand all sections
Collapse all sections
01. Domain 1: Information Security Governance
9
1.1
Establish internal and external reporting and communication channels.
1.2
Define, communicate and monitor information security responsibilities.
1.3
Gain ongoing commitment from senior leadership and other stakeholders.
1.4
Develop business cases to support investments in information security.
1.5
Identify internal and external influences to the organization.
1.6
Integrate information security governance into corporate governance.
1.7
Develop and maintain information security policies.
1.8
Establish and maintain an information security governance framework.
1.9
Develop an information security strategy, aligned with business goals and directives.
02. Domain 2: Information Risk Management
9
2.1
Ensure that information security risk is reported to senior management to support an understanding of potential impact on the organizational goals and objectives.
2.2
Monitor for internal and external factors (e.g., threat landscape, cybersecurity, geopolitical, regulatory change) that may require reassessment of risk to ensure that changes to existing or new risk scenarios are identified and managed appropriately.
2.3
Report noncompliance and other changes in information risk to facilitate the risk management decision-making process.
2.4
Facilitate the integration of information risk management into business and IT processes to enable a consistent and comprehensive information risk management program across the organization.
2.5
Determine whether information security controls are appropriate and effectively manage risk to an acceptable level.
2.6
Identify, recommend or implement appropriate risk treatment/response options to manage risk to acceptable levels based on organizational risk appetite.
2.7
Ensure that risk assessments, vulnerability assessments and threat analyses are conducted consistently, and at appropriate times, to identify and assess risk to the organization’s information.
2.8
Identify legal, regulatory, organizational and other applicable requirements to manage the risk of noncompliance to acceptable levels.
2.9
Establish and/or maintain a process for information asset classification to ensure that measures taken to protect assets are proportional to their business value.
03. Domain 3: Information Security Program Development & Management
10
3.1
Compile reports to key stakeholders on overall effectiveness of the IS program and the underlying business processes in order to communicate security performance.
3.2
Develop procedures (metrics) to evaluate the effectiveness and efficiency of the IS program.
3.3
Integrate information security requirements into organizational processes.
3.4
Integrate information security requirements into contracts and activities of third parties.
3.5
Develop a program for information security awareness and training.
3.6
Develop documentation that ensures compliance with policies.
3.7
Establish and maintain IS architectures to execute the IS program.
3.8
Establish and maintain requirements for all resources to execute the IS program.
3.9
Ensure alignment between the information security program and other business functions.
3.10
Develop a security program, aligned with information security strategy.
04. Domain 4: Information Security Incident Management
9
4.1
Align incident response plan with DRP and BCP.
4.2
Determine the root cause of IS incidents.
4.3
Test and review the incident response plan.
4.4
Develop incident escalation and communication processes.
4.5
Develop processes to investigate and document information security incidents.
4.6
Establish teams that effectively respond to information security incidents.
4.7
Develop processes for timely identification of information security incidents.
4.8
Establish an incident response plan.
4.9
Define (types of) information security incidents.
This content is protected, please
login
and
enroll
in the course to view this content!