TOP_IMG

Certified Information Security Manager (CISM) is a certification for information security managers awarded by the Information Systems Audit and Control Association (ISACA).

The CISM focuses on information risk management as the basis of information security. It also includes material on broader issues such as how to govern information security as well as on practical issues such as developing and managing an information security program and managing incidents.

The CISM certifications tends to be sought after by both CISA and CISSP certification communities.

About this workshop

The CISM exam covers 5 information security management practice areas created from the most recent CISM job practice analysis.

Benefits

There are many reasons to achieve CISM certification:

  • Gain a better understanding of information risk management
  • Understand how to govern information security
  • Understand how to develop & manage an information security program
  • Understand how to manage incidents
  • Offers a career differentiator, with enhanced credibility and marketability
  • Provides access to valuable resources, such as peer networking and idea exchange

Who should attend

This workshop is meant for professionals responsible for information risk management and information security governance for the organization.

  • CEO / CFO / CIO / CTO / CISO
  • IT Managers
  • Finance Managers
  • Process Consultants
  • IS Managers
  • Security Consultants
  • Security Architects
  • Security Specialists
  • System Administrators
  • IS Auditors

The CISM certification would immensely benefit those aspiring to make a career in Information Security Management.

Course Outline

Information Security Governance: Establish and maintain a framework to provide assurance that information security strategies are aligned with the business objectives and consistent with applicable laws and regulations.

Information Risk Management: Identify and manage information security risks to achieve business objectives.

Information Security Program Development: Create and maintain a program to implement the information
security strategy.

Information Security Program Management: Oversee and direct information security activities to execute the
information security program.

Incident Management and Response: Plan, develop and manage a capability to detect, respond to and recover from information security incidents.