Book Image

Certified Information Security Manager Exam Prep Guide

By : Hemang Doshi
Book Image

Certified Information Security Manager Exam Prep Guide

By: Hemang Doshi

Overview of this book

With cyber threats on the rise, IT professionals are now choosing cybersecurity as the next step to boost their career, and holding the relevant certification can prove to be a game-changer in this competitive market. CISM is one of the top-paying and most sought-after certifications by employers. This CISM Certification Guide comprises comprehensive self-study exam content for those who want to achieve CISM certification on the first attempt. This book is a great resource for information security leaders with a pragmatic approach to challenges related to real-world case scenarios. You'll learn about the practical aspects of information security governance and information security risk management. As you advance through the chapters, you'll get to grips with information security program development and management. The book will also help you to gain a clear understanding of the procedural aspects of information security incident management. By the end of this CISM exam book, you'll have covered everything needed to pass the CISM certification exam and have a handy, on-the-job desktop reference guide.
Table of Contents (17 chapters)
1
Section 1: Information Security Governance
4
Section 2: Information Risk Management
8
Section 3: Information Security Program Development Management
13
Section 4: Information Security Incident Management

Obtaining commitment from senior management

For the effective implementation of security governance, support and commitment from senior management is the most important prerequisite. A lack of high-level sponsorship will have an adverse impact on the effectiveness of security projects.

It is very important for the information security manager to gain support from senior management. The most effective way to gain this is to ensure that the security program continues to be aligned with and supports the business objectives. This is critical in gaining management support. Senior management is more concerned with the achievement of business objectives and will be keen to address all the risks impacting them.

Obtaining commitment from senior management is very important to ensure appropriate investment in information security, as we'll cover in the next section.

Information security investment

Investment should be able to provide value to the business. The primary driver for investment in an information security project is value analysis and a sound business case. To obtain approval for an information security budget, the budget should primarily include a cost-benefit analysis. Senior management is more interested in the benefit that is derived from the budget.

For example, as a security manager, if you request a budget of $5,000 for security investment, the senior management may not be convinced. But if you also project annualized savings of $10,000 against an investment of $5,000, the senior management may be more willing to invest.

Strategic alignment

Information security activities are said to have a strategic alignment when it supports the requirements of key business stakeholders. Information security should support the achievement of organizational objectives by minimizing business disruptions. The most effective way to enhance the senior management's commitment toward information security is to conduct a periodic review of the alignment between security and business goals. A discussion with key business stakeholders will give a correct picture of the alignment of security programs with business objectives.

A survey of the organization's management is the best way to determine whether the security programs support business objectives. Achieving strategic alignment means business process owners and managers believe that information security is effectively supporting their goals. If business management is not confident in the security programs, the information security manager should redesign the processes to provide value to the business.

Another aspect of determining the strategic alignment is to review the business balanced scorecard. A business scorecard contains important metrics from a business perspective. It will help to determine the alignment of the security goals with the business goals.

Key aspects from the CISM exam perspective

The following are some of the key aspects from the CISM exam perspective:

Table 1.6 – Key aspects from the CISM exam perspective

Table 1.6 – Key aspects from the CISM exam perspective

Questions

  1. To obtain approval for information security budgets, what should a budget primarily include?

    A. A cost-benefit analysis.

    B. Industry benchmarks.

    C. The total cost of ownership.

    D. All the resources required by business units.

    Answer: A. A cost-benefit analysis.

    Explanation: Senior management is more interested in the overall business benefit derived from the security budget. The other options are important considerations when evaluating and approving budgets, but the most important factor is the cost-benefit analysis.

  2. What should senior management do to support information security?

    A. Evaluate the latest security products.

    B. Conduct risk assessments

    C. Approve policy statements and funding.

    D. Mandate information security audits.

    Answer: C. Approve policy statements and funding.

    Explanation: Policy statements contain the intent and direction of the management. Senior management should approve policy statements and provide sufficient budgets to achieve the organization's information security objectives. The management may be involved in evaluating products and risk assessment and mandating information security audits, but their primary role is to provide direction, oversight, and governance.

  3. When are information security activities are said to have strategic alignment?

    A. When they support the requirements of key business stakeholders.

    B. When they support the requirements of the IT team.

    C. When they support the requirements of globally accepted standards

    D. When they provide reliable and cost-effective services.

    Answer: A. When they support the requirements of key business stakeholders.

    Explanation: Information security should support the achievement of organizational objectives by minimizing business disruptions. When information security supports the requirements of key business units, there is alignment. The IT department is one of the stakeholders. The other options are secondary factors.

  4. What is the best way to gain support from senior management?

    A. To provide examples of security breaches in other organizations.

    B. To provide details of technical risks applicable to the organization.

    C. To showcase industry best practices.

    D. To explain the impact of security risks on key business objectives.

    Answer: D. To explain the impact of security risks on key business objectives.

    Explanation: Senior management is more concerned about the achievement of business objectives and will be keen to address all the risks impacting these. The other options will not be as effective as mapping security risks to key business objectives.

  5. How can support from senior management be obtained for implementing a new project?

    A. Conducting risk assessments.

    B. Explaining regulatory requirements.

    C. Developing a business case.

    D. Selecting the latest technology.

    Answer: C. Developing a business case.

    Explanation: The business case contains the need and justification for the project. It will be the most important document to gain support from senior management. The other options will not be as effective as the business case.

  6. What is the most effective way to enhance the commitment from senior management toward information security?

    A. To have security policies approved by the CEO.

    B. To conduct frequent security awareness training.

    C. To conduct periodic reviews of the alignment between security and business goals.

    D. To conduct periodic information security audits

    Answer: C. To conduct periodic reviews of the alignment between security and business goals.

    Explanation: The most effective way to enhance the commitment from senior management toward information security is to ensure that the security program continues to be aligned with and support the business objectives. This is critical to management support. The other options will not have as much of an effect on management as ensuring alignment with the business goals.

  7. What is the most effective way to justify the information security budget?

    A. To consider the number of security breaches.

    B. To consider the expected annual loss.

    C. To consider a cost-benefit analysis.

    D. To consider industry benchmarks.

    Answer: C. To consider a cost-benefit analysis.

    Explanation: The most effective way to justify the budget is to consider a cost-benefit analysis. Other options may be considered when conducting a cost-benefit analysis.

  8. What best indicates commitment from senior management toward security programs?

    A. Their involvement in the asset risk assessment.

    B. Their review and approval of the risk management methodology.

    C. Their review and approval of residual risks.

    D. Their review and approval of inherent risks.

    Answer: B. Their review and approval of the risk management methodology.

    Explanation: The involvement of senior management in the review of the risk management methodology is the best indicator that management support and are committed to effective information security. The other options do show some level of management support and commitment, but not as much as option B.

  9. What is the most effective justification to gain support from senior management for security investment?

    A. The reduction in the security budget.

    B. The adherence to regulatory requirements.

    C. The protection of information assets.

    D. The enhanced business value.

    Answer: D. The enhanced business value.

    Explanation: The objective of security investments is to increase the business value by addressing instances of business disruptions, thereby reducing losses and improving productivity. The protection of information assets is one of the elements of enhanced business value.

  10. Who is most likely to sponsor the security steering committee?

    A. The chief audit officer.

    B. The information security manager.

    C. The chief operating officer.

    D. The head of legal.

    Answer: C. The chief operating officer.

    Explanation: The steering committee should be sponsored by an authority who is well versed in the business objectives and strategy. The COO has the most knowledge of the business operations and objectives. The COO is in the best position to align the security strategy with the business objectives.

  11. What is the best driver for investment in information security projects?

    A. An information security audit report.

    B. Value analysis.

    C. The business environment.

    D. Penetration test reports.

    Answer: B. Value analysis.

    Explanation: Investment in security should be able to provide value to the business. The primary driver for investment in information security projects is value analysis and a sound business case. The other options are secondary factors.

  12. What is the most important prerequisite for implementing the information security program?

    A. Senior management commitment.

    B. A documented framework.

    C. A documented policy.

    D. Frequent security awareness training.

    Answer: A. Senior management commitment.

    Explanation: The support and commitment from senior management is the most important prerequisite. Without that, the other options may not add value to the information security program.

  13. Who is the best person to approve the information security governance plan?

    A. The system auditor.

    B. The security manager.

    C. The steering committee.

    D. The system administrator.

    Answer: C. The steering committee.

    Explanation: The steering committee consists of senior officials from different departments. They are well versed in the business objectives and strategy. They can ensure that the security governance is aligned with the business strategy and objectives.

  14. What is the best method to change an organization's security culture?

    A. Stringent penalties for non-compliance.

    B. Obtaining strong management support.

    C. Implement strong security controls.

    D. Conducting frequent system audits.

    Answer: B. Obtaining strong management support.

    Explanation: The intention and support from senior management is of utmost importance in changing an organization's security culture. In the absence of support from management, the other options will not add value.

  15. Which of the following will have the most adverse impact on the effective implementation of security governance?

    A. A complex organizational environment.

    B. A limited budget for information security.

    C. Improper business priorities.

    D. A lack of high-level sponsorship.

    Answer: D. A lack of high-level sponsorship.

    Explanation: A lack of high-level sponsorship means a lack of commitment and support from senior management. Support from senior management is a prerequisite for effective security governance. With high-level sponsorship, budget constraints and business priorities can be set right.

  16. What is the best method to measure the strategic alignment of an information security program?

    A. To survey the business stakeholders.

    B. To conduct frequent audits.

    C. To analyze incident trends.

    D. To evaluate the business case.

    Answer: A. To survey the business stakeholders.

    Explanation: Discussion with key business stakeholders will give a correct picture about the alignment of security programs to support business objectives. Incident trends will help us to understand the effectiveness of security programs but not directly about their alignment. A business case is prepared at the time of initiation of the project and a discussion with the business owner will help us to understand whether alignment, as indicated in the business case, is being adhered to.

  17. What is the most important factor that affects the successful implementation of the information security program?

    A. Support from senior management.

    B. The level of the security budget.

    C. The team size of the security team.

    D. Regular information system audits.

    Answer: A. Support from senior management.

    Explanation: The most important factor that affects the successful implementation of an organization's information security program is the support and commitment from senior management. The other options are secondary factors. Without appropriate support, it will be difficult to achieve the desired objective of a security program.

  18. What is the most effective method for achieving strategic alignment?

    A. Periodically surveying the management.

    B. Employing an industry-accepted governance framework.

    C. Conducting frequent audits.

    D. Developing enterprise risk management processes.

    Answer: A. Periodically surveying the management.

    Explanation: A survey of the management is the best way to determine whether security supports the business objectives. Achieving strategic alignment means the business process owners and managers believe that information security is effectively supporting their goals. If business management is not confident in security programs, the information security manager should redesign the process to provide value to the business. The other options do not directly indicate the strategic alignment.

  19. What is the objective of aligning information security governance with corporate governance?

    A. To ensure that the security team understands the business objectives.

    B. To comply with regulations.

    C. To maximize the cost-effectiveness of the control.

    D. To reduce the number of rules required for governance.

    Answer: C. To maximize the cost-effectiveness of the control.

    Explanation: The alignment ensures that assurance functions are integrated to maximize the cost-effectiveness. A lack of alignment can result in potentially duplicate or contradictory controls, which negatively impacts cost-effectiveness. The others are secondary factors.

  20. What is the best method for addressing the concerns of senior management about the effectiveness of the existing information security program?

    A. Redesign the program based on industry-recognized standards.

    B. Analyze the cost-benefit of the existing program.

    C. Discuss with senior management to understand their concerns.

    D. Show an approved business case to senior management.

    Answer: C. Discuss with senior management to understand their concerns.

    Explanation: The best method to address the concerns of senior management is to first discuss their concerns to better understand them. Following this, the security program can be redesigned to be more valuable to senior management.

  21. What is the most effective method for obtaining a commitment from senior management for the implementation of the security program?

    A. Discuss industry best practices with senior management.

    B. Discuss various risk scenarios with the process owners.

    C. Discuss a cost-benefit analysis with senior management.

    D. Discuss the relationship between the security program and the business goals.

    Answer: D. Discuss the relationship between the security program and the business goals.

    Explanation: Senior management is keen to protect and achieve the business goals and objectives. If they see value in the project in terms of business support, there will not be any reluctance. The other options can be secondary factors.

  22. What is the most effective method for obtaining a commitment from senior management for the implementation of the security program?

    A. Demonstrate the success of industry peers.

    B. Demonstrate the potential loss and other negative impacts due to lack of support.

    C. Demonstrate regulatory requirements related to security.

    D. Demonstrate support for the desired outcome.

    Answer: D. Demonstrate support for the desired outcome.

    Explanation: Demonstrating the support for the desired outcome is the best approach. This can be done by demonstrating improvement in performance metrics related to business objectives. Senior management is keen to protect and achieve the business goals and objectives. The other options are secondary factors.

  23. What factor has the most influence on the success of an information security strategy?

    A. Its approval from the chief information officer.

    B. Its alignment with the IT plan.

    C. Its alignment with the goals set by the board of directors.

    D. If it is measured by key performance indicators.

    Answer: C. Its alignment with the goals set by the board of directors.

    Explanation: The security strategy is said to be successful if it supports the achievement of goals set up by the board of directors. The other options do not directly influence whether the security program is successful.