Book Image

Certified Information Security Manager (CISM) [Video]

By : ACI Learning, Adam Gordon, Chris Ward
Book Image

Certified Information Security Manager (CISM) [Video]

By: ACI Learning, Adam Gordon, Chris Ward

Overview of this book

Certified Information Security Manager (CISM) certification is the pinnacle for individuals aspiring to excel in Information Security Management. This course empowers you to showcase your expertise in security practices and validates your knowledge in this critical domain. In this comprehensive course, embark on a journey through four key sections: Information Security Governance, Risk Management, Information Security Program Development, and Incident Management. Uncover essential strategies, frameworks, and techniques encompassing governance principles, risk assessment methodologies, security program construction, and incident handling practices. Explore how to integrate security requirements seamlessly into IT operations, align strategies with business objectives, and effectively manage and mitigate incidents. Understanding these domains isn't just about passing the CISM exam; it's about gaining expertise to excel in today's cybersecurity landscape. Delve into regulatory impacts, risk assessment methodologies, security policy development, and incident response strategies. Equip yourself to align security programs with business objectives, analyze emerging threats, and navigate incident categorization and post-incident reviews.
Table of Contents (4 chapters)
Chapter 3
Information Security Program
Content Locked
Section 5
Information Security Policies Procedures and Guidelines
In this episode, we will be discussing the steps necessary to establish, communicate, and maintain organizational information security policies, standards, guidelines, procedures, and other documentation. After watching this episode, you will be able to plan for and address areas of concern related to establishing communicating, and maintaining organizational information security policies, standards, guidelines, procedures, and other documentation and integrate them into your daily practice as an information technology and security professional.