Book Image

Certified Information Security Manager (CISM) [Video]

By : ACI Learning, Adam Gordon, Chris Ward
Book Image

Certified Information Security Manager (CISM) [Video]

By: ACI Learning, Adam Gordon, Chris Ward

Overview of this book

Certified Information Security Manager (CISM) certification is the pinnacle for individuals aspiring to excel in Information Security Management. This course empowers you to showcase your expertise in security practices and validates your knowledge in this critical domain. In this comprehensive course, embark on a journey through four key sections: Information Security Governance, Risk Management, Information Security Program Development, and Incident Management. Uncover essential strategies, frameworks, and techniques encompassing governance principles, risk assessment methodologies, security program construction, and incident handling practices. Explore how to integrate security requirements seamlessly into IT operations, align strategies with business objectives, and effectively manage and mitigate incidents. Understanding these domains isn't just about passing the CISM exam; it's about gaining expertise to excel in today's cybersecurity landscape. Delve into regulatory impacts, risk assessment methodologies, security policy development, and incident response strategies. Equip yourself to align security programs with business objectives, analyze emerging threats, and navigate incident categorization and post-incident reviews.
Table of Contents (4 chapters)
Chapter 3
Information Security Program
Content Locked
Section 8
Control Implementation Integration Testing and Evaluation
In this episode, we will be discussing the steps necessary to establish and/or maintain the information security program in alignment with the information security strategy. After watching this episode, you will be able to plan for and address areas of concern related to establishing and/or maintaining the information security program in alignment with the information security strategy and integrate them into your daily practice as an information technology and security professional.