Course Details

Previous Page


CISM: Information Security Governance (Part 1)


Overview/Description
Target Audience
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Information Security Governance is a major part of the job role of an Information Security Manager. The goal of information security governance is to establish and maintain a framework to provide assurance that information security strategies are aligned with the business objectives and consistent with applicable laws and regulations. This course looks at the role of information security governance in an organization, the need for senior management support for all policies and procedures that are put in place, the actual role the information security manager, and the core principles and metrics that are used at part of this process. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2015 ISACA Candidate Information Guide.

Target Audience
Experienced IT security professionals seeking to pass the Certified Information Security Manager (CISM) exam or otherwise gain knowledge in managing, designing, and overseeing an enterprise's information security

Expected Duration (hours)
2.0

Lesson Objectives

CISM: Information Security Governance (Part 1)

  • identify the tasks within the information security governance job practice area
  • recognize the outcomes of information security governance
  • recognize the difference between corporate governance and information security governance
  • match senior management roles with their corresponding responsibilities related to information security governance
  • identify the elements of the information security business model
  • recognize the interconnections between the elements of the information security business model
  • recognize key concepts related to information security governance
  • identify the optimal reporting relationship between senior management and the information security manager
  • label examples of reports about information security according to their intended recipients within an organization
  • identify the goal of converging security-related functions
  • identify categories of key goal indicators
  • recognize key concepts related to information security management
  • Course Number:
    sp_ciso_a01_it_enus