You are on page 1of 13

Certified Information Security Manager (CISM)

Chapter 1 – Introduction
Slide 1

◆ Defining the CISM


◆ Course Structure

_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 2

◆ Defining the CISM

_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 3

◆ Certified Information Security Manager (CISM)


o Designed for the needs of the Information Security (IS) industry
o Useful to those in positions of Information Security Management roles
o Is designed to be technology/platform agnostic
o Is focused on business and management as well as the legal and financial part of IS

Note: The CISM credential is also accepted as a certification that satisfies DoD 8140/8570 requirements.

_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 4

IT
Governance

Risk
Data security
Assessment

CISM

Compliance Security
Consulting Management

_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 5

◆ Four Domains
o Each domain is weighted differently
◆ Four hours in length
◆ 200 Multiple choice questions
o One correct answer per question
◆ Need a minimum score of 450 out of 800

_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 6

◆ Several additional steps and requirements to attain credential


o Submit test results showing passing score
o Submit proof of experience
• Must have 5 years experience in field
• Can substitute some other credentials in lieu of up to 2 years of work experience
• Check www.isaca.org for updated list of accepted substitutions
◆ Requires $50 processing fee

_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 7

◆ Course Structure

_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 8

CISM
Security
Information Program Incident
IS Governance Risk Management Management
Management and and Response
Development

_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 9

◆ Objective of the CISM


◆ Role of a CISM
◆ Domains Covered

_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Review Questions:
1. Which of the following applies to the CISM? (Choose all that apply)
A. Designed for the needs of the Information Security (IS) industry
B. Useful to those in positions of Information Security Management roles
C. Is designed to be technology/platform agnostic
D. Is focused on business and management as well as the legal and financial
part of IS

2. How many domains make up the CISM?


A. 1
B. 2
C. 3
D. 4

3. True or False: One of the CISM domains is Information Risk Management.


A. True
B. False
Answer Key:
1. A, B, C, D
All of the options given describe the Certified Information Security Manager, or
CISM.

2. D
The CISM is made up of four domains, each of which is weighted differently.

3. A
True. The CISM domains are:
• IS Governance
• Information Risk Management
• Security Program Management and Development
• Incident Management and Response

You might also like