CISM - Certified Information Security Manager

IPE provide globally recognized CISM certification courses. The CISM is a certification offered by ISACA that validates your skills and knowledge in managing information teams. The CISM certification training included extensive research papers, video-recorded sessions of classes for later viewing, and more. The Certified Information Security Manager, CISM Training from Mercury Solutions is one of the most popular credentials for IS/IT Audit Managers which provides a higher earning potential to professionals being an advanced learning course into Security Management. Also, a product by ISACA, the CISM Live Online course is developed to impart training to individuals in international security practices, also equipping them to design, manage and control the information security of an enterprise. CISM course certification demonstrates the ability of an individual to develop and manage an entire information security program, on understanding the business goals and objectives.CISM certification sets your profile apart from the peers and distinguishes your competency in information security expertise as well as in the development and management of an information security program. CISM Live Online Training from Mercury Solutions will put your profile in an elite peer network. You get hands-on skills, knowledge, and expert advice from veteran trainers in an engaging platform ensuring you the CISM Certification. CISM course is considered essential to ongoing learning processes, career progression, and value delivery to enterprises. Domain 1:Information Security Governance: Establish and maintain the information security governance framework and supporting processes. This ensures the information security strategy aligned with organizational objectives and goals. • Task Statements: Establish and/or maintain an information security strategy in alignment with organizational goals and objectives to guide the establishment and/or ongoing management of the information security program. Establish and/or maintain an information security governance framework to guide activities that support the information security strategy. Integrate information security governance into corporate governance to ensure that organizational goals and objectives are supported by the information security program. Establish and maintain information security policies to guide the development of standards, procedures, and guidelines in alignment with enterprise goals and objectives. Develop business cases to support investments in information security. Identify internal and external influences to the organization to ensure that these factors are continually addressed by the information security strategy. Gain ongoing commitment from senior leadership and other stakeholders to support the successful implementation of the information security strategy. Define, communicate, and monitor information security responsibilities throughout the organization and lines of authority. Establish, monitor, evaluate and report key information security metrics to provide management with accurate and meaningful information regarding the effectiveness of the information security strategy. Domain 2: Information Risk Management Manage the information risk based on the risk appetite so as to meet the goals and objectives of the organization. • Task Statements Establish and/or maintain a process for information asset classification to ensure that measures taken to protect assets are proportional to their business value. Identify legal, regulatory, organizational, and other applicable requirements to manage the risk of noncompliance to acceptable levels. Ensure that risk assessment, vulnerability assessments, and threat analyses are conducted consistently, at appropriate times, and to identify and assess the risk to the organization’s information. Identify, recommend or implement appropriate risk treatment/response options to manage risk to acceptable levels based on organizational risk appetite. Determine whether information security controls are appropriate and effectively manage risk to an acceptable level. Facilitate the integration of information risk management into business and IT processes to enable a consistent and comprehensive information risk management program across the organization. Monitor for internal and external factors that may require the reassessment of risk to ensure that changes to existing, or new, risk scenarios are identified and managed appropriately. Report noncompliance and other changes in information risk to facilitate the risk management decision-making process. Ensure that information security risk is reported to senior management to support an understanding of the potential impact on the organizational goals and objectives. Domain 3:Information Security Program Development and Management Develop and maintain the information security program which identifies, manages, and protects the assets to align the information security strategy and the business goals. Thus, it supports an effective security posture • Task Statements Establish and/or maintain the information security program in alignment with the information security strategy. Align the information security program with the operational objectives of other business functions to ensure that the information security program adds value to and protects the business. Identify, acquire and manage requirements for internal and external resources to execute the information security program. Establish and maintain information security processes and resources to execute the information security program in alignment with the organization’s business goals. Establish, communicate and maintain organizational information security standards, guidelines, procedures, and other documentation to guide and enforce compliance with information security policies. Establish, promote and maintain a program for information security awareness and training to foster an effective security culture. Integrate information security requirements into organizational processes to maintain the organization’s security strategy. Integrate information security requirements into contracts and activities of third parties and monitor adherence to established requirements in order to maintain the organization’s security strategy. Establish, monitor, and analyze program management and operational metrics to evaluate the effectiveness and efficiency of the information security program. Compile and present reports to key stakeholders on the activities, trends, and overall effectiveness of the IS program and the underlying business processes in order to communicate security performance. Domain 4: Information Security Incident Management Plan, establish, and manage the ability to detect, investigate, respond to and recover from the information security incidents so as to minimize the impact of the business • Task Statements Establish and maintain an organizational definition of, and severity hierarchy for, information security incidents to allow accurate classification and categorization of and response to incidents. Establish and maintain an incident response plan to ensure an effective and timely response to information security incidents. Develop and implement processes to ensure the timely identification of information security incidents that could impact the business. Establish and maintain processes to investigate and document information security incidents in order to determine the appropriate response and cause while adhering to legal, regulatory, and organizational requirements. Establish and maintain incident notification and escalation processes to ensure that the appropriate stakeholders are involved in incident response management. Organize, train, and equip incident response teams to respond to information security incidents in an effective and timely manner. Test, review and revise the incident response plan periodically to ensure an effective response to information security incidents and to improve response capabilities. Establish and maintain communication plans and processes to manage communication with internal and external entities. Conduct post-incident reviews to determine the root cause of information security incidents, develop corrective actions, reassess risk, evaluate response effectiveness and take appropriate remedial actions. Establish and maintain integration of the incident response plan, business continuity plan, and disaster recovery plan. Knowledge Statement

Key features of this CISM - Certified Information Security Manager Training

- Earn CISM - Certified Information Security Manager certification online or in class

- A Guide to CISM - Certified Information Security Manager book included

- Exam included

- Take2 exam re-sit included (eligible on public events starting after April 1, 2021)

- After-course instructor coaching included

You Will Learn How To:

- Understand why organizations need to create a culture of enterprise agility in response to a changing context

- Start to think and work differently to enable change

- Apply the key concepts of the CISM - Certified Information Security Manager framework and delivery approac- h

Choose the Training Solution That Best Fits Your Individual
Needs or Organisational Goals

LIVE, INSTRUCTOR-LED

    icon

    In Class & Live, Online Training

    - 2-day instructor-led training course

    - Earn 12 PMI PDUs

    - One-on-one after-course instructor
    coaching

    - Tuition can be paid later by invoice -OR-
    at the time of checkout by credit card

    View Course Details
    & Schedule

    Standard $1950 USD
    Government $1532 USD

    Reserve Seat
TRAINING AT YOUR SITE

    icon

    Team Training

    - Bring this or any training to your
    organization

    - Full - scale program development

    - Delivered when, where, and how you
    want it

    - Tailored content

    - Expert team coaching

    Customize Your Team Training Experience

    Contact Us

Save More On Training with FlexVouchers – A Unique Training Savings Account

Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live

Time Zone Legend:

Eastern Time Zone Central Time Zone Mountain Time Zone Pacific Time

Note: This course runs for 1 Month

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured
that your course event — date, time — will run. Guaranteed.

CISM - Certified Information Security Manager Training Information

CISM - Certified Information Security Manager Training Outline

CISM - Certified Information Security Manager FAQs

Institute of Professional Excellence inc. All tradeMarks are owned by their respective owners. Click here for details