Home Page Icon
Home Page
Table of Contents for
Title Page
Close
Title Page
by Peter H. Gregory
CISM Certified Information Security Manager All-in-One Exam Guide
Cover
Title Page
Copyright Page
Dedication
Contents at a Glance
Contents
Acknowledgments
Introduction
Chapter 1 Becoming a CISM
Benefits of CISM Certification
Becoming a CISM Professional
Experience Requirements
ISACA Code of Professional Ethics
The Certification Exam
Exam Preparation
Before the Exam
Day of the Exam
After the Exam
Applying for CISM Certification
Retaining Your CISM Certification
Continuing Education
CPE Maintenance Fees
Revocation of Certification
Summary
Chapter 2 Information Security Governance
Introduction to Information Security Governance
Reason for Security Governance
Security Governance Activities and Results
Business Alignment
Roles and Responsibilities
Monitoring Responsibilities
Information Security Governance Metrics
The Security Balanced Scorecard
Business Model for Information Security
Security Strategy Development
Strategy Objectives
Control Frameworks
Risk Objectives
Strategy Resources
Strategy Development
Strategy Constraints
Chapter Review
Notes
Questions
Answers
Chapter 3 Information Risk Management
Risk Management Concepts
The Importance of Risk Management
Outcomes of Risk Management
Risk Management Technologies
Implementing a Risk Management Program
Risk Management Strategy
Risk Management Frameworks
Risk Management Context
Gap Analyses
External Support
The Risk Management Life Cycle
The Risk Management Process
Risk Management Methodologies
Asset Identification and Valuation
Asset Classification
Asset Valuation
Threat Identification
Vulnerability Identification
Risk Identification
Risk, Likelihood, and Impact
Risk Analysis Techniques and Considerations
Operational Risk Management
Risk Management Objectives
Risk Management and Business Continuity Planning
Third-Party Risk Management
The Risk Register
Integration of Risk Management into Other Processes
Risk Monitoring and Reporting
Key Risk Indicators
Training and Awareness
Risk Documentation
Chapter Review
Notes
Questions
Answers
Chapter 4 Information Security Program Development and Management
Information Security Programs
Outcomes
Charter
Scope
Information Security Management Frameworks
Defining a Road Map
Information Security Architecture
Security Program Management
Security Governance
Risk Management
The Risk Management Program
The Risk Management Process
Risk Treatment
Audits and Reviews
Policy Development
Third-Party Risk Management
Administrative Activities
Security Program Operations
Event Monitoring
Vulnerability Management
Secure Engineering and Development
Network Protection
Endpoint Protection and Management
Identity and Access Management
Security Incident Management
Security Awareness Training
Managed Security Services Providers
Data Security
Business Continuity Planning
IT Service Management
Service Desk
Incident Management
Problem Management
Change Management
Configuration Management
Release Management
Service-Level Management
Financial Management
Capacity Management
Service Continuity Management
Availability Management
Asset Management
Controls
Control Classification
Internal Control Objectives
Information Systems Control Objectives
General Computing Controls
Control Frameworks
Controls Development
Control Assessment
Metrics and Monitoring
Types of Metrics
Audiences
Continuous Improvement
Chapter Review
Notes
Questions
Answers
Chapter 5 Information Security Incident Management
Security Incident Response Overview
Phases of Incident Response
Incident Response Plan Development
Objectives
Maturity
Resources
Roles and Responsibilities
Gap Analysis
Plan Development
Responding to Security Incidents
Detection
Initiation
Evaluation
Eradication
Recovery
Remediation
Closure
Post-incident Review
Business Continuity and Disaster Recovery Planning
Business Continuity Planning
Disaster Recovery Planning
Testing BC and DR Plans
Chapter Review
Notes
Questions
Answers
Appendix About the Download
System Requirements
Installing and Running Total Tester
About Total Tester
Technical Support
Glossary
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
CISM Certified Information Security Manager All-in-One Exam Guide
Next
Next Chapter
Copyright Page
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset