CISM Cert Prep: 1 Information Security Governance

CISM Cert Prep: 1 Information Security Governance

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 50m | 232 MB

Prepare for the first domain of the Certified Information Security Manager (CISM) exam: Information Security Governance. CISM certification validates your expertise in information security. A key part of that is governance, which ensures your team’s work is aligned with business objectives and external requirements. This course covers all the material in the domain, including implementing an information security strategy, developing a governance framework, and integrating that framework into corporate governance practices. Instructor Mike Chapple also covers developing policies, business cases, and other key components of a security governance program.

Topics include:

  • Designing an information security strategy
  • Aligning security with the business
  • Security roles and responsibilities
  • Security standards
  • Budgeting for security
  • Governance
  • Policies
  • Data security
  • Obtaining leadership support
  • Assessing security programs
  • Security principles
Table of Contents

Introduction
1 Information security governance
2 What you need to know

Information Security Strategy
3 The goals of information security
4 Designing an information security strategy
5 Aligning security with the business
6 Strategic influences
7 Organizational processes
8 Security roles and responsibilities

Industry Standards
9 Control frameworks
10 Developing security baselines
11 Leveraging industry standards
12 Customizing security standards

Security Budgeting
13 Developing a security budget
14 Capital vs. operational expenses
15 Budget monitoring and reporting

Security Governance
16 Information security governance
17 Security governance frameworks

Security Policies
18 Security policy framework
19 Security policies

Data Security
20 Understanding data security
21 Data security policies
22 Data security roles
23 Data privacy
24 Limiting data collection
25 Privileged account management

Navigating the Organization
26 Organizational structure
27 Obtaining leadership support

Assessing Security Programs
28 Collecting security process data
29 Management review and approval
30 Security metrics
31 Audits and assessments
32 Control management

Security Principles
33 Need to know and least privilege
34 Separation of duties and responsibilities

Conclusion
35 What s next