CISM 15e Domain1
CISM 15e Domain1
CISM 15e Domain1
PREPARATION
Domain 1:
Domain 4:
Information
Information Security
Security
Incident
Governance, 24%
Management, 19%
Domain 3:
Information Security Domain 2:
Program Information Security
Development and Risk Management,
Management, 27% 30%
Governance Management
Purpose is to set Purpose is plan,
goals build, execute and
Do the right thing monitor activities to
achieve goals
Do the thing right
An effective information
security program:
Supports what the
organization is trying to do
Keeps risk within
acceptable levels
Tracks success and areas
of improvement
Changes with the
organization
GRC is an
integrated
assurance process
Governance
Convergence can
exist independently
across different
business functions
Risk Compliance
Information security
is often a part of
GRC
Overconfidence/Optimism
Anchoring
Status quo bias
Mental accounting
Herding instinct
False consensus
Confirmation bias
Groupthink
Part of
Governance Management
security
tools tools
architecture
Legal
Physical
Ethics
Culture
Costs
Personnel
Organizational structure
Resources
Capabilities
Time
Risk appetite
35 Copyright 2016 ISACA. All rights reserved.
Legal and Regulatory Requirements
Ethics
Perception of the enterprises behavior
Influenced by location and culture
Culture
Internal culture
Local culture
Personnel
Resistance to changes can impact the success of
strategy implementation
Organizational structure
Impacts how a governance strategy can be
implemented
Cooperation is needed
Senior management buy-in helps to ensure
cooperation
Resources
Consider available budgets, TCO and personnel
requirements
Capabilities
Expertise and skills
Time
Deadlines/Windows of opportunity
A framework is a scaffold of
interlinked items
Strategy is the starting
point of the framework
Ensures that information
security is focused on the right
goals
Source: The Open Group; TOGAF, Version 9.1., United Kingdom 2011
A. technology constraints.
B. regulatory requirements.
C. litigation potential.
D. business strategy.
Gaining Management
Support/Approval
Senior management
backing is essential to
success
Information security may
need to educate senior
managers to get them on
board
Use business language,
not technical jargon
Workshops or briefings
can set the stage for
strategy
implementation.
Try to anticipate
issues/concerns
managers already have
Steering committee
Comprised of senior representatives of groups
impacted by information security
Ensures alignment of security program with business
objectives
Common topics:
Security strategy and integration efforts
Specific actions and progress related to business unit
support of information security program functions
Emerging risk, business unit security practices and
compliance issues
Conduct a R A R
gap analysis.
Define the C A C
strategic plan
and road
map.
Communicate I I R R I
the IT
strategy and
direction.
Service providers
Critical vendors
Outsourcing partners
Consumers/members
Information security
may be affected by
contracts.
Directly traceable to
strategy elements
Broad enough to not
require regular revision, but
should be periodically
reviewed
Approved at the highest
level
Pave the way for effective
implementation
Once standards are set, what are some factors that may
determine whether or not they are followed?
Indicators of appropriate
risk management include:
Defined risk appetite and
tolerance
Process for management
of adverse impacts
Trends in periodic risk
assessment and impacts
Completeness of asset
inventory
Ratio of security incidents
from known to unknown
security risks
The success of an
information security
strategy depends on the
behavior of people,
processes and technology.
Section Three
Implementing the Security Strategy Security is dynamic and
regular monitoring and
auditing are needed.
A. risk management.
B. compliance.
C. IT management.
D. governance.
Summary