Detailed Course Outline
- Introduction
- Welcome
- Agenda
- CISM
- CISM Exam Review Course Overview
- CISM Qualifications
- The Learning Environment
- Daily Format
- Domain Structure
- Course Structure
- Logistics
- Information Security Governance
- Course Agenda
- Examination Content
- Chapter 1 Learning Objectives
- The First Question
- Information Security Governance Overview
- Selling the Importance of Information Security
- The First Priority for the CISM
- Business Goals and Objectives
- Outcomes of Information Security Governance
- Benefits of Information Security Governance
- Performance and Governance
- Information Security Strategy
- Developing Information Security Strategy
- Elements of a Strategy
- Objectives of Security Strategy
- The Goal of Information Security
- Defining Security Objectives
- Business Linkages
- Business Case Development
- The Information Security Program
- Security Program Priorities
- Security versus Business
- Security Program Objectives
- What is Security?
- Security Integration
- Security Program
- Architecture
- Information Security Frameworks
- Using an Information Security Framework
- The Desired State of Security
- The Desired State cont.
- The Maturity of the Security Program Using
- CMM Using the Balanced Scorecard
- The ISO27001:2013 Framework
- Examples of Other Security Frameworks
- Examples of Other Security Frameworks
- Constraints and Considerations for a Security
- Program
- Constraints and Considerations for a Security
- Program cont.
- Elements of Risk and Security
- Risk Management
- Information Security
- Concepts
- Information Security Concepts cont.
- Security Program Elements
- Security Program Elements cont.
- Third Party Agreements
- Roles and Responsibilities of Senior
- Management
- Senior Management Commitment
- Steering Committee
- CISO Chief Information Security Officer
- Responsibilities
- Business Manager Responsibilities
- IT Staff Responsibilities
- Centralized versus Decentralized Security
- Evaluating the Security Program
- Audit and Assurance of Security
- Evaluating the Security Program
- Effective Security Metrics
- Effective Security Metrics cont.
- Key Performance Indicators (KPIs)
- End to End Security
- Correlation Tools
- Reporting and Compliance
- Regulations and Standards
- Effect of Regulations
- Reporting and Analysis
- Ethics
- Ethical Standards
- Ethical Responsibility
- Practice Questions
- Information Risk Management and Compliance
- Exam Relevance
- Information Asset Classification
- Roles and Responsibilities
- Information Classification Considerations
- Regulations and Legislation
- Asset Valuation
- Valuation Process
- Information Protection
- Information Asset Protection
- Definition of Risk
- Why is Risk Important
- Risk Management Definition
- Risk Management Objective
- Risk Management Overview
- Risk Management Overview
- Defining the Risk Environment
- Threats to Information and Information Systems
- Threat Analysis
- Aggregate Risk
- Cascading Risk
- Identification of Vulnerabilities
- The Effect of Risk
- Impact
- Impact cont.
- Risk Management Process
- Risk Assessment Methodology
- Annualized Loss Expectancy (ALE)
- Qualitative Risk Assessment
- Data Gathering Techniques
- Results of Risk Assessment
- Alignment of Risk Assessment and BIA
- Risk Treatment
- Risk Treatment
- Risk Mitigation and Controls
- Control Recommendations
- Cost Benefit Analysis of Controls
- Cost Benefit Analysis of Controls cont.
- Risk Mitigation Schematic
- Control Types and Categories
- Control Types and Categories cont.
- Security Control Baselines
- Ongoing Risk Assessment
- Measuring Control Effectiveness
- Building Risk Management In (Agenda)
- Risk Related to Change Control
- Controlling Risk in Change Control
- Risk Management During SDLC
- Ongoing Risk Management Monitoring and Analysis
- Audit and Risk Management
- Audit and Risk Management cont.
- Risk in Business Process Re-Engineering
- Risk in Project Management
- Risk During Employment Process
- New Employee Initiation
- Risk During Employment
- Risk at Termination of Employment
- Risks During Procurement
- Risk
- During Procurement cont.
- Reporting to Management
- Documentation
- Training and Awareness
- Training and Awareness
- Training for End Users
- Practice Questions
- Information Security Program Development and Management
- Course Agenda
- Exam Relevance
- Learning Objectives cont.
- Definition
- Security Strategy and Program Relationship
- Information Security Management
- Importance of Security Management
- Definition
- Effective Security Management
- Reasons for Security
- Program Failure Program Objectives
- Security Program Development
- Security Program Development cont.
- Outcomes of Information Security Program
- Development
- Governance of the Security Program
- Role of the Information Security Manager
- (Agenda)
- Strategy
- Policy
- Creating Effective Policy
- Awareness
- Implementation
- Monitoring
- Compliance
- Developing an Information Security Road Map
- Defining Security Program Objectives
- Inventory of Information Systems
- Challenges in Developing an Information
- Security Program
- Challenges in Developing an Information Security Program cont.
- Elements of a Security Program Road Map
- Security Programs and Projects
- Security Program and Project Development
- Security Project Planning
- Selection of Controls
- Common Control Practices
- Security Program Elements (Agenda)
- Policies
- Acceptable Use Policy
- Acceptable Use Policy cont.
- Standards
- Procedures
- Guidelines
- Technology
- Personnel Security
- Training and Skills Matrix
- Organizational Structure Outsourced Security Providers
- Third-party Service Providers
- Facilities
- Facilities Security
- Environmental Security
- Information Security Concepts (Agenda)
- Access Control
- Identification
- Authentication
- Authorization Accounting / Auditability
- Criticality
- Sensitivity
- Trust Models
- Technology-based Security
- Technologies
- Security in Technical Components
- Operations Security
- Technologies –Access Control Lists
- Filtering and Content Management
- Technologies -SPAM
- Technologies –Databases and DBMS Encryption
- Technologies -Cryptography
- Technologies –Cryptography cont.
- Technologies –Encryption cont.
- Technologies –Hashing Algorithms
- Technology –Communications OSI Model
- Technology –Communications TCP/IP
- Technologies –Operating Systems
- Technology -Firewalls Emerging
- Technologies Intrusion Detection Policies and Processes Intrusion Detection Systems
- IDS / IPS
- Password Cracking
- Vulnerability Assessments
- Penetration Testing
- Penetration Testing cont.
- Third Party Security Reviews
- Integration into Life Cycle Processes
- Security in External Agreements
- Security Program Implementation
- Phased Approach
- Challenges During Implementation
- Evaluating the Security Program
- Evaluating Security Program cont.
- Evaluating the Security Program cont.
- Measuring Information Security Risk and Loss
- Measuring Effectiveness of Technical Security
- Program
- Measuring Effectiveness of Security Management
- Security Project Management
- Review of Security Compliance
- Practice Questions
- Information Security Incident Management
- Learning Objectives
- Definition
- Goals of Incident Management and Response
- Goals of Incident Response cont.
- What is an Incident -Intentional
- What is an Incident -Unintentional
- History of Incidents
- Developing Response and Recovery Plans
- Incident Management and Response
- Incident Management and Response cont.
- Importance of Incident Management and Response
- Incident Response Functions
- Incident Response Manager Responsibilities
- Incident Response Manager Responsibilities cont.
- Requirements for Incident Response Managers
- Senior Management Involvement
- The Desired State
- Strategic Alignment of Incident Response
- Detailed Plan of Action for Incident Management
- Detailed Plan of Action for Incident Management -Prepare
- Detailed Plan of Action for Incident Management –Prepare cont.
- Detailed Plan of Action for Incident Management -Protect
- Detailed Plan of Action for Incident Management –Detect
- Detailed Plan of Action for Incident Management -Triage
- Detailed Plan of Action for Incident Management -Response
- Elements of an Incident Response Plan
- Crisis Communications
- Challenges in Developing an Incident
- Management Plan
- Testing Response and Recovery Plans
- Types of Tests
- Test Results
- Test Results cont.
- Plan Maintenance Activities
- BCP and DRP Training
- Practice Questions
- Personnel
- Personnel cont.
- Team Member
- Skills
- Skills cont.
- Security Concepts and Technologies
- Organizing, Training and Equipping the
- Response Staff
- Value Delivery
- Performance Measurement
- Reviewing the Current State of Incident
- Response Capability
- Audits
- Gap Analysis –Basis for an Incident Response Plan
- When an Incident Occurs
- During an Incident
- During an Incident cont.
- Containment Strategies
- The Battle Box
- Evidence Identification and Preservation
- Post Event Reviews
- Disaster Recovery Planning (DRP) and
- Business Recovery Processes
- Development of BCP and DRP
- Plan Development
- Plan Development cont.
- Recovery Strategies
- Basis for Recovery Strategy Selections
- Disaster Recovery Sites
- Disaster Recovery Sites cont.
- Recovery of Communications
- Notification Requirements
- Notification Requirements cont.
- Response Teams