Buy CISM Certified Information Security Manager Study Guide
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer security > CISM Certified Information Security Manager Study Guide: (Sybex Study Guide)
CISM Certified Information Security Manager Study Guide: (Sybex Study Guide)

CISM Certified Information Security Manager Study Guide: (Sybex Study Guide)


     4.4  |  7 Reviews 
5
4
3
2
1



Available


X
About the Book

Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide As cybersecurity becomes an increasingly mission-critical issue, more and more employers and professionals are turning to ISACA's trusted and recognized Certified Information Security Manager qualification as a tried-and-true indicator of information security management expertise. In Wiley's Certified Information Security Manager (CISM) Study Guide, you'll get the information you need to succeed on the demanding CISM exam. You'll also develop the IT security skills and confidence you need to prove yourself where it really counts: on the job. Chapters are organized intuitively and by exam objective so you can easily keep track of what you've covered and what you still need to study. You'll also get access to a pre-assessment, so you can find out where you stand before you take your studies further. Sharpen your skills with Exam Essentials and chapter review questions with detailed explanations in all four of the CISM exam domains: Information Security Governance, Information Security Risk Management, Information Security Program, and Incident Management. In this essential resource, you'll also: Grab a head start to an in-demand certification used across the information security industry Expand your career opportunities to include rewarding and challenging new roles only accessible to those with a CISM credential Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Perfect for anyone prepping for the challenging CISM exam or looking for a new role in the information security field, the Certified Information Security Manager (CISM) Study Guide is an indispensable resource that will put you on the fast track to success on the test and in your next job.

Table of Contents:
Introduction Assessment Test xxi Chapter 1 Today’s Information Security Manager 1 Information Security Objectives 2 Role of the Information Security Manager 3 Chief Information Security Officer 4 Lines of Authority 4 Organizing the Security Team 5 Roles and Responsibilities 7 Information Security Risks 8 The DAD Triad 8 Incident Impact 9 Building an Information Security Strategy 12 Threat Research 12 SWOT Analysis 13 Gap Analysis 13 Creating SMART Goals 16 Alignment with Business Strategy 16 Leadership Support 17 Internal and External Influences 17 Cybersecurity Responsibilities 18 Communication 19 Action Plans 19 Implementing Security Controls 20 Security Control Categories 21 Security Control Types 21 Data Protection 23 Summary 25 Exam Essentials 25 Review Questions 27 Chapter 2 Information Security Governance and Compliance 31 Governance 33 Corporate Governance 33 Governance, Risk, and Compliance Programs 35 Information Security Governance 35 Developing Business Cases 36 Third- Party Relationships 37 Understanding Policy Documents 38 Policies 38 Standards 40 Procedures 42 Guidelines 43 Exceptions and Compensating Controls 44 Developing Policies 45 Complying with Laws and Regulations 46 Adopting Standard Frameworks 47 Cobit 47 NIST Cybersecurity Framework 49 NIST Risk Management Framework 52 ISO Standards 53 Benchmarks and Secure Configuration Guides 54 Security Control Verification and Quality Control 56 Summary 57 Exam Essentials 57 Review Questions 59 Chapter 3 Information Risk Management 63 Analyzing Risk 65 Risk Identification 66 Risk Calculation 67 Risk Assessment 68 Risk Treatment and Response 72 Risk Mitigation 73 Risk Avoidance 74 Risk Transference 74 Risk Acceptance 75 Risk Analysis 75 Disaster Recovery Planning 78 Disaster Types 78 Business Impact Analysis 79 Privacy 79 Sensitive Information Inventory 80 Information Classification 80 Data Roles and Responsibilities 82 Information Lifecycle 83 Privacy- Enhancing Technologies 83 Privacy and Data Breach Notification 84 Summary 84 Exam Essentials 85 Review Questions 86 Chapter 4 Cybersecurity Threats 91 Chapter 5 Exploring Cybersecurity Threats 92 Classifying Cybersecurity Threats 92 Threat Actors 94 Threat Vectors 99 Threat Data and Intelligence 101 Open Source Intelligence 101 Proprietary and Closed Source Intelligence 104 Assessing Threat Intelligence 105 Threat Indicator Management and Exchange 107 Public and Private Information Sharing Centers 108 Conducting Your Own Research 108 Summary 109 Exam Essentials 109 Review Questions 111 Information Security Program Development and Management 115 Information Security Programs 117 Establishing a New Program 117 Maintaining an Existing Program 121 Security Awareness and Training 123 User Training 123 Role- Based Training 124 Ongoing Awareness Efforts 124 Managing the Information Security Team 125 Hiring Team Members 126 Developing the Security Team 126 Managing the Security Budget 127 Organizational Budgeting 127 Fiscal Years 127 Expense Types 128 Budget Monitoring 129 Integrating Security with Other Business Functions 130 Procurement 130 Accounting 133 Human Resources 133 Information Technology 135 Audit 138 Summary 139 Exam Essentials 139 Review Questions 141 Chapter 6 Security Assessment and Testing 145 Vulnerability Management 146 Identifying Scan Targets 146 Determining Scan Frequency 148 Configuring Vulnerability Scans 149 Scanner Maintenance 154 Vulnerability Scanning Tools 155 Reviewing and Interpreting Scan Reports 159 Validating Scan Results 160 Security Vulnerabilities 161 Patch Management 162 Legacy Platforms 163 Weak Configurations 164 Error Messages 164 Insecure Protocols 165 Weak Encryption 166 Penetration Testing 167 Adopting the Hacker Mindset 168 Reasons for Penetration Testing 169 Benefits of Penetration Testing 169 Penetration Test Types 170 Rules of Engagement 171 Reconnaissance 173 Running the Test 173 Cleaning Up 174 Training and Exercises 174 Summary 175 Exam Essentials 176 Review Questions 177 Chapter 7 Cybersecurity Technology 181 Endpoint Security 182 Malware Prevention 183 Endpoint Detection and Response 183 Data Loss Prevention 184 Change and Configuration Management 185 Patch Management 185 System Hardening 185 Network Security 186 Network Segmentation 186 Network Device Security 188 Network Security Tools 191 Cloud Computing Security 195 Benefits of the Cloud 196 Cloud Roles 198 Cloud Service Models 198 Cloud Deployment Models 202 Shared Responsibility Model 204 Cloud Standards and Guidelines 207 Cloud Security Issues 208 Cloud Security Controls 210 Cryptography 212 Goals of Cryptography 212 Symmetric Key Algorithms 214 Asymmetric Cryptography 215 Hash Functions 217 Digital Signatures 218 Digital Certificates 219 Certificate Generation and Destruction 220 Code Security 223 Software Development Life Cycle 223 Software Development Phases 224 Software Development Models 226 DevSecOps and DevOps 229 Code Review 230 Software Security Testing 232 Identity and Access Management 234 Identification, Authentication, and Authorization 234 Authentication Techniques 235 Authentication Errors 237 Single- Sign On and Federation 238 Provisioning and Deprovisioning 238 Account Monitoring 239 Summary 240 Exam Essentials 241 Review Questions 244 Chapter 8 Incident Response 249 Security Incidents 251 Phases of Incident Response 252 Preparation 253 Detection and Analysis 254 Containment, Eradication, and Recovery 255 Post- Incident Activity 267 Building the Incident Response Plan 269 Policy 269 Procedures and Playbooks 270 Documenting the Incident Response Plan 270 Creating an Incident Response Team 272 Incident Response Providers 273 CSIRT Scope of Control 273 Coordination and Information Sharing 273 Internal Communications 274 External Communications 274 Classifying Incidents 274 Threat Classification 275 Severity Classification 276 Conducting Investigations 279 Investigation Types 279 Evidence 282 Plan Training, Testing, and Evaluation 288 Summary 289 Exam Essentials 290 Review Questions 292 Chapter 9 Business Continuity and Disaster Recovery 297 Planning for Business Continuity 298 Project Scope and Planning 299 Organizational Review 300 BCP Team Selection 301 Resource Requirements 302 Legal and Regulatory Requirements 303 Business Impact Analysis 304 Identifying Priorities 305 Risk Identification 306 Likelihood Assessment 308 Impact Analysis 309 Resource Prioritization 310 Continuity Planning 310 Strategy Development 311 Provisions and Processes 311 Plan Approval and Implementation 313 Plan Approval 313 Plan Implementation 314 Training and Education 314 BCP Documentation 314 The Nature of Disaster 318 Natural Disasters 319 Human- Made Disasters 324 System Resilience, High Availability, and Fault Tolerance 327 Protecting Hard Drives 328 Protecting Servers 329 Protecting Power Sources 331 Recovery Strategy 331 Business Unit and Functional Priorities 332 Crisis Management 333 Emergency Communications 334 Workgroup Recovery 334 Alternate Processing Sites 334 Database Recovery 338 Recovery Plan Development 340 Emergency Response 341 Personnel and Communications 341 Assessment 342 Backups and Offsite Storage 342 Utilities 345 Logistics and Supplies 345 Training, Awareness, and Documentation 345 Testing and Maintenance 346 Read- Through Test 346 Structured Walk- Through 346 Simulation Test 347 Parallel Test 347 Full- Interruption Test 347 Lessons Learned 347 Maintenance 348 Summary 349 Exam Essentials 349 Review Questions 351 Appendix Answers to the Review Questions 357 Chapter 1: Today’s Information Security Manager 358 Chapter 2: Information Security Governance and Compliance 360 Chapter 3: Information Risk Management 362 Chapter 4: Cybersecurity Threats 363 Chapter 5: Information Security Program Development and Management 365 Chapter 6: Security Assessment and Testing 368 Chapter 7: Cybersecurity Technology 370 Chapter 8: Incident Response 372 Chapter 9: Business Continuity and Disaster Recovery 374 Index 377

About the Author :
ABOUT THE AUTHOR MIKE CHAPPLE, PhD, CISM, is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame’s Mendoza College of Business. He is a bestselling author of over 25 books and serves as the Academic Director of the University’s Master of Science in Business Analytics program. He holds multiple additional certifications, including the CISSP (Certified Information Systems Security Professional), CySA+ (CompTIA Cybersecurity Analyst), CIPP/US (Certified Information Privacy Professional), CompTIA PenTest+, and CompTIA Security+. Mike provides cybersecurity certification resources at his website, CertMike.com


Best Sellers


Product Details
  • ISBN-13: 9781119801931
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Sybex Inc.,U.S.
  • Height: 231 mm
  • No of Pages: 432
  • Returnable: N
  • Spine Width: 23 mm
  • Width: 188 mm
  • ISBN-10: 1119801931
  • Publisher Date: 14 Jul 2022
  • Binding: Paperback
  • Language: English
  • Returnable: N
  • Series Title: Sybex Study Guide
  • Weight: 846 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

     4.4  |  7 Reviews 
out of (%) reviewers recommend this product
Top Reviews
Rating Snapshot
Select a row below to filter reviews.
5
4
3
2
1
Average Customer Ratings
     4.4  |  7 Reviews 
00 of 0 Reviews
Sort by :
Active Filters

00 of 0 Reviews
SEARCH RESULTS
1–2 of 2 Reviews
    BoxerLover2 - 5 Days ago
    A Thrilling But Totally Believable Murder Mystery

    Read this in one evening. I had planned to do other things with my day, but it was impossible to put down. Every time I tried, I was drawn back to it in less than 5 minutes. I sobbed my eyes out the entire last 100 pages. Highly recommend!

    BoxerLover2 - 5 Days ago
    A Thrilling But Totally Believable Murder Mystery

    Read this in one evening. I had planned to do other things with my day, but it was impossible to put down. Every time I tried, I was drawn back to it in less than 5 minutes. I sobbed my eyes out the entire last 100 pages. Highly recommend!


Sample text
Photo of
    Media Viewer

    Sample text
    Reviews
    Reader Type:
    BoxerLover2
    00 of 0 review

    Your review was submitted!
    CISM Certified Information Security Manager Study Guide: (Sybex Study Guide)
    John Wiley & Sons Inc -
    CISM Certified Information Security Manager Study Guide: (Sybex Study Guide)
    Writing guidlines
    We want to publish your review, so please:
    • keep your review on the product. Review's that defame author's character will be rejected.
    • Keep your review focused on the product.
    • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
    • Refrain from mentioning competitors or the specific price you paid for the product.
    • Do not include any personally identifiable information, such as full names.

    CISM Certified Information Security Manager Study Guide: (Sybex Study Guide)

    Required fields are marked with *

    Review Title*
    Review
      Add Photo Add up to 6 photos
      Would you recommend this product to a friend?
      Tag this Book Read more
      Does your review contain spoilers?
      What type of reader best describes you?
      I agree to the terms & conditions
      You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

      CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

      These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


      By submitting any content to Bookswagon, you guarantee that:
      • You are the sole author and owner of the intellectual property rights in the content;
      • All "moral rights" that you may have in such content have been voluntarily waived by you;
      • All content that you post is accurate;
      • You are at least 13 years old;
      • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
      You further agree that you may not submit any content:
      • That is known by you to be false, inaccurate or misleading;
      • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
      • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
      • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
      • For which you were compensated or granted any consideration by any unapproved third party;
      • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
      • That contains any computer viruses, worms or other potentially damaging computer programs or files.
      You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


      For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


      All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

      Accept


      Inspired by your browsing history


      Your review has been submitted!

      You've already reviewed this product!