Acknowledgments |
|
xv | |
Introduction |
|
xvii | |
|
|
1 | (16) |
|
Benefits of CISM Certification |
|
|
2 | (1) |
|
Becoming a CISM Professional |
|
|
3 | (4) |
|
|
4 | (3) |
|
ISACA Code of Professional Ethics |
|
|
7 | (1) |
|
|
7 | (2) |
|
|
9 | (3) |
|
|
9 | (2) |
|
|
11 | (1) |
|
|
12 | (1) |
|
Applying for CISM Certification |
|
|
12 | (1) |
|
Retaining Your CISM Certification |
|
|
13 | (2) |
|
|
13 | (2) |
|
|
15 | (1) |
|
Revocation of Certification |
|
|
15 | (1) |
|
|
16 | (1) |
|
Chapter 2 Information Security Governance |
|
|
17 | (86) |
|
Introduction to Information Security Governance |
|
|
18 | (37) |
|
Reason for Security Governance |
|
|
20 | (1) |
|
Security Governance Activities and Results |
|
|
21 | (1) |
|
|
22 | (2) |
|
Roles and Responsibilities |
|
|
24 | (14) |
|
Monitoring Responsibilities |
|
|
38 | (1) |
|
Information Security Governance Metrics |
|
|
38 | (6) |
|
The Security Balanced Scorecard |
|
|
44 | (1) |
|
Business Model for Information Security |
|
|
44 | (11) |
|
Security Strategy Development |
|
|
55 | (39) |
|
|
55 | (1) |
|
|
56 | (6) |
|
|
62 | (1) |
|
|
62 | (13) |
|
|
75 | (15) |
|
|
90 | (4) |
|
|
94 | (9) |
|
|
96 | (2) |
|
|
98 | (3) |
|
|
101 | (2) |
|
Chapter 3 Information Risk Management |
|
|
103 | (88) |
|
|
103 | (3) |
|
The Importance of Risk Management |
|
|
104 | (1) |
|
Outcomes of Risk Management |
|
|
104 | (1) |
|
Risk Management Technologies |
|
|
105 | (1) |
|
Implementing a Risk Management Program |
|
|
106 | (9) |
|
|
106 | (2) |
|
Risk Management Frameworks |
|
|
108 | (2) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
112 | (3) |
|
The Risk Management Life Cycle |
|
|
115 | (42) |
|
The Risk Management Process |
|
|
115 | (2) |
|
Risk Management Methodologies |
|
|
117 | (9) |
|
Asset Identification and Valuation |
|
|
126 | (2) |
|
|
128 | (6) |
|
|
134 | (1) |
|
|
135 | (6) |
|
Vulnerability Identification |
|
|
141 | (2) |
|
|
143 | (1) |
|
Risk, Likelihood, and Impact |
|
|
144 | (2) |
|
Risk Analysis Techniques and Considerations |
|
|
146 | (11) |
|
Operational Risk Management |
|
|
157 | (24) |
|
Risk Management Objectives |
|
|
158 | (3) |
|
Risk Management and Business Continuity Planning |
|
|
161 | (1) |
|
Third-Party Risk Management |
|
|
161 | (7) |
|
|
168 | (4) |
|
Integration of Risk Management into Other Processes |
|
|
172 | (7) |
|
Risk Monitoring and Reporting |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
181 | (10) |
|
|
184 | (2) |
|
|
186 | (3) |
|
|
189 | (2) |
|
Chapter 4 Information Security Program Development and Management |
|
|
191 | (188) |
|
Information Security Programs |
|
|
192 | (7) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
194 | (1) |
|
Information Security Management Frameworks |
|
|
194 | (1) |
|
|
195 | (1) |
|
Information Security Architecture |
|
|
195 | (4) |
|
Security Program Management |
|
|
199 | (72) |
|
|
199 | (4) |
|
|
203 | (1) |
|
The Risk Management Program |
|
|
203 | (1) |
|
The Risk Management Process |
|
|
204 | (9) |
|
|
213 | (5) |
|
|
218 | (18) |
|
|
236 | (2) |
|
Third-Party Risk Management |
|
|
238 | (13) |
|
Administrative Activities |
|
|
251 | (20) |
|
Security Program Operations |
|
|
271 | (51) |
|
|
272 | (1) |
|
|
273 | (3) |
|
Secure Engineering and Development |
|
|
276 | (2) |
|
|
278 | (10) |
|
Endpoint Protection and Management |
|
|
288 | (5) |
|
Identity and Access Management |
|
|
293 | (3) |
|
Security Incident Management |
|
|
296 | (1) |
|
Security Awareness Training |
|
|
297 | (4) |
|
Managed Security Services Providers |
|
|
301 | (1) |
|
|
302 | (20) |
|
Business Continuity Planning |
|
|
322 | (1) |
|
|
322 | (14) |
|
|
323 | (1) |
|
|
323 | (1) |
|
|
324 | (1) |
|
|
325 | (2) |
|
|
327 | (1) |
|
|
328 | (2) |
|
|
330 | (1) |
|
|
331 | (1) |
|
|
331 | (1) |
|
Service Continuity Management |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
333 | (3) |
|
|
336 | (31) |
|
|
336 | (4) |
|
Internal Control Objectives |
|
|
340 | (1) |
|
Information Systems Control Objectives |
|
|
340 | (1) |
|
General Computing Controls |
|
|
341 | (1) |
|
|
341 | (24) |
|
|
365 | (2) |
|
|
367 | (1) |
|
|
367 | (4) |
|
|
368 | (2) |
|
|
370 | (1) |
|
|
371 | (1) |
|
|
371 | (8) |
|
|
373 | (2) |
|
|
375 | (2) |
|
|
377 | (2) |
|
Chapter 5 Information Security Incident Management |
|
|
379 | (96) |
|
Security Incident Response Overview |
|
|
380 | (5) |
|
Phases of Incident Response |
|
|
383 | (2) |
|
Incident Response Plan Development |
|
|
385 | (13) |
|
|
385 | (1) |
|
|
386 | (1) |
|
|
386 | (5) |
|
Roles and Responsibilities |
|
|
391 | (1) |
|
|
392 | (1) |
|
|
392 | (6) |
|
Responding to Security Incidents |
|
|
398 | (8) |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
401 | (2) |
|
|
403 | (1) |
|
|
404 | (1) |
|
|
404 | (1) |
|
|
405 | (1) |
|
|
405 | (1) |
|
Business Continuity and Disaster Recovery Planning |
|
|
406 | (62) |
|
Business Continuity Planning |
|
|
407 | (34) |
|
Disaster Recovery Planning |
|
|
441 | (21) |
|
|
462 | (6) |
|
|
468 | (7) |
|
|
469 | (1) |
|
|
470 | (2) |
|
|
472 | (3) |
|
Appendix About the CD-ROM |
|
|
475 | (2) |
|
|
475 | (1) |
|
Installing and Running Total Tester Premium Practice Exam Software |
|
|
475 | (1) |
|
Total Tester Premium Practice Exam Software |
|
|
475 | (1) |
|
|
476 | (1) |
|
|
476 | (1) |
Glossary |
|
477 | (36) |
Index |
|
513 | |