CISM Exam Study Guide with Complete Solutions
What is Information Security Governance. Note there are 5 desired outcomes: -
Answer✔️✔️-1. Strategic alignment of information security with business strategy to
support organizational objectives
2. Risk management by executing appropriate measures to manage and mitigate
risks and reduce potential impacts on information resources to an
acceptable level
3. Resource management by utilizing information security knowledge and
infrastructure efficiently and effectively.
4. Performance measurement by measuring, monitoring and reporting information
security governance metrics to ensure that organizational
objectives are achieved
5. Value delivery by optimizing
Information - Answer✔️✔️-Data endowed with meaning and purpose
Benefits from and effective governance program - Answer✔️✔️-1. Strategic
Alignment
1
,©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM
2. Risk Management
3. Value Delivery
4. Resource Optimization
5 Performance measurement.
Strategic Alignment - Answer✔️✔️-Aligning info security with the business strategy
by providing guidance, develop security solution, and align investment with the
business strategy.
Risk Management - Answer✔️✔️-Is the process by which an organization manages
risk to acceptable levels within acceptable tolerances, identifies potential risk and
its associated impacts, and prioritizes their mitigation based on the organization's
business objectives. Risk management develops and deploys internal controls to
manage and mitigate risk throughout the organization.
Value Delivery - Answer✔️✔️-Optimizing [security investments in support of
business objectives].
1. Create a standard set of security practices (baseline standards),
2. security overheads maintained at minimum levels, institutionalize and
commoditize standard-based solution.
2
, ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM
3. Understanding end-to-end business organization. Continuous improvement
culture.
Resource Optimization - Answer✔️✔️-Using information security knowledge and
infrastructure efficiently and effectively to:
1. Knowledge is captured
2. Document security process
3. Develop security architecture.
Performance measurement - Answer✔️✔️-Monitoring and reporting on Info Security
process to ensure that objectives are achieved, include:
1. meaningful set of metrics are properly aligned with strategic objectives
2. Identify shortcoming
3. Independent audits
4. Identify most useful matric from others
Integration - Answer✔️✔️-Assurance factors/functions and processes operate as
intended from end-to-end.
Who is responsible for Information Security Governance - Answer✔️✔️-The Board
of Directors and Executive management.
3