SlideShare una empresa de Scribd logo
1 de 13
CISM Certification Details
ISACA®
Pasitikėjimas informacinėmis sistemomis ir jų nauda
www.isaca.org/cism
Laura Puodžiūnaitė
ISACA Lietuvos skyriaus narė
www.isaca.lt
What is a CISM?
• Demonstrate your information
security management expertise.
The uniquely management-
focused CISM certification
promotes international security
practices and recognizes the
individual who manages designs,
and oversees and assesses an
enterprise’s information security.
What is a CISM?
(continued)
• Demonstrates your understanding of the relationship between an
information security program and broader business goals and objectives
• Distinguishes you as having not only information security expertise, but
also knowledge and experience in the development and management of
an information security program
• Puts you in an elite peer network
• Is considered essential to ongoing education, career progression and value
delivery to enterprises.
Why Become a CISM?
Enhanced Knowledge and Skills
• To demonstrate your willingness to improve your technical
knowledge and skills
Career Advancement
• To demonstrate to management your commitment toward
organizational excellence
• To obtain credentials that employers seek
• To enhance your professional image
Worldwide Recognition
• To be included with other professionals who have gained
worldwide recognition
CISM in the Workplace
• Almost 700 are employed in organizations as the CEO, CFO or equivalent
executive position.
• More than 200 serve as chief audit executives, audit partners or audit
heads.
• Over 2,000 serve as CIOs, CISOs, or chief compliance, risk or privacy
officers.
• More than 7,100 are employed as security directors, managers or
consultants and related staff.
• Over 3,000 are employed as IT directors, managers, consultants and
related staff.
• Nearly 2,300 serve as audit directors, managers or consultants and related
staff.
• More than 2,400 are employed in managerial, consulting or related
positions in IT operations or compliance.
CISM Uniqueness
What makes CISM unique?
• Designed exclusively for information security managers
• Criteria and exam developed from job practice analysis
validated by information security managers
• Experience requirement includes information security
management
CISM Target Market
What is the CISM Target Market?
• Individuals who design, implement and manage an
enterprise’s information security program
– Security managers
– Security directors
– Security officers
– Security consultants
CISM Job Practice
(Effective June 2012)
1. Information Security Governance (24%) - Establish and maintain an information
security governance framework and supporting processes to ensure that the
information security strategy is aligned with organizational goals and objectives,
information risk is managed appropriately and program resources are managed
responsibly.
2. Information Risk Management and Compliance (33%) - Manage information risk to an
acceptable level to meet the business and compliance requirements of the
organization.
3. Information Security Program Development and Management (25%) – Establish and
manage the information security program in alignment with the information security
strategy.
4. Information Security Incident Management (18%) – Plan, establish and manage the
capability to detect, investigate, respond to and recover from information security
incidents to minimize business impact.
For more details visit www.isaca.org/cismjobpractice
How to Prepare for
Certification?
How to Develop a
CISM Study Plan
A proper study plan consists of several steps:
 Self-appraisal
 Determination of the type of study program
 Having an adequate amount of time to prepare
 Maintaining momentum
 Readiness review
 Become involved in your local chapter and explore
networking opportunities and study groups.
How to Study for
the Exam
• Read the Candidate’s Guide thoroughly
• Study the review Manual
• Work through the Review Questions, Answers &
Explanations Manual, Supplement and CD
• Participate in an ISACA Chapter Review Course
• Read literature in areas where you need to strengthen
skills
• Join or organize study groups
Ačiū už dėmesį!
Daugiau informacijos apie organizuojamus ISACA sertifikacijų mokymus rasite
www.bka.lt
Susisiekite telefonu 8 5 2780502 arba el.paštu mokymai@bka.lt

Más contenido relacionado

La actualidad más candente

Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Jacqueline Fick
 
Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415
Kevin Hosey
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
AHM Pervej Kabir
 

La actualidad más candente (19)

Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
 
ISO 27001 Lead Implementer Classroom Training Course Certification - ievision...
ISO 27001 Lead Implementer Classroom Training Course Certification - ievision...ISO 27001 Lead Implementer Classroom Training Course Certification - ievision...
ISO 27001 Lead Implementer Classroom Training Course Certification - ievision...
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
Why ISO-27001 is a better choice?
Why ISO-27001 is a better choice? Why ISO-27001 is a better choice?
Why ISO-27001 is a better choice?
 
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
 
Ahmed Baig, CISO at Abu Dhabi Government Entity - Establishing effective risk...
Ahmed Baig, CISO at Abu Dhabi Government Entity - Establishing effective risk...Ahmed Baig, CISO at Abu Dhabi Government Entity - Establishing effective risk...
Ahmed Baig, CISO at Abu Dhabi Government Entity - Establishing effective risk...
 
Security Matters - Sloan's Information Security Program
Security Matters - Sloan's Information Security ProgramSecurity Matters - Sloan's Information Security Program
Security Matters - Sloan's Information Security Program
 
ISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 ImplementationISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 Implementation
 
Isms info
Isms infoIsms info
Isms info
 
Pursue career as a lead auditor
Pursue career as a lead auditorPursue career as a lead auditor
Pursue career as a lead auditor
 
Isms
IsmsIsms
Isms
 
ISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learnedISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learned
 
The impact of GDPR on UK employers
The impact of GDPR on UK employersThe impact of GDPR on UK employers
The impact of GDPR on UK employers
 
Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
 
Riliance sales presentation slideshare
Riliance sales presentation   slideshareRiliance sales presentation   slideshare
Riliance sales presentation slideshare
 
Taking Control of Information Security
Taking Control of Information SecurityTaking Control of Information Security
Taking Control of Information Security
 
ISO 27001 Certification: An All-Access Pass
ISO 27001 Certification: An All-Access PassISO 27001 Certification: An All-Access Pass
ISO 27001 Certification: An All-Access Pass
 

Similar a CISM sertifikacija

IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
sdfghj21
 
Resume-Amit 1.0
Resume-Amit 1.0Resume-Amit 1.0
Resume-Amit 1.0
Amit Verma
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
360 BSI
 

Similar a CISM sertifikacija (20)

CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
CISA sertifikacija
CISA sertifikacijaCISA sertifikacija
CISA sertifikacija
 
CISM.pdf
CISM.pdfCISM.pdf
CISM.pdf
 
CRISC_certification_training_course_content
CRISC_certification_training_course_contentCRISC_certification_training_course_content
CRISC_certification_training_course_content
 
CRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & descriptionCRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & description
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIRO
 
CISSP-WEB
CISSP-WEBCISSP-WEB
CISSP-WEB
 
Resume-Amit 1.0
Resume-Amit 1.0Resume-Amit 1.0
Resume-Amit 1.0
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 
What Can CRISC Certificate Holders Do?
What Can CRISC Certificate Holders Do?What Can CRISC Certificate Holders Do?
What Can CRISC Certificate Holders Do?
 
SpireTec Solutions - ppt.pptx
SpireTec Solutions - ppt.pptxSpireTec Solutions - ppt.pptx
SpireTec Solutions - ppt.pptx
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
CISM Course Description CISM_Training_v2_Course_content.pdf
CISM Course Description CISM_Training_v2_Course_content.pdfCISM Course Description CISM_Training_v2_Course_content.pdf
CISM Course Description CISM_Training_v2_Course_content.pdf
 
CISM Certification Training Course Content
CISM Certification Training Course ContentCISM Certification Training Course Content
CISM Certification Training Course Content
 

Más de BKA (Baltijos kompiuteriu akademija)

Más de BKA (Baltijos kompiuteriu akademija) (10)

ISACA sertifikacijos - profesionalumo įrodymas, D. Jakimavičius
ISACA sertifikacijos - profesionalumo įrodymas, D. JakimavičiusISACA sertifikacijos - profesionalumo įrodymas, D. Jakimavičius
ISACA sertifikacijos - profesionalumo įrodymas, D. Jakimavičius
 
Kaip tinkamų sprendimų priėmimas šiandien, padės suvaldyti iššūkius rytoj? Ri...
Kaip tinkamų sprendimų priėmimas šiandien, padės suvaldyti iššūkius rytoj? Ri...Kaip tinkamų sprendimų priėmimas šiandien, padės suvaldyti iššūkius rytoj? Ri...
Kaip tinkamų sprendimų priėmimas šiandien, padės suvaldyti iššūkius rytoj? Ri...
 
Kibernetinė sauga. Vadovo požiūris. R.Lečickis
Kibernetinė sauga. Vadovo požiūris. R.LečickisKibernetinė sauga. Vadovo požiūris. R.Lečickis
Kibernetinė sauga. Vadovo požiūris. R.Lečickis
 
IT paslaugų valdymo pertvarka remiantis COBIT principais. A.Glemža
IT paslaugų valdymo pertvarka remiantis COBIT principais. A.GlemžaIT paslaugų valdymo pertvarka remiantis COBIT principais. A.Glemža
IT paslaugų valdymo pertvarka remiantis COBIT principais. A.Glemža
 
IT strateginis planas ir COBIT 5 tikslų hierarchija. D. Jakimavičius
IT strateginis planas ir COBIT 5 tikslų hierarchija. D. JakimavičiusIT strateginis planas ir COBIT 5 tikslų hierarchija. D. Jakimavičius
IT strateginis planas ir COBIT 5 tikslų hierarchija. D. Jakimavičius
 
ITIL. Kodėl jis reikalingas Jūsų įmonei?
ITIL. Kodėl jis reikalingas Jūsų įmonei?ITIL. Kodėl jis reikalingas Jūsų įmonei?
ITIL. Kodėl jis reikalingas Jūsų įmonei?
 
COBIT sertifikacija
COBIT sertifikacijaCOBIT sertifikacija
COBIT sertifikacija
 
CRISC sertifikacija
CRISC sertifikacijaCRISC sertifikacija
CRISC sertifikacija
 
CGEIT sertifikacija
CGEIT sertifikacijaCGEIT sertifikacija
CGEIT sertifikacija
 
ISACA Lietuva. Asociacija, sertifikacijos ir mokymai
ISACA Lietuva. Asociacija, sertifikacijos ir mokymaiISACA Lietuva. Asociacija, sertifikacijos ir mokymai
ISACA Lietuva. Asociacija, sertifikacijos ir mokymai
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

CISM sertifikacija

  • 1.
  • 2. CISM Certification Details ISACA® Pasitikėjimas informacinėmis sistemomis ir jų nauda www.isaca.org/cism Laura Puodžiūnaitė ISACA Lietuvos skyriaus narė www.isaca.lt
  • 3. What is a CISM? • Demonstrate your information security management expertise. The uniquely management- focused CISM certification promotes international security practices and recognizes the individual who manages designs, and oversees and assesses an enterprise’s information security.
  • 4. What is a CISM? (continued) • Demonstrates your understanding of the relationship between an information security program and broader business goals and objectives • Distinguishes you as having not only information security expertise, but also knowledge and experience in the development and management of an information security program • Puts you in an elite peer network • Is considered essential to ongoing education, career progression and value delivery to enterprises.
  • 5. Why Become a CISM? Enhanced Knowledge and Skills • To demonstrate your willingness to improve your technical knowledge and skills Career Advancement • To demonstrate to management your commitment toward organizational excellence • To obtain credentials that employers seek • To enhance your professional image Worldwide Recognition • To be included with other professionals who have gained worldwide recognition
  • 6. CISM in the Workplace • Almost 700 are employed in organizations as the CEO, CFO or equivalent executive position. • More than 200 serve as chief audit executives, audit partners or audit heads. • Over 2,000 serve as CIOs, CISOs, or chief compliance, risk or privacy officers. • More than 7,100 are employed as security directors, managers or consultants and related staff. • Over 3,000 are employed as IT directors, managers, consultants and related staff. • Nearly 2,300 serve as audit directors, managers or consultants and related staff. • More than 2,400 are employed in managerial, consulting or related positions in IT operations or compliance.
  • 7. CISM Uniqueness What makes CISM unique? • Designed exclusively for information security managers • Criteria and exam developed from job practice analysis validated by information security managers • Experience requirement includes information security management
  • 8. CISM Target Market What is the CISM Target Market? • Individuals who design, implement and manage an enterprise’s information security program – Security managers – Security directors – Security officers – Security consultants
  • 9. CISM Job Practice (Effective June 2012) 1. Information Security Governance (24%) - Establish and maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives, information risk is managed appropriately and program resources are managed responsibly. 2. Information Risk Management and Compliance (33%) - Manage information risk to an acceptable level to meet the business and compliance requirements of the organization. 3. Information Security Program Development and Management (25%) – Establish and manage the information security program in alignment with the information security strategy. 4. Information Security Incident Management (18%) – Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact. For more details visit www.isaca.org/cismjobpractice
  • 10. How to Prepare for Certification?
  • 11. How to Develop a CISM Study Plan A proper study plan consists of several steps:  Self-appraisal  Determination of the type of study program  Having an adequate amount of time to prepare  Maintaining momentum  Readiness review  Become involved in your local chapter and explore networking opportunities and study groups.
  • 12. How to Study for the Exam • Read the Candidate’s Guide thoroughly • Study the review Manual • Work through the Review Questions, Answers & Explanations Manual, Supplement and CD • Participate in an ISACA Chapter Review Course • Read literature in areas where you need to strengthen skills • Join or organize study groups
  • 13. Ačiū už dėmesį! Daugiau informacijos apie organizuojamus ISACA sertifikacijų mokymus rasite www.bka.lt Susisiekite telefonu 8 5 2780502 arba el.paštu mokymai@bka.lt