Click here to load reader

CISM sertifikacija

  • View

  • Download

Embed Size (px)


BKA renginio "Kaip tapti lyderiais IT valdymo, saugos ir audito srityje?" pranešimas apie CISM (Certified Information Security Manager) sertifikaciją. Renginys vyko balandžio 18 d., 2013.

Text of CISM sertifikacija

  • 1. CISM Certification DetailsISACAPasitikjimas informacinmis sistemomis ir j PuodinaitISACA Lietuvos skyriaus

2. What is a CISM? Demonstrate your informationsecurity management expertise.The uniquely management-focused CISM certificationpromotes international securitypractices and recognizes theindividual who manages designs,and oversees and assesses anenterprises information security. 3. What is a CISM?(continued) Demonstrates your understanding of the relationship between aninformation security program and broader business goals and objectives Distinguishes you as having not only information security expertise, butalso knowledge and experience in the development and management ofan information security program Puts you in an elite peer network Is considered essential to ongoing education, career progression and valuedelivery to enterprises. 4. Why Become a CISM?Enhanced Knowledge and Skills To demonstrate your willingness to improve your technicalknowledge and skillsCareer Advancement To demonstrate to management your commitment towardorganizational excellence To obtain credentials that employers seek To enhance your professional imageWorldwide Recognition To be included with other professionals who have gainedworldwide recognition 5. CISM in the Workplace Almost 700 are employed in organizations as the CEO, CFO or equivalentexecutive position. More than 200 serve as chief audit executives, audit partners or auditheads. Over 2,000 serve as CIOs, CISOs, or chief compliance, risk or privacyofficers. More than 7,100 are employed as security directors, managers orconsultants and related staff. Over 3,000 are employed as IT directors, managers, consultants andrelated staff. Nearly 2,300 serve as audit directors, managers or consultants and relatedstaff. More than 2,400 are employed in managerial, consulting or relatedpositions in IT operations or compliance. 6. CISM UniquenessWhat makes CISM unique? Designed exclusively for information security managers Criteria and exam developed from job practice analysisvalidated by information security managers Experience requirement includes information securitymanagement 7. CISM Target MarketWhat is the CISM Target Market? Individuals who design, implement and manage anenterprises information security program Security managers Security directors Security officers Security consultants 8. CISM Job Practice(Effective June 2012)1. Information Security Governance (24%) - Establish and maintain an informationsecurity governance framework and supporting processes to ensure that theinformation security strategy is aligned with organizational goals and objectives,information risk is managed appropriately and program resources are managedresponsibly.2. Information Risk Management and Compliance (33%) - Manage information risk to anacceptable level to meet the business and compliance requirements of theorganization.3. Information Security Program Development and Management (25%) Establish andmanage the information security program in alignment with the information securitystrategy.4. Information Security Incident Management (18%) Plan, establish and manage thecapability to detect, investigate, respond to and recover from information securityincidents to minimize business impact.For more details visit 9. How to Prepare forCertification? 10. How to Develop aCISM Study PlanA proper study plan consists of several steps: Self-appraisal Determination of the type of study program Having an adequate amount of time to prepare Maintaining momentum Readiness review Become involved in your local chapter and explorenetworking opportunities and study groups. 11. How to Study forthe Exam Read the Candidates Guide thoroughly Study the review Manual Work through the Review Questions, Answers &Explanations Manual, Supplement and CD Participate in an ISACA Chapter Review Course Read literature in areas where you need to strengthenskills Join or organize study groups 12. Ai u dmes!Daugiau informacijos apie organizuojamus ISACA sertifikacij mokymus rasitewww.bka.ltSusisiekite telefonu 8 5 2780502 arba el.patu [email protected]

Search related