Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Certified Information Security Manager Exam Prep Guide

You're reading from   Certified Information Security Manager Exam Prep Guide Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence

Arrow left icon
Product type Paperback
Published in Nov 2021
Publisher Packt
ISBN-13 9781801074100
Length 616 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Hemang Doshi Hemang Doshi
Author Profile Icon Hemang Doshi
Hemang Doshi
Arrow right icon
View More author details
Toc

Table of Contents (17) Chapters Close

Preface 1. Section 1: Information Security Governance
2. Chapter 1: Information Security Governance FREE CHAPTER 3. Chapter 2: Practical Aspects of Information Security Governance 4. Section 2: Information Risk Management
5. Chapter 3: Overview of Information Risk Management 6. Chapter 4: Practical Aspects of Information Risk Management 7. Chapter 5: Procedural Aspects of Information Risk Management 8. Section 3: Information Security Program Development Management
9. Chapter 6: Overview of Information Security Program Development Management 10. Chapter 7: Information Security Infrastructure and Architecture 11. Chapter 8: Practical Aspects of Information Security Program Development Management 12. Chapter 9: Information Security Monitoring Tools and Techniques 13. Section 4: Information Security Incident Management
14. Chapter 10: Overview of Information Security Incident Manager 15. Chapter 11: Practical Aspects of Information Security Incident Management 16. Other Books You May Enjoy

Discovering the maturity model

CISM aspirants are expected to understand the basic details of a maturity model. A maturity model is a tool that helps the organization to assess the current effectiveness of a process and to determine what capabilities they need to improve their performance.

Capability maturity models (CMMs) are useful to determine the maturity level of governance processes. The following list defines the different maturity levels of an organization:

  • Level 0: Incomplete: On this level, the process is not implemented or does not achieve its intended purpose.
  • Level 1: Performed: On this level, the process can achieve its intended purpose.
  • Level 2: Managed: On this level, the process can achieve its intended purpose. Also, the process is appropriately planned, monitored, and controlled.
  • Level 3: Established: Apart from the Level 2 process, there is a well-defined, documented, and established process to manage the process.
  • Level 4: Predictable: On this level, the process is predictable and operates within defined parameters and limits to achieve its intended purpose.
  • Level 5: Optimized: This is the level at which the process is continuously improved to meet the current as well as projected goals.

The CMM indicates a scale of 0 to 5 based on process maturity level, and it is the most common method applied by organizations to measure their existing state and then to determine the desired one.

Maturity models identify the gaps between the current state of the governance process and the desired state to help the organization to determine the necessary remediation steps for improvement. A maturity model requires continuous improvement in the governance framework. It requires continuous evaluation, monitoring, and improvement to move towards the desired state from the current state.

Key aspects from the CISM exam perspective

The following are some of the key aspects from an exam perspective:

Table 1.3 – Key aspects from the CISM exam perspective

Table 1.3 – Key aspects from the CISM exam perspective

Questions

  1. What is the most important factor for the development of a maturity model-based information security governance framework?

    A. Continuous evaluation, monitoring, and improvement.

    B. The return on technology investment.

    C. Continuous risk mitigation.

    D. Continuous key risk indicator (KRI) monitoring.

    Answer: A. Continuous evaluation, monitoring, and improvement.

    Explanation: The maturity model requires continuous improvement in the governance framework. It requires continuous evaluation, monitoring, and improvement to move towards the desired state from the current state. The other options are not as significant as option A.

  2. What best indicates the level of information security governance?

    A. A defined maturity model.

    B. The size of the security team.

    C. The availability of policies and procedures.

    D. The number of security incidents.

    Answer: A. A defined maturity model.

    Explanation: A defined maturity model will be the best indicator to determine the level of security governance. The maturity model indicates the maturity of the governance processes on a scale of 0 to 5, where Level 0 indicates incomplete processes, and Level 5 indicates optimized processes. The other options may not be as useful as the maturity model in determining the level of security.

  3. What is the most effective indicator of the level of security governance?

    A. The annual loss expectancy.

    B. The maturity level.

    C. A risk assessment.

    D. An external audit.

    Answer: B. The maturity level.

    Explanation: A defined maturity model will be the best indicator to determine the level of security governance. The maturity model indicates the maturity of the governance processes on a scale of 0 to 5, where Level 0 indicates incomplete processes, and Level 5 indicates optimized processes. The other options may not be as useful as the maturity model in determining the level of security.

You have been reading a chapter from
Certified Information Security Manager Exam Prep Guide
Published in: Nov 2021
Publisher: Packt
ISBN-13: 9781801074100
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime