SlideShare uma empresa Scribd logo
1 de 13
CISM Certification Details
ISACA®
Pasitikėjimas informacinėmis sistemomis ir jų nauda
www.isaca.org/cism
Laura Puodžiūnaitė
ISACA Lietuvos skyriaus narė
www.isaca.lt
What is a CISM?
• Demonstrate your information
security management expertise.
The uniquely management-
focused CISM certification
promotes international security
practices and recognizes the
individual who manages designs,
and oversees and assesses an
enterprise’s information security.
What is a CISM?
(continued)
• Demonstrates your understanding of the relationship between an
information security program and broader business goals and objectives
• Distinguishes you as having not only information security expertise, but
also knowledge and experience in the development and management of
an information security program
• Puts you in an elite peer network
• Is considered essential to ongoing education, career progression and value
delivery to enterprises.
Why Become a CISM?
Enhanced Knowledge and Skills
• To demonstrate your willingness to improve your technical
knowledge and skills
Career Advancement
• To demonstrate to management your commitment toward
organizational excellence
• To obtain credentials that employers seek
• To enhance your professional image
Worldwide Recognition
• To be included with other professionals who have gained
worldwide recognition
CISM in the Workplace
• Almost 700 are employed in organizations as the CEO, CFO or equivalent
executive position.
• More than 200 serve as chief audit executives, audit partners or audit
heads.
• Over 2,000 serve as CIOs, CISOs, or chief compliance, risk or privacy
officers.
• More than 7,100 are employed as security directors, managers or
consultants and related staff.
• Over 3,000 are employed as IT directors, managers, consultants and
related staff.
• Nearly 2,300 serve as audit directors, managers or consultants and related
staff.
• More than 2,400 are employed in managerial, consulting or related
positions in IT operations or compliance.
CISM Uniqueness
What makes CISM unique?
• Designed exclusively for information security managers
• Criteria and exam developed from job practice analysis
validated by information security managers
• Experience requirement includes information security
management
CISM Target Market
What is the CISM Target Market?
• Individuals who design, implement and manage an
enterprise’s information security program
– Security managers
– Security directors
– Security officers
– Security consultants
CISM Job Practice
(Effective June 2012)
1. Information Security Governance (24%) - Establish and maintain an information
security governance framework and supporting processes to ensure that the
information security strategy is aligned with organizational goals and objectives,
information risk is managed appropriately and program resources are managed
responsibly.
2. Information Risk Management and Compliance (33%) - Manage information risk to an
acceptable level to meet the business and compliance requirements of the
organization.
3. Information Security Program Development and Management (25%) – Establish and
manage the information security program in alignment with the information security
strategy.
4. Information Security Incident Management (18%) – Plan, establish and manage the
capability to detect, investigate, respond to and recover from information security
incidents to minimize business impact.
For more details visit www.isaca.org/cismjobpractice
How to Prepare for
Certification?
How to Develop a
CISM Study Plan
A proper study plan consists of several steps:
 Self-appraisal
 Determination of the type of study program
 Having an adequate amount of time to prepare
 Maintaining momentum
 Readiness review
 Become involved in your local chapter and explore
networking opportunities and study groups.
How to Study for
the Exam
• Read the Candidate’s Guide thoroughly
• Study the review Manual
• Work through the Review Questions, Answers &
Explanations Manual, Supplement and CD
• Participate in an ISACA Chapter Review Course
• Read literature in areas where you need to strengthen
skills
• Join or organize study groups
Ačiū už dėmesį!
Daugiau informacijos apie organizuojamus ISACA sertifikacijų mokymus rasite
www.bka.lt
Susisiekite telefonu 8 5 2780502 arba el.paštu mokymai@bka.lt

Mais conteúdo relacionado

Mais procurados

Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...XEventsHospitality
 
ISO 27001 Lead Implementer Classroom Training Course Certification - ievision...
ISO 27001 Lead Implementer Classroom Training Course Certification - ievision...ISO 27001 Lead Implementer Classroom Training Course Certification - ievision...
ISO 27001 Lead Implementer Classroom Training Course Certification - ievision...IEVISION IT SERVICES Pvt. Ltd
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA
 
Why ISO-27001 is a better choice?
Why ISO-27001 is a better choice? Why ISO-27001 is a better choice?
Why ISO-27001 is a better choice? Patten John
 
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...Jacqueline Fick
 
Ahmed Baig, CISO at Abu Dhabi Government Entity - Establishing effective risk...
Ahmed Baig, CISO at Abu Dhabi Government Entity - Establishing effective risk...Ahmed Baig, CISO at Abu Dhabi Government Entity - Establishing effective risk...
Ahmed Baig, CISO at Abu Dhabi Government Entity - Establishing effective risk...Global Business Events
 
Security Matters - Sloan's Information Security Program
Security Matters - Sloan's Information Security ProgramSecurity Matters - Sloan's Information Security Program
Security Matters - Sloan's Information Security Programevpt-postersession
 
ISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 ImplementationISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 Implementationhimalya sharma
 
Pursue career as a lead auditor
Pursue career as a lead auditorPursue career as a lead auditor
Pursue career as a lead auditorandrewmathen
 
ISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learnedISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learnedJisc
 
The impact of GDPR on UK employers
The impact of GDPR on UK employersThe impact of GDPR on UK employers
The impact of GDPR on UK employersRalf Braga
 
Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415Kevin Hosey
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My OrganisationVigilant Software
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)AHM Pervej Kabir
 
Taking Control of Information Security
Taking Control of Information SecurityTaking Control of Information Security
Taking Control of Information SecurityPECB
 
ISO 27001 Certification: An All-Access Pass
ISO 27001 Certification: An All-Access PassISO 27001 Certification: An All-Access Pass
ISO 27001 Certification: An All-Access PassA-lign
 

Mais procurados (19)

Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
 
ISO 27001 Lead Implementer Classroom Training Course Certification - ievision...
ISO 27001 Lead Implementer Classroom Training Course Certification - ievision...ISO 27001 Lead Implementer Classroom Training Course Certification - ievision...
ISO 27001 Lead Implementer Classroom Training Course Certification - ievision...
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
Why ISO-27001 is a better choice?
Why ISO-27001 is a better choice? Why ISO-27001 is a better choice?
Why ISO-27001 is a better choice?
 
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
 
Ahmed Baig, CISO at Abu Dhabi Government Entity - Establishing effective risk...
Ahmed Baig, CISO at Abu Dhabi Government Entity - Establishing effective risk...Ahmed Baig, CISO at Abu Dhabi Government Entity - Establishing effective risk...
Ahmed Baig, CISO at Abu Dhabi Government Entity - Establishing effective risk...
 
Security Matters - Sloan's Information Security Program
Security Matters - Sloan's Information Security ProgramSecurity Matters - Sloan's Information Security Program
Security Matters - Sloan's Information Security Program
 
ISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 ImplementationISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 Implementation
 
Isms info
Isms infoIsms info
Isms info
 
Pursue career as a lead auditor
Pursue career as a lead auditorPursue career as a lead auditor
Pursue career as a lead auditor
 
Isms
IsmsIsms
Isms
 
ISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learnedISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learned
 
The impact of GDPR on UK employers
The impact of GDPR on UK employersThe impact of GDPR on UK employers
The impact of GDPR on UK employers
 
Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
 
Riliance sales presentation slideshare
Riliance sales presentation   slideshareRiliance sales presentation   slideshare
Riliance sales presentation slideshare
 
Taking Control of Information Security
Taking Control of Information SecurityTaking Control of Information Security
Taking Control of Information Security
 
ISO 27001 Certification: An All-Access Pass
ISO 27001 Certification: An All-Access PassISO 27001 Certification: An All-Access Pass
ISO 27001 Certification: An All-Access Pass
 

Semelhante a CISM sertifikacija

CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOSagarNegi10
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSOSagarNegi10
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
CRISC_certification_training_course_content
CRISC_certification_training_course_contentCRISC_certification_training_course_content
CRISC_certification_training_course_contentpriyanshamadhwal2
 
CRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & descriptionCRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & descriptionInfosec train
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROPriyanka Aash
 
Resume-Amit 1.0
Resume-Amit 1.0Resume-Amit 1.0
Resume-Amit 1.0Amit Verma
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai360 BSI
 
What Can CRISC Certificate Holders Do?
What Can CRISC Certificate Holders Do?What Can CRISC Certificate Holders Do?
What Can CRISC Certificate Holders Do?InfoSec4TC
 
SpireTec Solutions - ppt.pptx
SpireTec Solutions - ppt.pptxSpireTec Solutions - ppt.pptx
SpireTec Solutions - ppt.pptxmayanksingh818
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System SecurityCSSRL PUNE
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
CISM Certification Training Course Content
CISM Certification Training Course ContentCISM Certification Training Course Content
CISM Certification Training Course Contentpriyanshamadhwal2
 
CISM Course Description CISM_Training_v2_Course_content.pdf
CISM Course Description CISM_Training_v2_Course_content.pdfCISM Course Description CISM_Training_v2_Course_content.pdf
CISM Course Description CISM_Training_v2_Course_content.pdfInfosec train
 

Semelhante a CISM sertifikacija (20)

CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
CISA sertifikacija
CISA sertifikacijaCISA sertifikacija
CISA sertifikacija
 
CISM.pdf
CISM.pdfCISM.pdf
CISM.pdf
 
CRISC_certification_training_course_content
CRISC_certification_training_course_contentCRISC_certification_training_course_content
CRISC_certification_training_course_content
 
CRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & descriptionCRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & description
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIRO
 
CISSP-WEB
CISSP-WEBCISSP-WEB
CISSP-WEB
 
Resume-Amit 1.0
Resume-Amit 1.0Resume-Amit 1.0
Resume-Amit 1.0
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 
What Can CRISC Certificate Holders Do?
What Can CRISC Certificate Holders Do?What Can CRISC Certificate Holders Do?
What Can CRISC Certificate Holders Do?
 
SpireTec Solutions - ppt.pptx
SpireTec Solutions - ppt.pptxSpireTec Solutions - ppt.pptx
SpireTec Solutions - ppt.pptx
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
CISM Certification Training Course Content
CISM Certification Training Course ContentCISM Certification Training Course Content
CISM Certification Training Course Content
 
CISM Course Description CISM_Training_v2_Course_content.pdf
CISM Course Description CISM_Training_v2_Course_content.pdfCISM Course Description CISM_Training_v2_Course_content.pdf
CISM Course Description CISM_Training_v2_Course_content.pdf
 

Mais de BKA (Baltijos kompiuteriu akademija) (10)

ISACA sertifikacijos - profesionalumo įrodymas, D. Jakimavičius
ISACA sertifikacijos - profesionalumo įrodymas, D. JakimavičiusISACA sertifikacijos - profesionalumo įrodymas, D. Jakimavičius
ISACA sertifikacijos - profesionalumo įrodymas, D. Jakimavičius
 
Kaip tinkamų sprendimų priėmimas šiandien, padės suvaldyti iššūkius rytoj? Ri...
Kaip tinkamų sprendimų priėmimas šiandien, padės suvaldyti iššūkius rytoj? Ri...Kaip tinkamų sprendimų priėmimas šiandien, padės suvaldyti iššūkius rytoj? Ri...
Kaip tinkamų sprendimų priėmimas šiandien, padės suvaldyti iššūkius rytoj? Ri...
 
Kibernetinė sauga. Vadovo požiūris. R.Lečickis
Kibernetinė sauga. Vadovo požiūris. R.LečickisKibernetinė sauga. Vadovo požiūris. R.Lečickis
Kibernetinė sauga. Vadovo požiūris. R.Lečickis
 
IT paslaugų valdymo pertvarka remiantis COBIT principais. A.Glemža
IT paslaugų valdymo pertvarka remiantis COBIT principais. A.GlemžaIT paslaugų valdymo pertvarka remiantis COBIT principais. A.Glemža
IT paslaugų valdymo pertvarka remiantis COBIT principais. A.Glemža
 
IT strateginis planas ir COBIT 5 tikslų hierarchija. D. Jakimavičius
IT strateginis planas ir COBIT 5 tikslų hierarchija. D. JakimavičiusIT strateginis planas ir COBIT 5 tikslų hierarchija. D. Jakimavičius
IT strateginis planas ir COBIT 5 tikslų hierarchija. D. Jakimavičius
 
ITIL. Kodėl jis reikalingas Jūsų įmonei?
ITIL. Kodėl jis reikalingas Jūsų įmonei?ITIL. Kodėl jis reikalingas Jūsų įmonei?
ITIL. Kodėl jis reikalingas Jūsų įmonei?
 
COBIT sertifikacija
COBIT sertifikacijaCOBIT sertifikacija
COBIT sertifikacija
 
CRISC sertifikacija
CRISC sertifikacijaCRISC sertifikacija
CRISC sertifikacija
 
CGEIT sertifikacija
CGEIT sertifikacijaCGEIT sertifikacija
CGEIT sertifikacija
 
ISACA Lietuva. Asociacija, sertifikacijos ir mokymai
ISACA Lietuva. Asociacija, sertifikacijos ir mokymaiISACA Lietuva. Asociacija, sertifikacijos ir mokymai
ISACA Lietuva. Asociacija, sertifikacijos ir mokymai
 

Último

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

CISM sertifikacija

  • 1.
  • 2. CISM Certification Details ISACA® Pasitikėjimas informacinėmis sistemomis ir jų nauda www.isaca.org/cism Laura Puodžiūnaitė ISACA Lietuvos skyriaus narė www.isaca.lt
  • 3. What is a CISM? • Demonstrate your information security management expertise. The uniquely management- focused CISM certification promotes international security practices and recognizes the individual who manages designs, and oversees and assesses an enterprise’s information security.
  • 4. What is a CISM? (continued) • Demonstrates your understanding of the relationship between an information security program and broader business goals and objectives • Distinguishes you as having not only information security expertise, but also knowledge and experience in the development and management of an information security program • Puts you in an elite peer network • Is considered essential to ongoing education, career progression and value delivery to enterprises.
  • 5. Why Become a CISM? Enhanced Knowledge and Skills • To demonstrate your willingness to improve your technical knowledge and skills Career Advancement • To demonstrate to management your commitment toward organizational excellence • To obtain credentials that employers seek • To enhance your professional image Worldwide Recognition • To be included with other professionals who have gained worldwide recognition
  • 6. CISM in the Workplace • Almost 700 are employed in organizations as the CEO, CFO or equivalent executive position. • More than 200 serve as chief audit executives, audit partners or audit heads. • Over 2,000 serve as CIOs, CISOs, or chief compliance, risk or privacy officers. • More than 7,100 are employed as security directors, managers or consultants and related staff. • Over 3,000 are employed as IT directors, managers, consultants and related staff. • Nearly 2,300 serve as audit directors, managers or consultants and related staff. • More than 2,400 are employed in managerial, consulting or related positions in IT operations or compliance.
  • 7. CISM Uniqueness What makes CISM unique? • Designed exclusively for information security managers • Criteria and exam developed from job practice analysis validated by information security managers • Experience requirement includes information security management
  • 8. CISM Target Market What is the CISM Target Market? • Individuals who design, implement and manage an enterprise’s information security program – Security managers – Security directors – Security officers – Security consultants
  • 9. CISM Job Practice (Effective June 2012) 1. Information Security Governance (24%) - Establish and maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives, information risk is managed appropriately and program resources are managed responsibly. 2. Information Risk Management and Compliance (33%) - Manage information risk to an acceptable level to meet the business and compliance requirements of the organization. 3. Information Security Program Development and Management (25%) – Establish and manage the information security program in alignment with the information security strategy. 4. Information Security Incident Management (18%) – Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact. For more details visit www.isaca.org/cismjobpractice
  • 10. How to Prepare for Certification?
  • 11. How to Develop a CISM Study Plan A proper study plan consists of several steps:  Self-appraisal  Determination of the type of study program  Having an adequate amount of time to prepare  Maintaining momentum  Readiness review  Become involved in your local chapter and explore networking opportunities and study groups.
  • 12. How to Study for the Exam • Read the Candidate’s Guide thoroughly • Study the review Manual • Work through the Review Questions, Answers & Explanations Manual, Supplement and CD • Participate in an ISACA Chapter Review Course • Read literature in areas where you need to strengthen skills • Join or organize study groups
  • 13. Ačiū už dėmesį! Daugiau informacijos apie organizuojamus ISACA sertifikacijų mokymus rasite www.bka.lt Susisiekite telefonu 8 5 2780502 arba el.paštu mokymai@bka.lt