SlideShare une entreprise Scribd logo
1  sur  13
CISM Certification Details
ISACA®
Pasitikėjimas informacinėmis sistemomis ir jų nauda
www.isaca.org/cism
Laura Puodžiūnaitė
ISACA Lietuvos skyriaus narė
www.isaca.lt
What is a CISM?
• Demonstrate your information
security management expertise.
The uniquely management-
focused CISM certification
promotes international security
practices and recognizes the
individual who manages designs,
and oversees and assesses an
enterprise’s information security.
What is a CISM?
(continued)
• Demonstrates your understanding of the relationship between an
information security program and broader business goals and objectives
• Distinguishes you as having not only information security expertise, but
also knowledge and experience in the development and management of
an information security program
• Puts you in an elite peer network
• Is considered essential to ongoing education, career progression and value
delivery to enterprises.
Why Become a CISM?
Enhanced Knowledge and Skills
• To demonstrate your willingness to improve your technical
knowledge and skills
Career Advancement
• To demonstrate to management your commitment toward
organizational excellence
• To obtain credentials that employers seek
• To enhance your professional image
Worldwide Recognition
• To be included with other professionals who have gained
worldwide recognition
CISM in the Workplace
• Almost 700 are employed in organizations as the CEO, CFO or equivalent
executive position.
• More than 200 serve as chief audit executives, audit partners or audit
heads.
• Over 2,000 serve as CIOs, CISOs, or chief compliance, risk or privacy
officers.
• More than 7,100 are employed as security directors, managers or
consultants and related staff.
• Over 3,000 are employed as IT directors, managers, consultants and
related staff.
• Nearly 2,300 serve as audit directors, managers or consultants and related
staff.
• More than 2,400 are employed in managerial, consulting or related
positions in IT operations or compliance.
CISM Uniqueness
What makes CISM unique?
• Designed exclusively for information security managers
• Criteria and exam developed from job practice analysis
validated by information security managers
• Experience requirement includes information security
management
CISM Target Market
What is the CISM Target Market?
• Individuals who design, implement and manage an
enterprise’s information security program
– Security managers
– Security directors
– Security officers
– Security consultants
CISM Job Practice
(Effective June 2012)
1. Information Security Governance (24%) - Establish and maintain an information
security governance framework and supporting processes to ensure that the
information security strategy is aligned with organizational goals and objectives,
information risk is managed appropriately and program resources are managed
responsibly.
2. Information Risk Management and Compliance (33%) - Manage information risk to an
acceptable level to meet the business and compliance requirements of the
organization.
3. Information Security Program Development and Management (25%) – Establish and
manage the information security program in alignment with the information security
strategy.
4. Information Security Incident Management (18%) – Plan, establish and manage the
capability to detect, investigate, respond to and recover from information security
incidents to minimize business impact.
For more details visit www.isaca.org/cismjobpractice
How to Prepare for
Certification?
How to Develop a
CISM Study Plan
A proper study plan consists of several steps:
 Self-appraisal
 Determination of the type of study program
 Having an adequate amount of time to prepare
 Maintaining momentum
 Readiness review
 Become involved in your local chapter and explore
networking opportunities and study groups.
How to Study for
the Exam
• Read the Candidate’s Guide thoroughly
• Study the review Manual
• Work through the Review Questions, Answers &
Explanations Manual, Supplement and CD
• Participate in an ISACA Chapter Review Course
• Read literature in areas where you need to strengthen
skills
• Join or organize study groups
Ačiū už dėmesį!
Daugiau informacijos apie organizuojamus ISACA sertifikacijų mokymus rasite
www.bka.lt
Susisiekite telefonu 8 5 2780502 arba el.paštu mokymai@bka.lt

Contenu connexe

Tendances

Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...XEventsHospitality
 
ISO 27001 Lead Implementer Classroom Training Course Certification - ievision...
ISO 27001 Lead Implementer Classroom Training Course Certification - ievision...ISO 27001 Lead Implementer Classroom Training Course Certification - ievision...
ISO 27001 Lead Implementer Classroom Training Course Certification - ievision...IEVISION IT SERVICES Pvt. Ltd
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA
 
Why ISO-27001 is a better choice?
Why ISO-27001 is a better choice? Why ISO-27001 is a better choice?
Why ISO-27001 is a better choice? Patten John
 
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...Jacqueline Fick
 
Ahmed Baig, CISO at Abu Dhabi Government Entity - Establishing effective risk...
Ahmed Baig, CISO at Abu Dhabi Government Entity - Establishing effective risk...Ahmed Baig, CISO at Abu Dhabi Government Entity - Establishing effective risk...
Ahmed Baig, CISO at Abu Dhabi Government Entity - Establishing effective risk...Global Business Events
 
Security Matters - Sloan's Information Security Program
Security Matters - Sloan's Information Security ProgramSecurity Matters - Sloan's Information Security Program
Security Matters - Sloan's Information Security Programevpt-postersession
 
ISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 ImplementationISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 Implementationhimalya sharma
 
Pursue career as a lead auditor
Pursue career as a lead auditorPursue career as a lead auditor
Pursue career as a lead auditorandrewmathen
 
ISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learnedISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learnedJisc
 
The impact of GDPR on UK employers
The impact of GDPR on UK employersThe impact of GDPR on UK employers
The impact of GDPR on UK employersRalf Braga
 
Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415Kevin Hosey
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My OrganisationVigilant Software
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)AHM Pervej Kabir
 
Taking Control of Information Security
Taking Control of Information SecurityTaking Control of Information Security
Taking Control of Information SecurityPECB
 
ISO 27001 Certification: An All-Access Pass
ISO 27001 Certification: An All-Access PassISO 27001 Certification: An All-Access Pass
ISO 27001 Certification: An All-Access PassA-lign
 

Tendances (19)

Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
 
ISO 27001 Lead Implementer Classroom Training Course Certification - ievision...
ISO 27001 Lead Implementer Classroom Training Course Certification - ievision...ISO 27001 Lead Implementer Classroom Training Course Certification - ievision...
ISO 27001 Lead Implementer Classroom Training Course Certification - ievision...
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
Why ISO-27001 is a better choice?
Why ISO-27001 is a better choice? Why ISO-27001 is a better choice?
Why ISO-27001 is a better choice?
 
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
 
Ahmed Baig, CISO at Abu Dhabi Government Entity - Establishing effective risk...
Ahmed Baig, CISO at Abu Dhabi Government Entity - Establishing effective risk...Ahmed Baig, CISO at Abu Dhabi Government Entity - Establishing effective risk...
Ahmed Baig, CISO at Abu Dhabi Government Entity - Establishing effective risk...
 
Security Matters - Sloan's Information Security Program
Security Matters - Sloan's Information Security ProgramSecurity Matters - Sloan's Information Security Program
Security Matters - Sloan's Information Security Program
 
ISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 ImplementationISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 Implementation
 
Isms info
Isms infoIsms info
Isms info
 
Pursue career as a lead auditor
Pursue career as a lead auditorPursue career as a lead auditor
Pursue career as a lead auditor
 
Isms
IsmsIsms
Isms
 
ISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learnedISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learned
 
The impact of GDPR on UK employers
The impact of GDPR on UK employersThe impact of GDPR on UK employers
The impact of GDPR on UK employers
 
Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
 
Riliance sales presentation slideshare
Riliance sales presentation   slideshareRiliance sales presentation   slideshare
Riliance sales presentation slideshare
 
Taking Control of Information Security
Taking Control of Information SecurityTaking Control of Information Security
Taking Control of Information Security
 
ISO 27001 Certification: An All-Access Pass
ISO 27001 Certification: An All-Access PassISO 27001 Certification: An All-Access Pass
ISO 27001 Certification: An All-Access Pass
 

Similaire à CISM sertifikacija

CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOSagarNegi10
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSOSagarNegi10
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
CRISC_certification_training_course_content
CRISC_certification_training_course_contentCRISC_certification_training_course_content
CRISC_certification_training_course_contentpriyanshamadhwal2
 
CRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & descriptionCRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & descriptionInfosec train
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROPriyanka Aash
 
Resume-Amit 1.0
Resume-Amit 1.0Resume-Amit 1.0
Resume-Amit 1.0Amit Verma
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai360 BSI
 
What Can CRISC Certificate Holders Do?
What Can CRISC Certificate Holders Do?What Can CRISC Certificate Holders Do?
What Can CRISC Certificate Holders Do?InfoSec4TC
 
SpireTec Solutions - ppt.pptx
SpireTec Solutions - ppt.pptxSpireTec Solutions - ppt.pptx
SpireTec Solutions - ppt.pptxmayanksingh818
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System SecurityCSSRL PUNE
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
CISM Course Description CISM_Training_v2_Course_content.pdf
CISM Course Description CISM_Training_v2_Course_content.pdfCISM Course Description CISM_Training_v2_Course_content.pdf
CISM Course Description CISM_Training_v2_Course_content.pdfInfosec train
 
CISM Certification Training Course Content
CISM Certification Training Course ContentCISM Certification Training Course Content
CISM Certification Training Course Contentpriyanshamadhwal2
 

Similaire à CISM sertifikacija (20)

CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
CISA sertifikacija
CISA sertifikacijaCISA sertifikacija
CISA sertifikacija
 
CISM.pdf
CISM.pdfCISM.pdf
CISM.pdf
 
CRISC_certification_training_course_content
CRISC_certification_training_course_contentCRISC_certification_training_course_content
CRISC_certification_training_course_content
 
CRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & descriptionCRISC_v1_2021_Course_Content & description
CRISC_v1_2021_Course_Content & description
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIRO
 
CISSP-WEB
CISSP-WEBCISSP-WEB
CISSP-WEB
 
Resume-Amit 1.0
Resume-Amit 1.0Resume-Amit 1.0
Resume-Amit 1.0
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 
What Can CRISC Certificate Holders Do?
What Can CRISC Certificate Holders Do?What Can CRISC Certificate Holders Do?
What Can CRISC Certificate Holders Do?
 
SpireTec Solutions - ppt.pptx
SpireTec Solutions - ppt.pptxSpireTec Solutions - ppt.pptx
SpireTec Solutions - ppt.pptx
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
CISM Course Description CISM_Training_v2_Course_content.pdf
CISM Course Description CISM_Training_v2_Course_content.pdfCISM Course Description CISM_Training_v2_Course_content.pdf
CISM Course Description CISM_Training_v2_Course_content.pdf
 
CISM Certification Training Course Content
CISM Certification Training Course ContentCISM Certification Training Course Content
CISM Certification Training Course Content
 

Plus de BKA (Baltijos kompiuteriu akademija) (10)

ISACA sertifikacijos - profesionalumo įrodymas, D. Jakimavičius
ISACA sertifikacijos - profesionalumo įrodymas, D. JakimavičiusISACA sertifikacijos - profesionalumo įrodymas, D. Jakimavičius
ISACA sertifikacijos - profesionalumo įrodymas, D. Jakimavičius
 
Kaip tinkamų sprendimų priėmimas šiandien, padės suvaldyti iššūkius rytoj? Ri...
Kaip tinkamų sprendimų priėmimas šiandien, padės suvaldyti iššūkius rytoj? Ri...Kaip tinkamų sprendimų priėmimas šiandien, padės suvaldyti iššūkius rytoj? Ri...
Kaip tinkamų sprendimų priėmimas šiandien, padės suvaldyti iššūkius rytoj? Ri...
 
Kibernetinė sauga. Vadovo požiūris. R.Lečickis
Kibernetinė sauga. Vadovo požiūris. R.LečickisKibernetinė sauga. Vadovo požiūris. R.Lečickis
Kibernetinė sauga. Vadovo požiūris. R.Lečickis
 
IT paslaugų valdymo pertvarka remiantis COBIT principais. A.Glemža
IT paslaugų valdymo pertvarka remiantis COBIT principais. A.GlemžaIT paslaugų valdymo pertvarka remiantis COBIT principais. A.Glemža
IT paslaugų valdymo pertvarka remiantis COBIT principais. A.Glemža
 
IT strateginis planas ir COBIT 5 tikslų hierarchija. D. Jakimavičius
IT strateginis planas ir COBIT 5 tikslų hierarchija. D. JakimavičiusIT strateginis planas ir COBIT 5 tikslų hierarchija. D. Jakimavičius
IT strateginis planas ir COBIT 5 tikslų hierarchija. D. Jakimavičius
 
ITIL. Kodėl jis reikalingas Jūsų įmonei?
ITIL. Kodėl jis reikalingas Jūsų įmonei?ITIL. Kodėl jis reikalingas Jūsų įmonei?
ITIL. Kodėl jis reikalingas Jūsų įmonei?
 
COBIT sertifikacija
COBIT sertifikacijaCOBIT sertifikacija
COBIT sertifikacija
 
CRISC sertifikacija
CRISC sertifikacijaCRISC sertifikacija
CRISC sertifikacija
 
CGEIT sertifikacija
CGEIT sertifikacijaCGEIT sertifikacija
CGEIT sertifikacija
 
ISACA Lietuva. Asociacija, sertifikacijos ir mokymai
ISACA Lietuva. Asociacija, sertifikacijos ir mokymaiISACA Lietuva. Asociacija, sertifikacijos ir mokymai
ISACA Lietuva. Asociacija, sertifikacijos ir mokymai
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 

Dernier (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

CISM sertifikacija

  • 1.
  • 2. CISM Certification Details ISACA® Pasitikėjimas informacinėmis sistemomis ir jų nauda www.isaca.org/cism Laura Puodžiūnaitė ISACA Lietuvos skyriaus narė www.isaca.lt
  • 3. What is a CISM? • Demonstrate your information security management expertise. The uniquely management- focused CISM certification promotes international security practices and recognizes the individual who manages designs, and oversees and assesses an enterprise’s information security.
  • 4. What is a CISM? (continued) • Demonstrates your understanding of the relationship between an information security program and broader business goals and objectives • Distinguishes you as having not only information security expertise, but also knowledge and experience in the development and management of an information security program • Puts you in an elite peer network • Is considered essential to ongoing education, career progression and value delivery to enterprises.
  • 5. Why Become a CISM? Enhanced Knowledge and Skills • To demonstrate your willingness to improve your technical knowledge and skills Career Advancement • To demonstrate to management your commitment toward organizational excellence • To obtain credentials that employers seek • To enhance your professional image Worldwide Recognition • To be included with other professionals who have gained worldwide recognition
  • 6. CISM in the Workplace • Almost 700 are employed in organizations as the CEO, CFO or equivalent executive position. • More than 200 serve as chief audit executives, audit partners or audit heads. • Over 2,000 serve as CIOs, CISOs, or chief compliance, risk or privacy officers. • More than 7,100 are employed as security directors, managers or consultants and related staff. • Over 3,000 are employed as IT directors, managers, consultants and related staff. • Nearly 2,300 serve as audit directors, managers or consultants and related staff. • More than 2,400 are employed in managerial, consulting or related positions in IT operations or compliance.
  • 7. CISM Uniqueness What makes CISM unique? • Designed exclusively for information security managers • Criteria and exam developed from job practice analysis validated by information security managers • Experience requirement includes information security management
  • 8. CISM Target Market What is the CISM Target Market? • Individuals who design, implement and manage an enterprise’s information security program – Security managers – Security directors – Security officers – Security consultants
  • 9. CISM Job Practice (Effective June 2012) 1. Information Security Governance (24%) - Establish and maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives, information risk is managed appropriately and program resources are managed responsibly. 2. Information Risk Management and Compliance (33%) - Manage information risk to an acceptable level to meet the business and compliance requirements of the organization. 3. Information Security Program Development and Management (25%) – Establish and manage the information security program in alignment with the information security strategy. 4. Information Security Incident Management (18%) – Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact. For more details visit www.isaca.org/cismjobpractice
  • 10. How to Prepare for Certification?
  • 11. How to Develop a CISM Study Plan A proper study plan consists of several steps:  Self-appraisal  Determination of the type of study program  Having an adequate amount of time to prepare  Maintaining momentum  Readiness review  Become involved in your local chapter and explore networking opportunities and study groups.
  • 12. How to Study for the Exam • Read the Candidate’s Guide thoroughly • Study the review Manual • Work through the Review Questions, Answers & Explanations Manual, Supplement and CD • Participate in an ISACA Chapter Review Course • Read literature in areas where you need to strengthen skills • Join or organize study groups
  • 13. Ačiū už dėmesį! Daugiau informacijos apie organizuojamus ISACA sertifikacijų mokymus rasite www.bka.lt Susisiekite telefonu 8 5 2780502 arba el.paštu mokymai@bka.lt