Date | Venue | Fee | |
---|---|---|---|
10 Feb - 14 Feb 2025 | Dubai – UAE | $ 4,950 | Register Now |
20 Oct - 24 Oct 2025 | London - UK | $ 5,950 | Register Now |
08 Dec - 12 Dec 2025 | Dubai – UAE | $ 4,950 | Register Now |
About the Course
Information security management has become increasingly vital as organisations face growing threats to their digital assets. In an era where cyberattacks are more frequent and sophisticated, the need for robust security measures is paramount. Ensuring that information security is effectively managed is essential for protecting sensitive data and maintaining the trust of customers and stakeholders. The Certified Information Security Manager (CISM) Exam Preparation Training is designed to equip delegates with the knowledge and skills necessary to manage and govern information security effectively, following the globally recognised standards set by ISACA.
ISACA, a leading authority in information security, governance, risk management, and assurance, provides the framework for this comprehensive course. By focusing on ISACA's Certified Information Security Manager (CISM) certification, delegates will understand how to develop and implement security governance structures, risk management frameworks, and incident management processes that align with organisational goals. It emphasizes the critical role of security management in achieving business objectives while ensuring compliance with industry standards.
Throughout this training program, delegates will prepare for the CISM exam by exploring key concepts, best practices, and strategies essential for success. They will be well-equipped to lead their organisations in implementing robust security measures that meet ISACA's high standards, ultimately enhancing their ability to protect against and respond to security threats in a dynamic and complex environment.
Core Objectives
By the end of the training course, delegates will be able to:
- Understand the key concepts and principles of information security governance to align security strategies with business objectives
- Analyse various risk assessment methodologies to identify and mitigate potential threats to information assets
- Evaluate the effectiveness of information security programs by applying performance measurement techniques
- Develop a comprehensive incident response plan that includes detection, communication, and post-incident review procedures
- Apply relevant security standards and frameworks to integrate best practices into the organisation's security management
- Create a business continuity and disaster recovery plan to ensure organisational resilience in the face of security incidents
- Assess and prepare for the CISM exam by reviewing key concepts, practicing exam questions, and developing effective time management strategies
Training Approach
This training course will combine interactive lectures, hands-on exercises, and group discussions to reinforce key concepts. Delegates will engage in real-world scenarios to apply theoretical knowledge, enhancing their practical skills and problem-solving abilities. Additionally, regular assessments and examinations will be used to measure progress and ensure a thorough understanding of the material.
The Attendees
This training course is designed for professionals responsible for managing and overseeing information security in their organisations. These professionals are typically those in leadership roles within the IT and security domains, seeking to enhance their knowledge and skills in accordance with ISACA standards.
It will be valuable to the professionals but not limited to the following:
- Information Security Managers
- IT Security Professionals
- Risk Management Officers
- Compliance Officers
- Network Security Engineers
- Security Auditors
- IT Governance Professionals
- Chief Information Security Officers (CISOs)
- IT Managers
- Systems Administrators
Daily Discussion
DAY ONE: INFORMATION SECURITY GOVERNANCE
- Overview of Information Security Governance Frameworks
- Establishing an Information Security Governance Structure
- Roles and Responsibilities of Information Security Managers
- Aligning Security Governance with Business Objectives
- Policy Development and Communication Strategies
- Risk Management Frameworks and Their Application
- Key Metrics for Measuring Governance Effectiveness
- Integration of Security Governance with Organisational Strategy
- Stakeholder Engagement and Communication in Governance
DAY TWO: INFORMATION RISK MANAGEMENT
- Fundamentals of Risk Management Concepts
- Risk Assessment Methodologies and Techniques
- Identifying and Analysing Information Assets and Threats
- Risk Mitigation Strategies and Controls
- Risk Communication and Reporting
- Developing Risk Management Frameworks
- Compliance with Legal and Regulatory Requirements
- Creating Risk Treatment Plans
- Continuous Monitoring of Risks and Controls
DAY THREE: INFORMATION SECURITY PROGRAM DEVELOPMENT AND MANAGEMENT
- Creating an Information Security Program Roadmap
- Security Program Development Lifecycle
- Resource Allocation and Budgeting for Security Initiatives
- Conducting Security Awareness and Training Initiatives
- Measuring Security Program Effectiveness and KPIs
- Incident Response Planning and Management
- Ensuring Alignment with IT and Business Strategies
- Incorporating Industry Best Practices and Guidelines
- Evaluating the Effectiveness of Security Programs
DAY FOUR: INFORMATION SECURITY INCIDENT MANAGEMENT
- Overview of Incident Management Processes
- Developing an Incident Response Plan
- Detection and Reporting of Security Incidents
- Investigation and Analysis of Security Breaches
- Communication During Security Incidents
- Conducting Post-Incident Analysis and Improvement
- Regulatory and Legal Considerations in Incident Management
- Building an Incident Response Team
- Developing a Crisis Communication Plan
DAY FIVE: INFORMATION SECURITY MANAGEMENT FRAMEWORKS AND BEST PRACTICES
- Overview of Relevant Security Standards and Frameworks
- Integrating Security Management Frameworks (e.g., NIST, ISO)
- Developing a Business Continuity and Disaster Recovery Plan
- Aligning Security Strategies with Organisational Goals
- Best Practices for Security Program Implementation
- Preparing for the CISM Exam – Tips and Resources
- Mock Exam and Review of Key Concepts
- Analysing Exam Structure and Question Types
Course Enquiry
A XCalibre Professional Development Certification will be given to the delegates upon successful completion of this training course.