CISM 2022: Information Security Governance

placeholder

The best way to improve the enterprise security stance is to align IT security solutions with business objectives.

In this course you will consider how information security must align with business strategies. You will explore the business model for information security and review the importance of identifying and classifying assets critical to a business. Next you will learn about supply chain security personnel management and the components of an information security program. You will discover the relationship between service-level agreements (SLAs) and organizational objectives and discuss the relevance of change and configuration management. Then consider how to develop organizational security policies. Lastly explore expense types chain of custody organizational culture and how the Control Objectives for Information Technologies (COBIT) framework applies to IT governance.

This course can be used to prepare for the Certified Information Security Manager (CISM) exam.