• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
CISM sertifikacija
 

CISM sertifikacija

on

  • 313 views

BKA renginio "Kaip tapti lyderiais IT valdymo, saugos ir audito srityje?" pranešimas apie CISM (Certified Information Security Manager) sertifikaciją. Renginys vyko balandžio 18 d., 2013.

BKA renginio "Kaip tapti lyderiais IT valdymo, saugos ir audito srityje?" pranešimas apie CISM (Certified Information Security Manager) sertifikaciją. Renginys vyko balandžio 18 d., 2013.

Statistics

Views

Total Views
313
Views on SlideShare
313
Embed Views
0

Actions

Likes
0
Downloads
3
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    CISM sertifikacija CISM sertifikacija Presentation Transcript

    • CISM Certification DetailsISACA®Pasitikėjimas informacinėmis sistemomis ir jų naudawww.isaca.org/cismLaura PuodžiūnaitėISACA Lietuvos skyriaus narėwww.isaca.lt
    • What is a CISM?• Demonstrate your informationsecurity management expertise.The uniquely management-focused CISM certificationpromotes international securitypractices and recognizes theindividual who manages designs,and oversees and assesses anenterprise’s information security.
    • What is a CISM?(continued)• Demonstrates your understanding of the relationship between aninformation security program and broader business goals and objectives• Distinguishes you as having not only information security expertise, butalso knowledge and experience in the development and management ofan information security program• Puts you in an elite peer network• Is considered essential to ongoing education, career progression and valuedelivery to enterprises.
    • Why Become a CISM?Enhanced Knowledge and Skills• To demonstrate your willingness to improve your technicalknowledge and skillsCareer Advancement• To demonstrate to management your commitment towardorganizational excellence• To obtain credentials that employers seek• To enhance your professional imageWorldwide Recognition• To be included with other professionals who have gainedworldwide recognition
    • CISM in the Workplace• Almost 700 are employed in organizations as the CEO, CFO or equivalentexecutive position.• More than 200 serve as chief audit executives, audit partners or auditheads.• Over 2,000 serve as CIOs, CISOs, or chief compliance, risk or privacyofficers.• More than 7,100 are employed as security directors, managers orconsultants and related staff.• Over 3,000 are employed as IT directors, managers, consultants andrelated staff.• Nearly 2,300 serve as audit directors, managers or consultants and relatedstaff.• More than 2,400 are employed in managerial, consulting or relatedpositions in IT operations or compliance.
    • CISM UniquenessWhat makes CISM unique?• Designed exclusively for information security managers• Criteria and exam developed from job practice analysisvalidated by information security managers• Experience requirement includes information securitymanagement
    • CISM Target MarketWhat is the CISM Target Market?• Individuals who design, implement and manage anenterprise’s information security program– Security managers– Security directors– Security officers– Security consultants
    • CISM Job Practice(Effective June 2012)1. Information Security Governance (24%) - Establish and maintain an informationsecurity governance framework and supporting processes to ensure that theinformation security strategy is aligned with organizational goals and objectives,information risk is managed appropriately and program resources are managedresponsibly.2. Information Risk Management and Compliance (33%) - Manage information risk to anacceptable level to meet the business and compliance requirements of theorganization.3. Information Security Program Development and Management (25%) – Establish andmanage the information security program in alignment with the information securitystrategy.4. Information Security Incident Management (18%) – Plan, establish and manage thecapability to detect, investigate, respond to and recover from information securityincidents to minimize business impact.For more details visit www.isaca.org/cismjobpractice
    • How to Prepare forCertification?
    • How to Develop aCISM Study PlanA proper study plan consists of several steps: Self-appraisal Determination of the type of study program Having an adequate amount of time to prepare Maintaining momentum Readiness review Become involved in your local chapter and explorenetworking opportunities and study groups.
    • How to Study forthe Exam• Read the Candidate’s Guide thoroughly• Study the review Manual• Work through the Review Questions, Answers &Explanations Manual, Supplement and CD• Participate in an ISACA Chapter Review Course• Read literature in areas where you need to strengthenskills• Join or organize study groups
    • Ačiū už dėmesį!Daugiau informacijos apie organizuojamus ISACA sertifikacijų mokymus rasitewww.bka.ltSusisiekite telefonu 8 5 2780502 arba el.paštu mokymai@bka.lt