From Zero-Day to Cism Certified Information Security Manager: A Comprehensive Guide to Mastering Information Security Governance, Risk, and Incident Management

Author:   Andrea Piras
Publisher:   Independently Published
ISBN:  

9798286102365


Pages:   316
Publication Date:   01 June 2025
Format:   Paperback
Availability:   Available To Order   Availability explained
We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately.

Our Price $104.28 Quantity:  
Add to Cart

Share |

From Zero-Day to Cism Certified Information Security Manager: A Comprehensive Guide to Mastering Information Security Governance, Risk, and Incident Management


Add your own review!

Overview

From zero-day to CISM Certified Information Security Manager is designed as a comprehensive support tool for professionals pursuing the CISM certification, a globally recognized credential in information security management. CISM, offered by ISACA, emphasizes strategic security management and is held by over 45,000 professionals worldwide since its inception in 2002. Achieving CISM validates one's expertise in governing and managing enterprise information security programs. The primary purpose of this book is twofold: firstly, to help readers master the knowledge required to pass the CISM exam; and secondly, to serve as a managerial guideline that practitioners can reference in real-world cybersecurity roles. By blending exam-focused content with practical insights, the book bridges the gap between certification objectives and on-the-job security management practices. It aims to not only prepare candidates for the exam but also to equip security managers with frameworks and strategies that can be applied in their organizations' security programs. Managerial Cybersecurity Guide: Beyond exam preparation, this book functions as a management guide for cybersecurity professionals. It aligns with the challenges faced by security managers and IT leaders in today's complex threat landscape. Readers will find guidance on establishing governance structures, aligning security initiatives with business goals, managing risks at an enterprise level, developing robust security programs, and responding to incidents effectively. Target Audience The target audience for this book includes a broad range of professionals in the cybersecurity and risk management fields who aspire to leadership and management roles. It is written with the following readers in mind: Aspiring CISM Candidates Information Security Managers IT and Security Leaders Risk Management Professionals Consultants and Advisors Structure of the Book The book is organized into five main parts, covering the four CISM domains as defined by ISACA. Each part is presented as a dedicated chapter that delves deeply into that domain's concepts, with a balanced mix of theoretical foundations and practical application: Chapter 1 - Information Security Governance: Covers how to establish and maintain governance frameworks that align information security with business objectives and regulatory requirements. This chapter explores governance structures, roles and responsibilities, and policies. It introduces frameworks like COBIT for IT governance and standards such as ISO/IEC 27001 for security management. Chapter 2 - Information Risk Management: Focuses on risk identification, assessment, evaluation, and response strategies. It presents both qualitative and quantitative risk assessment methodologies, referencing standards like ISO 31000:2018 for risk management and frameworks like NIST's Risk Management Framework (RMF). Chapter 3-4 - Information Security Program Development and Management: Provides a comprehensive look at building and running an enterprise security program. These chapters address how to design security architecture and controls in alignment with business goals and risk assessments. Chapter 5 - Information Security Incident Management: Discusses the preparation for and management of security incidents to minimize business impact. It outlines the entire incident management life cycle: preparation, detection, analysis, containment, eradication, recovery, and post-incident learning.

Full Product Details

Author:   Andrea Piras
Publisher:   Independently Published
Imprint:   Independently Published
Dimensions:   Width: 17.80cm , Height: 1.70cm , Length: 25.40cm
Weight:   0.549kg
ISBN:  

9798286102365


Pages:   316
Publication Date:   01 June 2025
Audience:   General/trade ,  General
Format:   Paperback
Publisher's Status:   Active
Availability:   Available To Order   Availability explained
We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately.

Table of Contents

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

RGJUNE2025

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List