Chapter 7Cybersecurity Technology
THE CERTIFIED INFORMATION SECURITY MANAGER (CISM) DOMAINS AND SUBTOPICS COVERED IN THIS CHAPTER INCLUDE:
- Domain 3: Information Security Program
- B. Information Security Program Management
- 3B1. Information Security Control Design and Selection
- 3B2. Information Security Control Implementation and Integrations
- B. Information Security Program Management
THE CERTIFIED INFORMATION SECURITY MANAGER (CISM) SUPPORTING TASKS COVERED IN THIS CHAPTER INCLUDE:
- 25. Determine whether information security controls are appropriate and effectively manage risk to an acceptable level.
The cybersecurity field relies on a lot of technology to help achieve the goals of confidentiality, integrity, and availability. Although information security managers don't ...
Get CISM Certified Information Security Manager Study Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.