O'Reilly logo

CISM Certified Information Security Manager All-in-One Exam Guide by Peter H. Gregory

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

methodology

audit, 223–225

control self-assessment, 233–235

Cybersecurity Framework, 355–356

external audit, 231

risk management. See risk management, methodologies

standards, 85

metrics

in business case development, 270

developing key risk indicators, 179

gap assessment, 77

incident response plan, 396

and monitoring, 367–371

reporting on, 89

as security governance activity, 20, 21

security governance using. See security governance, metrics

in strategy development, 68

microsegmentation, 35, 347

mission, 22, 240

mitigating controls

change in threat probability, 156

establishing key recovery targets, 420

impact on other operations, 156

threat analysis of, 418–419

mitigation. See risk mitigation

mobile devices

collecting from departing employees, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required