ISC2 ISSMP Exam Syllabus Topics:
Topic | Details |
---|---|
Leadership and Business Management - 22% | |
Establish Security’s Role in Organizational Culture, Vision, and Mission | - Define information security program vision and mission - Align security with organizational goals, objectives, and values - Explain business processes and their relationships - Describe the relationship between organizational culture and security |
Align Security Program with Organizational Governance | - Identify and navigate organizational governance structure - Recognize roles of key stakeholders - Recognize sources and boundaries of authorization - Negotiate organizational support for security initiatives |
Define and Implement Information Security Strategies | - Identify security requirements from business initiatives - Evaluate capacity and capability to implement security strategies - Manage implementation of security strategies - Review and maintain security strategies - Describe security engineering theories, concepts, and methods |
Define and Maintain Security Policy Framework | - Determine applicable external standards - Manage data classification - Establish internal policies - Obtain organizational support for policies - Develop procedures, standards, guidelines, and baselines - Ensure periodic review of security policy framework |
Manage Security Requirements in Contracts and Agreements | - Evaluate service management agreements (e.g., risk, financial) - Govern managed services (e.g., infrastructure, cloud services) - Manage impact of organizational change (e.g., mergers and acquisitions, outsourcing) - Monitor and enforce compliance with contractual agreements |
Oversee Security Awareness and Training Programs | - Promote security programs to key stakeholders - Identify training needs by target segment - Monitor and report on effectiveness of security awareness and training programs |
Define, Measure, and Report Security Metrics | - Identify Key Performance Indicators (KPI) - Relate KPIs to the risk position of the organization - Use metrics to drive security program development and operations |
Prepare, Obtain, and Administer Security Budget | - Manage and report financial responsibilities - Prepare and secure annual budget - Adjust budget based on evolving risks |
Manage Security Programs | - Build cross-functional relationships - Identify communication bottlenecks and barriers - Define roles and responsibilities - Resolve conflicts between security and other stakeholders - Determine and manage team accountability |
Apply Product Development and Project Management Principles | - Describe project lifecycle - Identify and apply appropriate project management methodology - Analyze time, scope, and cost relationship |
Systems Lifecycle Management - 19% | |
Manage Integration of Security into System Development Lifecycle (SDLC) | - Integrate information security gates (decision points) and milestones into lifecycle - Implement security controls into system lifecycle - Oversee configuration management processes |
Integrate New Business Initiatives and Emerging Technologies into the Security Architecture | - Participate in development of business case for new initiatives to integrate security - Address impact of new business initiatives on security |
Define and Oversee Comprehensive Vulnerability Management Programs (e.g., vulnerability scanning, penetration testing, threat analysis) | - Classify assets, systems, and services based on criticality to business - Prioritize threats and vulnerabilities - Oversee security testing - Mitigate or remediate vulnerabilities based on risk |
Manage Security Aspects of Change Control | - Integrate security requirements with change control process - Identify stakeholders - Oversee documentation and tracking - Ensure policy compliance |
Risk Management - 18% | |
Develop and Manage a Risk Management Program | - Communicate risk management objectives with risk owners and other stakeholders - Understand principles for defining risk tolerance - Determine scope of organizational risk program - Obtain and verify organizational asset inventory - Analyze organizational risk management requirements - Determine the impact and likelihood of threats and vulnerabilities - Determine countermeasures, compensating and mitigating controls - Recommend risk treatment options and when to apply them |
Conduct Risk Assessments (RA) | - Identify risk factors - Manage supplier, vendor, and third-party risk - Understand supply chain security management - Conduct Business Impact Analysis (BIA) - Manage risk exceptions - Monitor and report on risk - Perform cost–benefit analysis |
Threat Intelligence and Incident Management - 17% | |
Establish and Maintain Threat Intelligence Program | - Synthesize relevant data from multiple threat intelligence sources - Conduct baseline analysis - Review anomalous behavior patterns for potential concerns - Conduct threat modeling - Identify ongoing attacks - Correlate related attacks - Create actionable alerting to appropriate resources |
Establish and Maintain Incident Handling and Investigation Program | - Develop program documentation - Establish incident response case management process - Establish Incident Response Team (IRT) - Understand and apply incident management methodologies - Establish and maintain incident handling process - Establish and maintain investigation process - Quantify and report financial and operational impact of incidents and investigations to stakeholders - Conduct Root Cause Analysis (RCA) |
Contingency Management - 10% | |
Oversee Development of Contingency Plans (CP) | - Analyze challenges related to the Business Continuity (BC) process (e.g., time, resources, verification) - Analyze challenges related to the Disaster Recovery (DR) process (e.g., time, resources, verification) - Analyze challenges related to the Continuity of Operations Plan (COOP) - Coordinate with key stakeholders - Define internal and external incident communications plans - Define incident roles and responsibilities - Determine organizational drivers and policies - Reference Business Impact Analysis (BIA) - Manage third-party dependencies - Prepare security management succession plan |
Guide Development of Recovery Strategies | - Identify and analyze alternatives - Recommend and coordinate recovery strategies - Assign recovery roles and responsibilities |
Maintain Business Continuity Plan (BCP), Continuity of Operations Plan (COOP), and Disaster Recovery Plan (DRP) | - Plan testing, evaluation, and modification - Determine survivability and resiliency capabilities - Manage plan update process |
Manage Recovery Process | - Declare disaster - Implement plan - Restore normal operations - Gather lessons learned - Update plan based on lessons learned |
Law, Ethics, and Security Compliance Management - 14% | |
Understand the Impact of Laws that Relate to Information Security | - Understand global privacy laws - Understand legal jurisdictions the organization operates within (e.g., trans-border data flow) - Understand export laws - Understand intellectual property laws - Understand industry regulations affecting the organization - Advise on potential liabilities |
Understand Management Issues as Related to the (ISC)2 Code of Ethics | |
Validate Compliance in Accordance with Applicable Laws, Regulations, and Industry Best Practices | - Obtain leadership buy-in - Select compliance framework(s) - Implement validation procedures outlined in framework(s) - Define and utilize security compliance metrics to report control effectiveness and potential areas of improvement |
Coordinate with Auditors, and Assist with the Internal and External Audit Process | - Prepare - Schedule - Perform audit - Evaluate findings - Formulate response - Validate implemented mitigation and remediation actions |
Document and Manage Compliance Exceptions |
How to book the CISSP-ISSMP Exam
These are following steps for registering the ISC CISSP-ISSMP exam. Step 1: Visit to Pearson VUE Exam Registration Step 2: Signup/Login to Pearson VUE account Step 3: Search for ISC CISSP-ISSMP Exam Certifications Exam Step 4: Select Date, time and confirm with payment method
Renew contents for free
After your purchase of our CISSP-ISSMP training materials: CISSP-ISSMP - Information Systems Security Management Professional, you can get a service of updating the materials when it has new contents. There are some services we provide for you. Our experts will revise the contents of our CISSP-ISSMP exam preparatory. We will never permit any mistakes existing in our CISSP-ISSMP - Information Systems Security Management Professional actual lab questions, so you can totally trust us and our products with confidence. We will send you an e-mail which contains the newest version when CISSP-ISSMP training materials: CISSP-ISSMP - Information Systems Security Management Professional have new contents lasting for one year, so hope you can have a good experience with our products.
After purchase, Instant Download: Upon successful payment, Our systems will automatically send the product you have purchased to your mailbox by email. (If not received within 12 hours, please contact us. Note: don't forget to check your spam.)
Dear customers, welcome to browse our products. As the society developing and technology advancing, we live in an increasingly changed world, which have a great effect on the world we live. In turn, we should seize the opportunity and be capable enough to hold the chance to improve your ability even better. We offer you our CISSP-ISSMP test braindumps: CISSP-ISSMP - Information Systems Security Management Professional here for you reference. So let us take an unequivocal look of the CISSP-ISSMP exam cram as follows
Considerate service
We always adhere to the customer is God and we want to establish a long-term relation of cooperation with customers, which are embodied in the considerate service we provided. We provide services include: pre-sale consulting and after-sales service. Firstly, if you have any questions about purchasing process of the CISSP-ISSMP training materials: CISSP-ISSMP - Information Systems Security Management Professional, and you could contact our online support staffs. Furthermore, we will do our best to provide best products with reasonable price and frequent discounts. Secondly, we always think of our customers. After your purchase the materials, we will provide technology support if you are under the circumstance that you don't know how to use the CISSP-ISSMP exam preparatory or have any questions about them.
High quality questions
There are nothing irrelevant contents in the CISSP-ISSMP exam braindumps: CISSP-ISSMP - Information Systems Security Management Professional, but all high quality questions you may encounter in your real exam. Many exam candidates are afraid of squandering time and large amount of money on useless questions, but it is unnecessary to worry about ours. You will not squander time or money once you bought our CISSP-ISSMP certification training. If you are uncertain about it, there are free demos preparing for you freely as a reference. With the high quality features and accurate contents in reasonable prices, anyone can afford such a desirable product of our company. So it is our mutual goal to fulfil your dreams of passing the ISC CISSP-ISSMP - Information Systems Security Management Professional actual test and getting the certificate successfully.
The newest updates
Our questions are never the stereotypes, but always being developed and improving according to the trend. After scrutinizing and checking the new questions and points of ISC CISSP-ISSMP exam, our experts add them into the CISSP-ISSMP test braindumps: CISSP-ISSMP - Information Systems Security Management Professional instantly and avoid the missing of important information for you, then we send supplement to you freely for one years after you bought our CISSP-ISSMP exam cram, which will boost your confidence and refrain from worrying about missing the newest test items.