ExamGecko
Question list
Search
Search

Question 165 - CISM discussion

Report
Export

Which of the following BEST facilitates an information security manager's efforts to obtain senior management commitment for an information security program?

A.
Presenting evidence of inherent risk
Answers
A.
Presenting evidence of inherent risk
B.
Reporting the security maturity level
Answers
B.
Reporting the security maturity level
C.
Presenting compliance requirements
Answers
C.
Presenting compliance requirements
D.
Communicating the residual risk
Answers
D.
Communicating the residual risk
Suggested answer: D

Explanation:

Communicating the residual risk is the best way to facilitate an information security manager's efforts to obtain senior management commitment for an information security program. The residual risk is the level of risk that remains after applying the security controls and mitigation measures. The residual risk reflects the effectiveness and efficiency of the information security program, as well as the potential impact and exposure of the organization. The information security manager should communicate the residual risk to the senior management in a clear, concise, and relevant manner, using quantitative or qualitative methods, such as risk matrices, heat maps, dashboards, or reports. The communication of the residual risk should also include the comparison with the inherent risk, which is the level of risk before applying any security controls, and the risk appetite, which is the level of risk that the organization is willing to accept. The communication of the residual risk should help the senior management to understand the value and performance of the information security program, as well as the need and justification for further investment or improvement. Presenting evidence of inherent risk, reporting the security maturity level, and presenting compliance requirements are all important aspects of the information security program, but they are not the best ways to obtain senior management commitment. These aspects may not directly demonstrate the benefits or outcomes of the information security program, or they may not align with the business objectives or priorities of the organization. For example, presenting evidence of inherent risk may show the potential threats and vulnerabilities that the organization faces, but it may not indicate how the information security program addresses or reduces them. Reporting the security maturity level may show the progress and status of the information security program, but it may not relate to the risk level or the business impact. Presenting compliance requirements may show the legal or regulatory obligations that the organization must fulfill, but it may not reflect the actual security needs or goals of the organization.Therefore, communicating the residual risk is the best way to obtain senior management commitment for an information security program, as it shows the results and value of the information security program for the organization.Reference= CISM Review Manual 2023, page 411; CISM Practice Quiz2

asked 01/10/2024
Chien-Chung Chen
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first