ExamGecko
Question list
Search
Search

Question 177 - CISM discussion

Report
Export

Of the following, whose input is of GREATEST importance in the development of an information security strategy?

A.
Process owners
Answers
A.
Process owners
B.
End users
Answers
B.
End users
C.
Security architects.
Answers
C.
Security architects.
D.
Corporate auditors
Answers
D.
Corporate auditors
Suggested answer: A

Explanation:

Process owners are the people who are responsible for the design, execution, and improvement of the business processes that support the organization's objectives and operations. Process owners have the greatest importance in the development of an information security strategy, as they provide the input and feedback on the business requirements, expectations, and priorities that the information security strategy should address and support. Process owners also help to identify and assess the risks and impacts that the business processes face, and to define and implement the security controls and measures that can mitigate or reduce them. Process owners also facilitate the alignment and integration of the information security strategy with the business strategy, as well as the communication and collaboration among the various stakeholders and functions involved in the information security program. End users, security architects, and corporate auditors are all important stakeholders in the information security program, but they do not have the greatest importance in the development of an information security strategy. End users are the people who use the information systems and services that the information security program protects and enables. End users provide the input and feedback on the usability, functionality, and performance of the information systems and services, as well as the security awareness and behavior that they exhibit. Security architects are the people who design and implement the security architecture that supports the information security strategy. Security architects provide the input and feedback on the technical requirements, capabilities, and solutions that the information security strategy should leverage and optimize. Corporate auditors are the people who evaluate and verify the compliance and effectiveness of the information security program. Corporate auditors provide the input and feedback on the standards, regulations, and best practices that the information security strategy should follow and adhere to.Therefore, process owners have the greatest importance in the development of an information security strategy, as they provide the input and feedback on the business requirements, expectations, and priorities that the information security strategy should address and support.Reference= CISM Review Manual 2023, page 311; CISM Practice Quiz2

asked 01/10/2024
Raed Abu-Haija
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first