ExamGecko
Question list
Search
Search

Question 228 - CISM discussion

Report
Export

Which of the following is the BEST tool to monitor the effectiveness of information security governance?

A.
Key performance indicators (KPIs)
Answers
A.
Key performance indicators (KPIs)
B.
Balanced scorecard
Answers
B.
Balanced scorecard
C.
Business impact analysis (BIA)
Answers
C.
Business impact analysis (BIA)
D.
Risk profile
Answers
D.
Risk profile
Suggested answer: A

Explanation:

Key performance indicators (KPIs) are the best tool to monitor the effectiveness of information security governance because they are quantifiable and measurable metrics that reflect the achievement of the information security objectives and the alignment of the information security strategy with the business goals. KPIs can help to evaluate the performance, efficiency, quality, and value of the information security processes and activities, and to identify the areas of improvement or adjustment. KPIs can also provide feedback to the management and the stakeholders on the status and progress of the information security governance.Some examples of KPIs for information security governance are: percentage of compliance with security policies and standards, number and severity of security incidents, return on security investment, and maturity level of information security capabilities12.

A balanced scorecard is a strategic management tool that translates the vision and mission of the organization into four perspectives: financial, customer, internal process, and learning and growth. A balanced scorecard can help to align the information security strategy with the business strategy, but it is not a tool to monitor the effectiveness of information security governance.A balanced scorecard can include KPIs as part of its measurement system, but it is not a substitute for KPIs13.

A business impact analysis (BIA) is a process of assessing the potential consequences of a disruption to the organization's critical business functions or processes. A BIA can help to identify the critical assets, dependencies, recovery priorities, and recovery objectives for the information security program, but it is not a tool to monitor the effectiveness of information security governance.A BIA is a one-time or periodic activity, not a continuous monitoring process14.

A risk profile is a representation of the organization's exposure to various types of risks, such as operational, financial, strategic, or reputational. A risk profile can help to identify the sources, likelihood, and impact of potential threats to the organization's assets and objectives, and to determine the risk appetite and tolerance for the information security program, but it is not a tool to monitor the effectiveness of information security governance.A risk profile is a snapshot of the organization's risk posture at a given point in time, not a dynamic monitoring tool15.Reference= CISM Review Manual, 16th Edition, pages 23-241; CISM Exam Content Outline, Domain 1, Knowledge Statement 1.122; CISM Review Questions, Answers & Explanations Database, Question ID 10093; CISM Review Questions, Answers & Explanations Database, Question ID 10104; CISM Review Questions, Answers & Explanations Database, Question ID 10115

asked 01/10/2024
helal altarsha
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first