ExamGecko
Question list
Search
Search

Question 364 - CISM discussion

Report
Export

Which of the following is MOST important in order to obtain senior leadership support when presenting an information security strategy?

A.
The strategy aligns with management's acceptable level of risk.
Answers
A.
The strategy aligns with management's acceptable level of risk.
B.
The strategy addresses ineffective information security controls.
Answers
B.
The strategy addresses ineffective information security controls.
C.
The strategy aligns with industry benchmarks and standards.
Answers
C.
The strategy aligns with industry benchmarks and standards.
D.
The strategy addresses organizational maturity and the threat environment.
Answers
D.
The strategy addresses organizational maturity and the threat environment.
Suggested answer: A

Explanation:

The most important factor to obtain senior leadership support when presenting an information security strategy is that the strategy aligns with management's acceptable level of risk because it ensures that the strategy is consistent and compatible with the organization's risk appetite and thresholds, and reflects management's expectations and priorities for security risk management. The strategy addresses ineffective information security controls is not a very important factor because it does not indicate how the strategy will improve or enhance the security controls or performance. The strategy aligns with industry benchmarks and standards is not a very important factor because it does not indicate how the strategy will differentiate or innovate the organization's security capabilities or practices. The strategy addresses organizational maturity and the threat environment is not a very important factor because it does not indicate how the strategy will advance or adapt the organization's security posture or resilience.

Reference: https://www.isaca.org/resources/isaca-journal/issues/2016/volume-4/technical-security-standards-for-information-systems https://www.isaca.org/resources/isaca-journal/issues/2017/volume-2/how-to-align-security-initiatives-with-business-goals-and-objectives

asked 01/10/2024
Jonny McKitrick
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first