ExamGecko
Question list
Search
Search

Question 417 - CISM discussion

Report
Export

The MOST useful technique for maintaining management support for the information security program is:

A.
informing management about the security of business operations.
Answers
A.
informing management about the security of business operations.
B.
implementing a comprehensive security awareness and training program.
Answers
B.
implementing a comprehensive security awareness and training program.
C.
identifying the risks and consequences of failure to comply with standards.
Answers
C.
identifying the risks and consequences of failure to comply with standards.
D.
benchmarking the security programs of comparable organizations.
Answers
D.
benchmarking the security programs of comparable organizations.
Suggested answer: C

Explanation:

= According to the CISM Review Manual, one of the key success factors for an information security program is to maintain management support and commitment. This can be achieved by providing regular reports to management on the security status of the organization, the effectiveness of the security controls, and the alignment of the security program with the business objectives and strategy. By informing management about the security of business operations, the information security manager can demonstrate the value and benefits of the security program, and ensure that management is aware of the security risks and issues that need to be addressed.This technique can also help to build trust and confidence between the information security manager and the senior management, and foster a culture of security within the organization1

The other options are not as effective as informing management about the security of business operations. Implementing a comprehensive security awareness and training program is important, but it is mainly targeted at the end users and staff, not the senior management. Identifying the risks and consequences of failure to comply with standards can help to justify the need for security controls, but it can also create a negative impression of the security program as being too restrictive or punitive.Benchmarking the security programs of comparable organizations can provide some insights and best practices, but it may not reflect the specific needs and context of the organization, and it may not be relevant or applicable to the management's expectations and priorities1

Reference=1: CISM Review Manual, 16th Edition, ISACA, 2020, pp. 28-29...

asked 01/10/2024
Tim Wersinger
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first