ExamGecko
Question list
Search
Search

Question 576 - CISM discussion

Report
Export

A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?

A.
Update in accordance with the best business practices.
Answers
A.
Update in accordance with the best business practices.
B.
Perform a risk assessment of the current IT environment.
Answers
B.
Perform a risk assessment of the current IT environment.
C.
Gain an understanding of the current business direction.
Answers
C.
Gain an understanding of the current business direction.
D.
Inventory and review current security policies.
Answers
D.
Inventory and review current security policies.
Suggested answer: D

Explanation:

The next step for the information security manager should be to inventory and review the current security policies to understand the existing security requirements, controls, and gaps. This will help to identify the areas that need to be updated, revised, or replaced to align with the current business needs and objectives, as well as the legal and regulatory requirements. Updating the policies in accordance with the best business practices, performing a risk assessment of the current IT environment, or gaining an understanding of the current business direction are important activities, but they should be done after reviewing the current security policies.

Reference= CISM Review Manual, 16th Edition eBook1, Chapter 1: Information Security Governance, Section: Information Security Policies, Standards, Procedures and Guidelines, Subsection: Information Security Policies, Page 28.

asked 01/10/2024
Sergio Zozulenko
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first