ExamGecko
Question list
Search
Search

Question 670 - CISM discussion

Report
Export

Which of the following is the GREATEST benefit of incorporating information security governance into the corporate governance framework?

A.
Heightened awareness of information security strategies
Answers
A.
Heightened awareness of information security strategies
B.
Improved process resiliency in the event of attacks
Answers
B.
Improved process resiliency in the event of attacks
C.
Promotion of security-by-design principles to the business
Answers
C.
Promotion of security-by-design principles to the business
D.
Management accountability for information security
Answers
D.
Management accountability for information security
Suggested answer: D

Explanation:

The greatest benefit of incorporating information security governance into the corporate governance framework is D. Management accountability for information security. This is because management accountability for information security means that the senior management and the board of directors are responsible for defining, overseeing, and supporting the information security strategy, policies, and objectives of the organization, and ensuring that they are aligned with the business goals, stakeholder expectations, and regulatory requirements. Management accountability for information security also means that the senior management and the board of directors are accountable for the performance, value, and effectiveness of the information security program, and for the management and mitigation of the information security risks and incidents. Management accountability for information security can help to foster a culture of security awareness and responsibility, and to enhance the trust and confidence of the customers, partners, and regulators in the organization's information security capabilities.

Management accountability for information security means that the senior management and the board of directors are responsible for defining, overseeing, and supporting the information security strategy, policies, and objectives of the organization, and ensuring that they are aligned with the business goals, stakeholder expectations, and regulatory requirements. (From CISM Manual or related resources)

Reference = CISM Review Manual 15th Edition, Chapter 1, Section 1.2.1, page 181; CISM domain 1: Information security governance [Updated 2022] | Infosec2; Information Security Governance: Guidance for Boards of Directors and Executive Management, 2nd Edition3

asked 01/10/2024
Zaw Zaw
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first