ISACA CISM Training Course
Designed specifically for managers, Certified Information Security Manager (CISM) is one of the most highly coveted – and highest paid – cyber security certifications out there. Our next-gen online CISM course provides the deep-dive into cyber security best practice you’ll need to become a cyber visionary in your organization and, of course, pass the CISM exam with flying colors.
NEXT-GEN ONLINE ISACA CISM TRAINING
ISACA CISM TRAINING
Four days, four domains: Information Security Governance, Information Risk Management, Information Security Program Development and Management, and Information Security Incident Management. CISM will help you hone your skills and leverage your experience to take the next step in your cybersecurity career. DoD 8140/8570 compliant.
Key Features of ISACA CISM Training Exam Voucher Included
Exam Voucher Included
Early Registration: 9+ Weeks Prior to Start Date
General Registration: 2 - 9 Weeks Prior to Start Date
Late Registration: Fewer than 2 Weeks Prior to Start Date
- Live Instructor?
- Live Online?
- Guaranteed to Run?
Our ISACA CISM Instructors
Mark Hillyard (CISSP, ITIL Expert, ITIL MP) has worked in the IT industry for more than 20 years, including as a Public Key Infrastructure (PKI) and Domain Name System (DNS) Architect for GoDaddy.com. His experience ranges from some of the largest system infrastructures supporting the internet to boutique, game-changing start-ups. He has led large-scale data center asset management initiatives and has developed and managed such systems for enterprise infrastructures. Now a full-time Senior Advisor and resident InfoSec guru, Mark is helping transform IT organizations through process management, security development, and training.
Marguerite Finnigan, PhD
Marguerite is a cyber security consulting and training specialist with a passion for increasing awareness and technical understanding of global security threats and solutions. She has worked in the IT field since the mid-1980s and has worked around the world for the last 10 years training executives and operatives in major corporate organizations, financial institutions, and military organizations. She has addressed audiences at national conferences on behalf of (ISC)², where she has been a lead cyber security instructor for 10 years. She currently holds a “Secret” level security clearance with the US government.
"I liked that the training was dynamic – that it went beyond lectures to include hands-on activities and group work to solidify the information our employees received. The best thing about this whole experience has been how the training has transformed us as a company, and we’re still going through that transformation. If I had to rate the experience of working with Beyond20, I’d give them an 11 out of 10. They were invested in our business and what we were trying to do right from the start – and we’ve had great success as a result."
Debbie L., Director of HR
“It was huge for Board of Pensions (BOP) to start speaking the same language, have a common understanding, be equipped to drive culture change, and change everyone’s thinking. Now, the team is creating something together."
Nick , Assistant Director, Service Desk
"One important factor that makes Beyond20 a great organization is that the instructors work as consultants to organizations both in the private and public sector. The instructors have an excellent command of the material and have real-world experience with designing and implementing these principles. With their background, they can adapt discussion to a particular client and help students understand concepts based on how they fit into their organizations.”
Lucinda F., Manager, IT Field Operations
"The instructor knew his stuff! The materials were well designed and the course was well paced and very appropriate for our group."
Allan C., Project Engagement Manager
Need training for a group?
FREQUENTLY ASKED QUESTIONS
- Establish and/or maintain an information security strategy in alignment with organizational goals and objectives to guide the establishment and/or ongoing management of the information security program.
- Establish and/or maintain an information security governance framework to guide activities that support the information security strategy.
- Integrate information security governance into corporate governance to ensure that organizational goals and objectives are supported by the information security program.
- Establish and maintain information security policies to guide the development of standards, procedures and guidelines in alignment with enterprise goals and objectives.
- Develop business cases to support investments in information security.
- Identify internal and external influences to the organization (e.g., emerging technologies, social media, business environment, risk tolerance, regulatory requirements, third-party considerations, threat landscape) to ensure that these factors are continually addressed by the information security strategy.
- Gain ongoing commitment from senior leadership and other stakeholders to support the successful implementation of the information security strategy.
- Define, communicate, and monitor information security responsibilities throughout the organization (e.g., data owners, data custodians, end users, privileged or high-risk users) and lines of authority.
- Establish, monitor, evaluate and report key information security metrics to provide management with accurate and meaningful information regarding the effectiveness of the information security strategy.
- Establish and/or maintain a process for information asset classification to ensure that measures taken to protect assets are proportional to their business value.
- Identify legal, regulatory, organizational and other applicable requirements to manage the risk of noncompliance to acceptable levels.
- Ensure that risk assessments, vulnerability assessments and threat analyses are conducted consistently, at appropriate times, and to identify and assess risk to the organization’s information.
- Identify, recommend or implement appropriate risk treatment/response options to manage risk to acceptable levels based on organizational risk appetite.
- Determine whether information security controls are appropriate and effectively manage risk to an acceptable level.
- Facilitate the integration of information risk management into business and IT processes (e.g., systems development, procurement, project management) to enable a consistent and comprehensive information risk management program across the organization.
- Monitor for internal and external factors (e.g., key risk indicators [KRIs], threat landscape, geopolitical, regulatory change) that may require reassessment of risk to ensure that changes to existing, or new, risk scenarios are identified and managed appropriately.
- Report noncompliance and other changes in information risk to facilitate the risk management decision-making process.
- Ensure that information security risk is reported to senior management to support an understanding of potential impact on the organizational goals and objectives.
- Establish and/or maintain the information security program in alignment with the information security strategy.
- Align the information security program with the operational objectives of other business functions (e.g., human resources [HR], accounting, procurement and IT) to ensure that the information security program adds value to and protects the business.
- Identify, acquire and manage requirements for internal and external resources to execute the information security program.
- Establish and maintain information security processes and resources (including people and technologies) to execute the information security program in alignment with the organization’s business goals.
- Establish, communicate and maintain organizational information security standards, guidelines, procedures and other documentation to guide and enforce compliance with information security policies.
- Establish, promote and maintain a program for information security awareness and training to foster an effective security culture.
- Integrate information security requirements into organizational processes (e.g., change control, mergers and acquisitions, system development, business continuity, disaster recovery) to maintain the organization’s security strategy.
- Integrate information security requirements into contracts and activities of third parties (e.g., joint ventures, outsourced providers, business partners, customers) and monitor adherence to established requirements in order to maintain the organization’s security strategy.
- Establish, monitor and analyze program management and operational metrics to evaluate the effectiveness and efficiency of the information security program.
- Compile and present reports to key stakeholders on the activities, trends and overall effectiveness of the IS program and the underlying business processes in order to communicate security performance.
- Establish and maintain an organizational definition of, and severity hierarchy for, information security incidents to allow accurate classification and categorization of and response to incidents.
- Establish and maintain an incident response plan to ensure an effective and timely response to information security incidents.
- Develop and implement processes to ensure the timely identification of information security incidents that could impact the business.
- Establish and maintain processes to investigate and document information security incidents in order to determine the appropriate response and cause while adhering to legal, regulatory and organizational requirements.
- Establish and maintain incident notification and escalation processes to ensure that the appropriate stakeholders are involved in incident response management.
- Organize, train and equip incident response teams to respond to information security incidents in an effective and timely manner.
- Test, review and revise (as applicable) the incident response plan periodically to ensure an effective response to information security incidents and to improve response capabilities.
- Establish and maintain communication plans and processes to manage communication with internal and external entities.
- Conduct post-incident reviews to determine the root cause of information security incidents, develop corrective actions, reassess risk, evaluate response effectiveness and take appropriate remedial actions.
- Establish and maintain integration among the incident response plan, business continuity plan and disaster recovery plan.
Subject Matter Expertise
We understand that your goal is to learn effectively and get certified in one shot. After all, certification training can be a substantial investment. As such, it’s critical to us that you learn from someone who will help you retain key concepts and get you across the finish line efficiently.
But at the same time, who wants to take a boring class? If we’re going to spend a lot of time looking at screens, the material should at least be engaging. That’s why we’re hyper-focused on bringing variety to your virtual training experience. People learn differently, so we use several methods to teach concepts throughout the day.
White Glove Service
We all know that bad customer service is one of the most frustrating things there is. That’s why we’ve endeavored to create the kind of training experience that we would want for ourselves.
We're a US-based organization with offices in DC, Phoenix, and San Diego. Come through! Otherwise, we'll be happy to meet you virtually.
Rest assured: At Beyond20, our instructors are some of the world’s best. Not only does our training staff have decades of experience leading real-world cyber security initiatives, but in many cases, we are the official authors of authoritative publications (e.g., ITIL). Working with Beyond20 means learning from the top subject matter experts out there. It means training and taking your exams with confidence.
Next-Gen Virtual Training
Depending on the course, this can include interactive whiteboards, breakout rooms, virtual sticky note walls, and more. We take this approach not only because it's more fun than simply memorizing terms, but because it works.
From the instant that you first reach out to us with a quick question, to that glorious moment when you learn you’ve earned the certification, our job is to make sure that every interaction you have with us is a positive one. If you look at our hundreds of Google-verified reviews, you’ll see that we take it seriously! Beyond20 is not a risky choice.
If you're PMP-certified, our courses will earn you PDUs!