Exam Registration & Administration
Certification Requirements | Exam Content | Other
Exam Registration & Administration
- When will I receive my admission ticket for the December 2013 exam?
- What is the exact location of the test site for my December 2013 exam?
- What time should I arrive at the exam site?
- Can I still defer my December 2013 exam?
- What should I bring to the exam?
- What is the next exam date?
- When will registration open for the 14 June 2014 exam?
- How do I provide comments on testing conditions?
- How is the exam scored?
- Why does it take 5 weeks to process CISA/CISM exam results and 8 weeks to process CGEIT/CRISC exam results?
- Why doesn’t ISACA currently offer computer-based testing (CBT)?
1. When will I receive my admission ticket for the December 2013 exam?
Admission tickets for the December 2013 exam were released via email on 4 November 2013. Hard copy tickets were sent to candidates the week of 4 November via the post. Candidates can use either a print out of the email e-ticket or the postal copy for entry into the exam.
Candidates can also reprint the ticket online. To reprint, log in to www.isaca.org from the home page, which upon a successful login will redirect you to the 'My ISACA' tab then click on the myCERTIFICATIONS tab where you will find a link to “Print Admission Ticket”.
2. What is the exact location of the test site for my December 2013 exam?
The exam details, including the exact exam location, will be listed on your exam admission ticket. To ensure that you arrive in plenty of time for the exam, we recommend that you become familiar with the exact location and the best travel route to your exam site prior to the date of the exam. Test center phone numbers and web site references will be provided (when available) to assist you in obtaining directions to the facility.
3. What time should I arrive at the exam site?
Your arrival time will be listed on your exam ticket. Please check your admission ticket for the exam time for your exam location as the time can vary by site.
NO CANDIDATE WILL BE ADMITTED TO THE TEST CENTER ONCE THE CHIEF EXAMINER BEGINS READING THE ORAL INSTRUCTIONS. Any candidate who arrives after the oral instructions have begun will not be allowed to sit for the exam and will forfeit their registration fee.
4. Can I still defer my December 2013 exam?
Deferrals for the December 2013 exam are no longer available.
5. What should I bring to the exam?
In addition to your admission ticket, bring several sharpened No. 2 or HB pencils, an eraser, and an acceptable form of photo identification such as a driver’s license, passport or government ID. This ID must be a current and original government issued identification that contains both your name as it appears on the admission ticket and your photograph. Any candidate who does not provide an acceptable form of identification will not be allowed to sit for the exam and will forfeit their registration fee.
Candidates are not allowed to bring any type of communication device (i.e., cell phones, tablets, smart watches, mobile devices, etc.) into the test center. If a candidate is observed with any communication device during the exam administration, his/her exam will be voided and he/she will be asked to immediately leave the test site.
Please visit www.isaca.org/cisabelongings, www.isaca.org/cismbelongings, www.isaca.org/cgeitbelongings, and www.isaca.org/criscbelongings for a list of items which are permitted and are not permitted in the exam site.
6. What is the next exam date?
The next opportunity to sit for the exam is 14 June 2014.
7. When will registration open for the 14 June 2014 exams?
Registration for the 14 June 2014 exams are now open. You can register for the June 2014 exam at www.isaca.org/examreg.
8. How do I provide comments on testing conditions?
Candidates wishing to comment on the test administration conditions may do so at the conclusion of the testing session by completing the “Test Administration Questionnaire.” The Test Administration Questionnaire is presented at the back of the examination booklet and your questionnaire answers should be entered in boxes P through S of the Special Codes section (Grid No. 4) on the front of your Answer Sheet.
Candidates who wish to address any additional comments or concerns about the examination administration or content of the examination should contact ISACA international headquarters by e-mail (firstname.lastname@example.org). These comments or concerns are to be received by ISACA within 2 weeks after the examination date. Only those comments received by ISACA during the first 2 weeks after the exam administration will be considered in the final scoring process of the examination.
9. How is the exam scored?
ISACA uses a 200-800 point scale with 450 as the passing mark for the exams. A scaled score is a conversion of the raw score on an exam to a common scale. It is important to note that the exam score is not based on an arithmetic or percent average. For example, the scaled score of 800 represents a perfect score with all 200 questions answered correctly; a scaled score of 200 is the lowest score possible and signifies that only a small number of questions were answered correctly.
A candidate must receive a scaled score of 450 or higher to pass the exam. A score of 450 represents a minimum consistent standard of knowledge as established for the exam by the respective ISACA Certification Committee. The passing score of 450 represents the minimum number of questions that must be answered correctly by the candidate in order to demonstrate practical application of the job task and knowledge statements. A candidate receiving a passing score may then apply for certification if all other requirements are met.
10. Why does it take 5 weeks to process CISA/CISM exam results and 8 weeks to process CGEIT/CRISC exam results?
ISACA takes the processing of exam results very seriously. Best practice dictates that item performance be carefully reviewed after each exam administration to ensure that items performed in a fair and consistent manner. Also, ISACA’s policy is to release the results of all of our exams together, rather than individually as they are processed.
We are now very pleased that starting in 2013, CISA and CISM exam results will be released within 5 weeks of the exam administration (in place of the 8 weeks as currently exists for CGEIT and CRISC). This change was viable due to the maturity of the respective exams and item pool.
ISACA works with its testing agency to administer our exams in over 250 locations worldwide. The first step in the grading process is the review of the preliminary statistical analysis which begins when a majority of answer sheets are returned. This usually occurs a week or two after the exam administration date. This preliminary analysis is conducted on each exam item in every language that the exam item is offered. Currently, ISACA offers 4 different exams, in up to 10 languages. This step is essential because it identifies items that did not perform well based on statistics. Items with poor statistics are reviewed by the members of the respective certification committee. If an error or inconsistency is discovered within an item, the answer key is adjusted to ensure candidates are not penalized for the error.
Items with performance statistics on translated exams are also reviewed to determine if errors in translation occurred, impacting the candidate’s ability to answer an item correctly. This review is performed by multilingual ISACA members who hold the respective certifications.
Once the answer keys are finalized, a passing point is determined and approved by the Certification Committee for each certification. At this point, the testing agency processes each of the exam candidate’s final grades by converted it into a score between 200 and 800.
ISACA and our testing agency are dedicated to the efficient processing of exam results. We are also committed to performing the proper due diligence so that test results are reliable.
11. Why doesn’t ISACA currently offer computer-based testing (CBT)?
ISACA is often asked why our exams are not offered in an online environment. It’s a great question, especially given that ISACA members and certifieds are primarily IT professionals. It is also an issue that ISACA’s Credentialing Board and certification committees continue to evaluate each and every year.
There are three primary objectives that ISACA considers when offering exams:
- Can exams be offered more efficiently?
- Can exams be offered more securely?
- Can exams be offered more affordably?
In order to determine whether to move from paper-based testing to computer-based testing, ISACA has weighed various factors including, but not limited to, being assured that:
- Exam candidates are offered a consistent and suitable exam experience regardless of where they sit for the exam
- Exam items are properly safeguarded
- Exams are offered at a reasonable and fair fee
It is clear that there are advantages and disadvantages to offering exams in both paper-based and computer-based formats. Research has indicated that suitable CBT sites are not available in many of the more than 270 locations that ISACA currently offers exams, and many other CBT sites are not viable and secure for high-stakes exams. In addition, we have seen others who have shifted from paper-based testing to CBT increase their exam fees significantly (often by 100%) given the higher administrative costs.
At this time, ISACA’s Credentialing Board has determined that the cost of transitioning to CBT would outweigh the benefits to test takers and to ISACA as a whole. ISACA is proud of the success and demand for our certifications that has been achieved, and is committed to continuing to look at additional options for offering ISACA exams.
Certification Requirements | Exam Content | Other
- What do I need to do if I've received a revocation notice?
- How do I renew my certification and/or report my CPE?
- Do I need to submit documentation CPE hours?
- I was selected for an audit of my CPE hours and have provided the documentation. When will I receive a confirmation?
- Where can I find the CISM application for certification?
- Is there a fee to apply for certification?
- What are the qualifications to earn the CISM credential?
- What does the CISM continuing professional education policy require?
- Why does ISACA offer an information security certification?
- Who is eligible to become CISM certified and what makes CISM unique?
- Will CISAs qualify for CISM?
- What constitutes information security management experience for CISM Certification?
- I have been an audit manager for many years. I have audited the information security program numerous times. May I count this as information security management?
- What type of consulting can I use for security management experience?
- Regarding the three (3) years of required information security management experience needed for certification, must I have 3 years of experience in each of three or more areas, or can I have one year in each of three different areas?
- Will CISSPs and other security credential holders qualify for CISM?
- How is CISM different from the other security certifications?
- How is CISM different from the Certified Information Systems Security Professional (CISSP)?
- What does a CISM “in good standing” mean?
- Does ISACA provide discount on certification maintenance (renewal) fees if I have multiple certifications?
1. What do I need to do if I've received a revocation notice?
If you have received a revocation notice, please contact email@example.com.
2. How do I renew my certification and/or report my CPE?
To renew the certification requires earning and reporting CPE hours annually and over a fixed 3-year cycle period and paying an annual certification maintenance fee.
Our CPE reporting system has recently been enhanced and certified individuals are now able to report CPE as they are earned.
How to report your CPE:
To pay the annual maintenance fee:
3. Do I need to submit documentation CPE hours?
Documentation of CPE hours does not need to be provided to ISACA unless you are selected for an audit of your CPE hours. You will be notified via email and hard copy letter if you are selected for an audit of your CPE hours.
4. I was selected for an audit of my CPE hours and have provided the documentation. When will I receive a confirmation?
If any additional information is required or there are questions regarding your audit documentation, we will contact you directly via email. Once your audit documentation has been reviewed and approved, a notice will be sent to you via the post. If you have not been contacted or received notification of compliance from the certification department please contact us at CISMaudit@isaca.org.
5. Where can I find the CISM application for certification?
6. Is there a fee to apply for certification?
For certification applications received on 1 June 2012 and forward, an application processing fee of US $50 will be required to apply for certification. The application processing fee will support our dedication to efficient and proper processing of certification applications according to industry standards. The fee will also help support the integrity of the application process, which in turn reinforces the strength and reputation of the overall certification programs.
Payment for the CISM application processing fee can be made online at www.isaca.org/cismpay.
7. What are the qualifications to earn the CISM credential?
Qualifying for CISM requires a combination of four "e's": experience, ethics, education and exam. Specifically, the requirements are:
- Earn a passing score on the CISM exam
- Adhere to the ISACA Code of Professional Ethics
- Commit to abide by the Continuing Professional Education Policy
- Submission of verified evidence of a minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice areas. Waivers for general information security work experience are available, if certain education or certification requirements are met.
For further details, click here.
8. What does the CISM continuing professional education policy require?
In order to become and remain a CISM an individual must agree to comply with the CISM continuing professional education policy. This policy requires an individual to earn a minimum of twenty (20) continuing professional education hours annually and one hundred and twenty (120) continuing professional education hours for every three year cycle. In addition, an annual maintenance fee of US $45 ISACA member and US $80 nonmember is required.
CISM CPE Policy
9. Why does ISACA offer an information security certification?
ISACA's name reflects its obligation to offer products, services and benefits not only to the information systems audit profession, but to those who play a vital role in information systems control as well. More than 20 years ago ISACA pioneered the Certified Information Systems Auditor (CISA) credential and has developed and offered training programs to information systems auditors, information security practitioners and those involved in information technology governance.
Most recognized in the industry are a series of ISACA conferences that are known as CACS (computer audit, control and security). These programs are held each year worldwide and meet the educational needs of a wide variety of information systems professionals.
In recent years, ISACA has undertaken other information security and IT control activities: increased focus on security in the Information Systems Control Journal, creation of the IT Governance Institute, and development of research of particular interest and benefit to security management professionals. The maturity of ISACA membership and CISAs and their requested need for an information security credential that goes beyond the practitioner level has led ISACA to the development the CISM credential.
10. Who is eligible to become CISM certified and what makes CISM unique?
CISM is unique in the information security credential marketplace because it is designed specifically and exclusively for individuals who have experience managing an information security program. Experience requirements and the CISM exam are based on the experience required to competently perform the duties and responsibilities of an information security manager. These requirements and the tasks and knowledge that are tested were developed by information security leaders and later validated by subject matter experts and information security managers. The requirements are designed to measure an individual's management experience in information security situations, not general practitioner skills.
11. Will CISAs qualify for CISM?
The CISM certification program recognizes the achievement of the CISA credential as a baseline representation that an individual has gained general information security skill and knowledge. As such, CISAs receive a two-year general information security waiver. However, CISAs will not be eligible to earn a CISM unless they have the required experience and can demonstrate proficiency and practical knowledge in the role of an information security manager.
12. What constitutes information security management experience for CISM Certification?
Information security management is a broad field, and encompasses many specialties within the security profession. ISACA categorizes these management activities into five areas, as defined in the most recent Job Task Analysis. Each area is broken into discreet tasks, and each task is further broken down into the supporting knowledge required to perform each task. In order to qualify for the CISM certification, the CISM candidate must have a minimum of five years of information security experience, of which three or more years must be information security management work. Note that the requirement does not dictate that the individual must have a specific position that designates them as a CISO or any other specific security management title. However, for those that do not have this designation, the role that they perform must clearly map to tasks within 3 of the 5 management areas as defined in the CISM Job Task Analysis. While less common these days, there are still organizations that have individuals in hybrid roles that include duties of an information security manager along with other unrelated responsibilities. This is particularly true in smaller organizations that do not have sufficient staff for an information security department or dedicated role. Note that audits, reviews, gap analysis, or other activities that assess the effectiveness of an information security program that is managed by others do not fully meet the standard for information security management. For more information, see the question below regarding audit experience.
13. I have been an audit manager for many years. I have audited the information security program numerous times. May I count this as information security management?
While it is certainly true that auditors often have a great deal of involvement with the information security program, they are not actively managing the program nor do they have any direct accountability for its success or failure. Also, audits are point-in-time events, whereas program management or even program development is a daily, ongoing activity. Auditors can generally map their work to Areas 1 and 2 (Information Security Governance and Information Risk Management and Compliance), if they have been working actively in IT assurance. However, they generally do not have appropriate experience to qualify in areas 3 and 4 (Information Security Program Development and Management and Information Security Incident Management). Generally speaking, an individual whose career has been exclusively in IT Audit will not have the appropriate experience to qualify for CISM certification.
14. What type of consulting can I use for security management experience?
In order to determine if consultative experience can be utilized for information security management experience, there are several qualifying questions that should be considered. Note that even with these criteria, this is not a binary decision, and cases must at times be considered on an individual basis. However, using these questions will assist the candidate to characterize their experience appropriately:
- During the consulting engagement, did the consultant actively participate in the design and/or implementation of a security program or process?
- Did the consulting analyze the current state, determine root cause for any issues encountered, and work with the client to plan and/or implement a course of action to address the issues cited (as opposed to simply providing an assessment of the current state i.e. a security assessment, audit, or gap assessment)?
- Did the consultant actually work in a defined role within the client organization performing security management tasks that map to one or more of the five Job Task areas?
Additionally, the nature of the consulting role in any of the above three scenarios would need to map to one or more of the five job task areas.
An affirmative answer to one or more of these three questions and mapping to one or more job task areas is a good indication that the experience will qualify for information security management.
In summary, a review of the consultative work performed assessed by the qualifying questions and compared to the job task areas and their related task statements is the proper way to determine if consultative work should be counted. As a final point, time should be considered as well. As consultants may have well worked on many different projects at one time, the candidate should ensure that the for the time period submitted, the majority of their time was actually dedicated to management level security consulting.
15. Regarding the three (3) years of required information security management experience needed for certification, must I have 3 years of experience in each of three or more areas, or can I have one year in each of three different areas?
The minimum acceptable time is 1 year of experience in each of at least 3 of the 5 areas (and an additional two years general information security experience or a combination of time and qualifying educational or certification substitutions that are listed on the CISM Application).
16. Will CISSPs and other security credential holders qualify for CISM?
The CISM certification program recognizes the achievement of the CISSP credential as a baseline representation that an individual has gained general information security skill and knowledge, just as it does with individuals who have earned a CISA. As such, CISSPs receive a two-year general information security experience waiver. However, CISSPs will not be eligible to earn a CISM unless they have the required experience and can demonstrate proficiency and practical knowledge in the role of an information security manager. Holders of other, more specialized credentials, such as the SANS Global Information Assurance Certification (GIAC), Microsoft Certified Systems Engineer (MCSE), CompTIA Security + Credential and the Disaster Recovery Institute Certified Business Continuity Professional (CBCP) also can receive a one-year general information security experience waiver.
17. How is CISM different from the other security certifications?
CISM differs from the many other security certifications by virtue of its experience requirements and focus on the job performed by an information security manager. Other security certifications are characterized by a focus on technical skills or platform- or product-specific knowledge, or they are aimed at the practitioner in the earlier years of their career. Only CISM targets the information security manager-the individual who has progressed beyond the practitioner focus, whose emphasis is no longer technical or specialist skills, and who has moved on to the management of an enterprise's information security program. CISM is for the individual who must manage and oversee the enterprise's information security effort, including the practitioners, many of whom may hold other certifications the field offers. The focus on management that makes CISM unique is demonstrated in its experience requirement, which calls for a minimum of three years in information security management, and in its exam focus that is based on the practices performed by information security managers.
18. How is CISM different from the Certified Information Systems Security Professional (CISSP)?
Although there are many differences between the CISSP common body of knowledge and the CISM job practice areas, the most obvious differences is in the experience requirements. Only CISM requires information security management experience, in addition to general information security experience. CISSP has no such management requirement. Earning the CISSP and/or the CISA credential is complementary to the attainment of the CISM credential and is encouraged.
19. What does a CISM “in good standing” mean?
In order to be a CISM “in good standing”, the following must be achieved:
- Certification granted from the corresponding Board, resulting from an approved application
- Continuing professional education is current and up-to-date
- All renewal fees/maintenance payments are current
- Continued compliance with the ISACA’s Code of Professional Ethics
20. Does ISACA provide discount on certification maintenance (renewal) fees if I have multiple certifications?
Yes, for those individuals who are renewing 3 or more ISACA certifications, a discount on the 3rd and 4th renewal fees of $20 for members and $35 for nonmembers is provided.
Exam Registration & Administration :: Exam Content :: Other
- How long is the exam?
- What does the CISM exam cover?
- What is the CISM job practice analysis and how was it developed?
1. How long is the exam?
A candidate is given 4 hours to complete a 200 multiple-choice question exam.
2. What does the CISM exam cover?
The CISM exam will cover five information security management areas, each of which is further defined and detailed through task and knowledge statements.
3. What is the CISM job practice analysis and how was it developed?
ISACA's philosophy toward certification is to measure the individuals' ability and knowledge as it pertains to the performance of their job. To define what security managers do and what they need to know ISACA brought together a task force of prominent industry leaders, subject matter experts and industry practitioners to define the job practice analysis on which the certification exam is based. Due to the importance of the job task analysis and the change experienced in the information security profession, ISACA is currently reviewing the job task analysis. In addition to the CISM's who are participating in this effort we have been joined by representatives from the Information Systems Security Association, the Information Security Forum and ASIS International.
CISM Job Practice >>
Exam Registration & Administration :: Certification Requirements :: Other
- How do I request additional information or report an issue regarding a current or past credential holder?
- How can I become a CISM Exam Item Writer?
1. How do I request additional information or report an issue regarding a current or past credential holder?
To request additional information or to report an issue regarding a current or past credential holder, please contact the CISM certification department:
2. How can I become a CISM Exam Item Writer?
You can apply online to become a CISM Exam Item Writer.
Exam Registration & Administration :: Certification Requirements