Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

Subscribe to all discussions

Recent Discussions

Alguien en el grupo que hable Español?

Hola, vivo en Santiago de Chile y daré el examen en Junio. Alguno de ustedes habla/escribe en españ...

Hernan346 @ 5/24/2018 9:28 AM | Comments (0)

Preliminary passed today (5/23/18)

Hello, all. Just wanted to pass along that I preliminary passed my CISM exam today and to also shar...

Derric048 @ 5/23/2018 7:46 PM | Comments (0)

Which of the following is the BEST approach for an organization desiring to protect its intellectual property?

A. Conduct awareness sessions on intellectual property policy B. Require all employees to sign a no...

MrQuainoo @ 5/22/2018 2:57 PM | Comments (4)

Telegram CISM Exam study group

Hello community members, to enable easy, effective and efficient communication which will increase ...

MrQuainoo @ 5/21/2018 5:01 PM | Comments (1)

Which is the BEST answer and why? I am a bit confused about the Answer in the Q&A guide

Which would be the BEST recommendation to protect against phishing attacks? a. Install an antispam ...

MrQuainoo @ 5/21/2018 3:50 PM | Comments (2)

Today's question.

Hey Peter! What about today's question? Thank you, Alex.

Alexandre993 @ 5/21/2018 12:42 PM | Comments (1)

Risk assessment - on a continous basis or not?

Dear all,The answer to question 211 of the QA&E database ("Which of the following is the M...

Silke249 @ 5/18/2018 5:13 PM | Comments (2)

Please suggest best answer for below Questions

1. Which of the following BEST describes an information security manager\'s role in a multidiscipli...

Gaurav948 @ 5/17/2018 10:08 PM | Comments (12)

Question of the day - 17 May

CISM Exam candidates - test your knowledge and understanding with this practice question.Which of t...

Peter O'Toole @ 5/17/2018 7:09 AM | Comments (4)

system-enforced password configuration

Dear all,Can somebody help me understand what "system-enforced password configuration" is...

Silke249 @ 5/16/2018 1:02 PM | Comments (3)

Question of the day - 16 May

CISM Exam candidates - test your knowledge and understanding with this practice question.When outso...

Peter O'Toole @ 5/16/2018 7:56 AM | Comments (6)

Question of the day - 15 May

CISM Exam candidates - test your knowledge and understanding with this practice question.Which of t...

Peter O'Toole @ 5/15/2018 7:55 AM | Comments (6)

Retention of business records

Hi,I am a bit confused re this. In the question database there are nearly identical questions (86 &...

Neil037 @ 5/14/2018 7:44 PM | Comments (4)

Question of the day - 14 May

CISM Exam candidates - test your knowledge and understanding with this practice question.The MOST i...

Peter O'Toole @ 5/14/2018 7:14 AM | Comments (7)

Question of the day - 11 May

CISM Exam candidates - test your knowledge and understanding with this practice question.A serious ...

Peter O'Toole @ 5/11/2018 8:14 AM | Comments (5)

RE: Which of the following is the BEST approach for an organization desiring to protect its intellectual property?

I am pretty sure D is the correct answer. Restricted access will act as a preventive control and wo...

UmarKhalidQuershi @ 5/26/2018 10:19 AM

RE: Risk assessment - on a continous basis or not?

Please look carefully at the questions. Typically organization wont do Risk assessments on a contin...

UmarKhalidQuershi @ 5/25/2018 2:40 PM

RE: Which of the following is the BEST approach for an organization desiring to protect its intellectual property?

It is A. No matter your role is in the organization, you should have a NDA clause in your employmen...

Alexandre993 @ 5/23/2018 9:00 AM

RE: Which of the following is the BEST approach for an organization desiring to protect its intellectual property?

NDA is more or less a contract with strict legal ramifications in case of breach. Is that not the c...

MrQuainoo @ 5/22/2018 4:17 PM

RE: Which of the following is the BEST approach for an organization desiring to protect its intellectual property?

You could ask the same for answer B :-) Nothing is stopping people from disclosing even after havin...

Silke249 @ 5/22/2018 3:53 PM

RE: Please suggest best answer for below Questions

Congratulations! :-)

Silke249 @ 5/22/2018 1:45 PM

RE: Which is the BEST answer and why? I am a bit confused about the Answer in the Q&A guide

I agree, C (security awarenes) is the best answer. What in the Q&A guide is causing the confusi...

Silke249 @ 5/22/2018 1:20 PM

RE: Telegram CISM Exam study group

There is a group CISM  Aspirant

Gaurav948 @ 5/21/2018 9:21 PM

RE: Which is the BEST answer and why? I am a bit confused about the Answer in the Q&A guide

C is the best answer. security awareness is the best method to protect against phishing attacks

Gaurav948 @ 5/21/2018 8:55 PM

RE: Today's question.

Please check question of the day 17th may. Its on a well-earned break :)

UmarKhalidQuershi @ 5/21/2018 1:09 PM

RE: Please suggest best answer for below Questions

Thank you all. I am glad to inform that i have passed CISM exam today.

Gaurav948 @ 5/21/2018 6:36 AM

RE: Risk assessment - on a continous basis or not?

Here difference in the answer is due to the word "TYPICALLY ". Continuous risk assessment...

Gaurav948 @ 5/21/2018 6:34 AM

RE: Please suggest best answer for below Questions

In the QA&E, I just came across a question very similar to the 2nd one and thought I post it he...

Silke249 @ 5/21/2018 3:28 AM

RE: CISM Exam Passed

Congrats

Vikram singh rathore @ 5/20/2018 6:11 AM

Security Awareness/Training Program

 SECURITY AWARENESS, TRAINING ANDEDUCATIONRisk that is inherent in using computing systems cannot b...

-adnan- @ 7/28/2015 4:17 AM | Comments (119)

Result/Notification Date for CISM 2015 (Speculation & Extrapolations)

We know CISM June 2015 exam takers will be anxiously waiting for their result notification.Although...

-adnan- @ 6/25/2015 12:35 PM | Comments (103)

CISM June 2016 Study Group - Charlotte, NC & Virtual

I am trying to get a study group going for CISM June 2016 Exam. Please  let me know if you are inte...

Omondi016 @ 1/11/2016 3:04 PM | Comments (75)

Gaining Management Committment

The MOST important requirement for gaining management committment to the information security progr...

Venky @ 8/5/2015 11:37 PM | Comments (71)

Incident Management vs Incident Response

Chapter 4 (Page # 225)Incident Management - provides a structure by which incidents can be investig...

Venky @ 8/11/2015 6:58 PM | Comments (68)

CISM Self Assessment Test

Hello,I am unable to understand the CISM self assessment Test question # 33 and 34 (same question b...

Raja207 @ 11/25/2014 10:47 PM | Comments (67)

Essentials for CISM Examination

Dear AllI would like to create a group, which emphasis on key essentials a candidate should follow ...

Suresh.Emmanuel @ 2/7/2016 9:46 PM | Comments (61)

Developing an Information Security Strategy

Q # 839 Which of the following elements are the MOST essential to develop an information security s...

Venky @ 8/7/2015 12:56 PM | Comments (54)

Security Controls Types & Categories

\As per the ISACA CISM Review Manual:"Controls are one of the primary methods of managing info...

-adnan- @ 7/22/2015 3:59 AM | Comments (43)

Tell us your tale about CISM December 2015 Exam!!!

Greetings everyone and specially recent CISM December 2015 exam takers. We will be very glad to hea...

-adnan- @ 12/15/2015 12:46 AM | Comments (39)

{Information Security} Governance vs Management: CISM Exam Terminology Part6

This topic might consume all the time and may never be completed. Anyway, I am sharing some definit...

-adnan- @ 5/30/2015 7:27 AM | Comments (39)

Intrusion Detection vs Intrusion Prevention {Systems} (IDS vs IPS)

Intrusion detection system (IDS)Inspects network and host security activity to identify suspicious ...

-adnan- @ 7/22/2015 6:25 AM | Comments (39)

Mandatory-Discretionary Access control

What is the main difference between them? When do we select the first & when the second I would...

Maria205 @ 6/10/2015 11:09 AM | Comments (39)

Policies, Standards, Guidelines, Procedures

The differences between various the various documents contained in a formal information security pr...

Gadget @ 6/2/2015 9:21 AM | Comments (37)

Standards Deviation - What is considered acceptable ?

If a Standard has a very narrow defined scope i.e. XXX is the only approved Access Request System, ...

Alice Lee @ 7/24/2015 4:31 AM | Comments (37)