Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

Subscribe to all discussions

Recent Discussions

Question of the day - 13 July

CISM Exam candidates - test your knowledge and understanding with this practice question.Which of t...

Peter O'Toole @ 7/13/2018 2:30 AM | Comments (7)

Question of the day - 12 July

CISM Exam candidates - test your knowledge and understanding with this practice question.Risk asses...

Peter O'Toole @ 7/12/2018 1:27 AM | Comments (4)

Question of the day - 11 July

CISM Exam candidates - test your knowledge and understanding with this practice question.The PRIMAR...

Peter O'Toole @ 7/11/2018 2:40 AM | Comments (5)

Question of the day - 10 July

CISM Exam candidates - test your knowledge and understanding with this practice question.When a sig...

Peter O'Toole @ 7/10/2018 2:17 AM | Comments (3)

Question of the day - 9 July

CISM Exam candidates - test your knowledge and understanding with this practice question.An enterpr...

Peter O'Toole @ 7/9/2018 1:46 AM | Comments (4)

Passed the Exam!

I just wanted to take a moment to let whomever is interested know that I took and passed the exam a...

Anthony953 @ 7/7/2018 4:13 PM | Comments (4)

Question of the day - 6 July

CISM Exam candidates - test your knowledge and understanding with this practice question.The PRIMAR...

Peter O'Toole @ 7/6/2018 1:37 AM | Comments (7)

Question of the Day

Which of the following devices could potentially stop a structured query language injection attack?

Sakina955 @ 7/5/2018 10:13 PM | Comments (2)

Question of the day - 3 July

CISM Exam candidates - test your knowledge and understanding with this practice question.Which of t...

Peter O'Toole @ 7/3/2018 12:35 AM | Comments (6)

Question of the day - 28 June

CISM Exam candidates - test your knowledge and understanding with this practice question.Which of t...

Peter O'Toole @ 6/28/2018 7:44 AM | Comments (6)

Question of the day - 27 June

CISM Exam candidates - test your knowledge and understanding with this practice question.Which of t...

Peter O'Toole @ 6/27/2018 7:45 AM | Comments (4)

Question of the day - 26 June

CISM Exam candidates - test your knowledge and understanding with this practice question.Which of t...

Peter O'Toole @ 6/26/2018 7:12 AM | Comments (5)

Passed the exam on Saturday

I want to thank this community, I have been reading question of the day for last few months. I pass...

Harpal103 @ 6/25/2018 3:11 PM | Comments (7)

Question of the day - 25 June

CISM Exam candidates - test your knowledge and understanding with this practice question.A computer...

Peter O'Toole @ 6/25/2018 6:01 AM | Comments (6)

Question of the day - 21 June

CISM Exam candidates - test your knowledge and understanding with this practice question.An organiz...

Peter O'Toole @ 6/21/2018 6:38 AM | Comments (7)

RE: Question of the day - 13 July

B. Encryption of stored data

Vikram singh rathore @ 7/15/2018 10:55 AM

RE: Which is the BEST answer and why? I am a bit confused about the Answer in the Q&A guide

I think the answer is B, Because the phishing attacks usually targeted the customers.

Tamador928 @ 7/15/2018 2:29 AM

RE: Question of the day - 13 July

B - Most effective security measure to protect data held on mobile computing devices is encryption ...

RANDEEP215 @ 7/13/2018 4:29 AM

RE: Question of the day - 13 July

B. Encryption of stored data

Karthik K Pissay @ 7/13/2018 3:46 AM

RE: Question of the day - 13 July

Since the root asked about "held" so the MOST suitable answer would be BUmarKhalidQuershi...

UmarKhalidQuershi @ 7/13/2018 3:02 AM

RE: Question of the day - 13 July

Since the root asked about "held" so the MOST suitable answer would be B

UmarKhalidQuershi @ 7/13/2018 2:57 AM

RE: Question of the day - 12 July

CISM Exam candidates - test your knowledge and understanding with this practice question.Risk asses...

Peter O'Toole @ 7/13/2018 2:33 AM

RE: Question of the day - 12 July

A). Business threats are constantly changing so a risk assessment helps address and capture the cha...

LorieAnn911 @ 7/12/2018 7:30 AM

RE: Question of the day - 12 July

A is most suitable but I believe this is an incomplete statement. Vulnerabilities should also be in...

UmarKhalidQuershi @ 7/12/2018 6:28 AM

RE: Question of the day - 12 July

Answer - A - Among the four, most appropriate seems like A. Business threats are changing at face p...

RANDEEP215 @ 7/12/2018 4:36 AM

RE: Question of the day - 11 July

CISM Exam candidates - test your knowledge and understanding with this practice question.The PRIMAR...

Peter O'Toole @ 7/12/2018 1:30 AM

RE: Question of the day - 11 July

B. Alignment with business goals is key for organization's existence.

Alexandre993 @ 7/11/2018 9:57 AM

Security Awareness/Training Program

 SECURITY AWARENESS, TRAINING ANDEDUCATIONRisk that is inherent in using computing systems cannot b...

-adnan- @ 7/28/2015 4:17 AM | Comments (119)

Result/Notification Date for CISM 2015 (Speculation & Extrapolations)

We know CISM June 2015 exam takers will be anxiously waiting for their result notification.Although...

-adnan- @ 6/25/2015 12:35 PM | Comments (103)

CISM June 2016 Study Group - Charlotte, NC & Virtual

I am trying to get a study group going for CISM June 2016 Exam. Please  let me know if you are inte...

Omondi016 @ 1/11/2016 3:04 PM | Comments (75)

Gaining Management Committment

The MOST important requirement for gaining management committment to the information security progr...

Venky @ 8/5/2015 11:37 PM | Comments (71)

Incident Management vs Incident Response

Chapter 4 (Page # 225)Incident Management - provides a structure by which incidents can be investig...

Venky @ 8/11/2015 6:58 PM | Comments (68)

CISM Self Assessment Test

Hello,I am unable to understand the CISM self assessment Test question # 33 and 34 (same question b...

Raja207 @ 11/25/2014 10:47 PM | Comments (67)

Essentials for CISM Examination

Dear AllI would like to create a group, which emphasis on key essentials a candidate should follow ...

Suresh.Emmanuel @ 2/7/2016 9:46 PM | Comments (61)

Developing an Information Security Strategy

Q # 839 Which of the following elements are the MOST essential to develop an information security s...

Venky @ 8/7/2015 12:56 PM | Comments (54)

Security Controls Types & Categories

\As per the ISACA CISM Review Manual:"Controls are one of the primary methods of managing info...

-adnan- @ 7/22/2015 3:59 AM | Comments (43)

Mandatory-Discretionary Access control

What is the main difference between them? When do we select the first & when the second I would...

Maria205 @ 6/10/2015 11:09 AM | Comments (40)

Intrusion Detection vs Intrusion Prevention {Systems} (IDS vs IPS)

Intrusion detection system (IDS)Inspects network and host security activity to identify suspicious ...

-adnan- @ 7/22/2015 6:25 AM | Comments (39)

{Information Security} Governance vs Management: CISM Exam Terminology Part6

This topic might consume all the time and may never be completed. Anyway, I am sharing some definit...

-adnan- @ 5/30/2015 7:27 AM | Comments (39)

Tell us your tale about CISM December 2015 Exam!!!

Greetings everyone and specially recent CISM December 2015 exam takers. We will be very glad to hea...

-adnan- @ 12/15/2015 12:46 AM | Comments (39)

Standards Deviation - What is considered acceptable ?

If a Standard has a very narrow defined scope i.e. XXX is the only approved Access Request System, ...

Alice Lee @ 7/24/2015 4:31 AM | Comments (37)

Policies, Standards, Guidelines, Procedures

The differences between various the various documents contained in a formal information security pr...

Gadget @ 6/2/2015 9:21 AM | Comments (37)