Why CISM? Who Earns CISM Certification? CISA, CISM and CGEIT Program Accreditation Renewed Under ISO/IEC 17024:2003

Size: px
Start display at page:

Download "Why CISM? Who Earns CISM Certification? CISA, CISM and CGEIT Program Accreditation Renewed Under ISO/IEC 17024:2003"

Transcription

1

2 The Certified Information Security Manager (CISM) certification is a unique management-focused certification that has been earned by more than 16,000 professionals since its introduction in Unlike other security certifications, CISM is for the individual who manages, designs, oversees and assesses an enterprise's information security. Strong security management is crucial in any enterprise using IT to support its business needs. Today s IT environment calls for systems that are secured not only from external, malicious attacks, but from unauthorized internal change as well. The Certified Information Security Manager (CISM ) certification program supports these business needs. The program is developed specifically for experienced information security managers and those who have information security management responsibilities. With the CISM designation comes many professional and personal benefits including: Worldwide recognition for professional experience Enhanced knowledge and skills Career advancement Who Earns CISM Certification? The CISM certification program is developed specifically for experienced information security managers and those who have information security management responsibilities. CISM certification is for individuals who design, build and manage enterprise information security and who have experience in the following areas: Information Security Governance Information Risk Management Information Security Program Development Information Security Program Management Incident Management and Response Why CISM? CISM demonstrates proven experience: The demand for skilled information security management professionals is on the rise. Earning a CISM designation will give you a competitive advantage. Many enterprises and government agencies increasingly recognize, require and expect their IS and IT professionals to hold this certification. Being a CISM: Demonstrates your understanding of the relationship between an information security program and broader business goals and objectives Distinguishes you as having not only information security expertise, but also knowledge and experience in the development and management of an information security program Puts you in an elite peer network CISM enhances credibility and recognition: CISM is globally recognized as the leading credential for information security managers. CISM combines the achievement of passing a comprehensive exam with recognition of work, management and educational experience, providing you with greater credibility in the marketplace. CISM means higher earning potential and career advancement: Recent independent studies consistently rank CISM as one of the top two highest paying and sought after IT certifications. CISA, CISM and CGEIT Program Accreditation Renewed Under ISO/IEC 17024:2003 The American National Standards Institute (ANSI) has accredited the CISA, CISM and CGEIT certifications under ISO/IEC 17024:2003, General Requirements for Bodies Operating Certification Systems of Persons. ANSI, a private, nonprofit organization, accredits other organizations to serve as third-party product, system and personnel certifiers. ISO/IEC specifies the requirements to be followed by organizations certifying individuals against specific requirements. ANSI describes ISO/IEC as expected to play a prominent role in facilitating global standardization of the certification community, increasing mobility among countries, enhancing public safety and protecting consumers..

3 2016 CISM Job Practice Areas The CISM exam is offered each year and consists of 200 multiple-choice questions that cover the four information security management job practice domains created from the most recent CISM job practice analysis. The percentages below indicate the emphasis of questions that will appear on the exam from each domain. The job practice analysis was developed and validated using prominent industry leaders, subject matter experts and industry practitioners. The domains and their definitions are as follows: Domain 1 Information Security Governance (24%) Establish and maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives, information risk is managed appropriately and program resources are managed responsibly. Domain 2 Information Risk Management and Compliance (33%) Manage information risk to an acceptable level to meet the business and compliance requirements of the organization. Domain 3 Information Security Program Development and Management (25%) Establish and manage the information security program in alignment with the information security strategy. Domain 4 Information Security Incident Management (18%) Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact. CISM exam questions are developed and maintained carefully to ensure that they accurately test an individual s proficiency in information security management. For a description of task and knowledge statements for each area, please refer to

4 CISM Review Course The ISACA Manila Chapter can help you become a CISM. We are conducting a series of review classes that will help you prepare for this year s CISM examination that is scheduled on 11 June We have assembled a team of highly qualified IS governance professionals, who themselves are CISMs, to help you achieve your objective. * Dates may be subject to change without prior notice. TOPIC TIME DATE Domain 2 - IS Risk Management and Compliance 8am - 5pm Mar. 12 Domain 1 - IS Governance 8am - 5pm Mar. 19 Domain 3 - IS Program Development & Mgt. 8am - 5pm Apr. 2 Domain 4 - IS Incident Mgt. 8am - 5pm Apr. 16 Mock Exam 8am - 12nn Apr. 30 Debriefing 8am - 5pm May 7

5 RESOURCE SPEAKERS March 12, :00 AM 5:00 PM Domain 2 Information Risk Management and Compliance (33%) Reginald John Javier, CISM, CPISI RJ is the Chief Information Officer of Millenium Business Services, Inc. His wealth of experience is a product of handling information technology, information security, risk management and business development for various organizations in diverse industries, as a member of the management team and as a consultant.he was the Asia-Pacific Regional Security Manager for one of the biggest and pioneer BPOs in the Philippines. Before joining the BPO industry, he was a Senior Manager for KPMG Laya Mananghaya /Manabat Sanagustin & Co's Risk Advisory Services, handling IT Strategy and Governance, Business Continuity Management, and IT Project Advisory. He is a Certified Information Security Manager (CISM) and currently a Board of Trustees of ISACA Manila Chapter and the Director for Professional Development. March 19, :00 AM 5:00 PM Domain 1 Information Security Governance (24%) Philip Casanova, CISSP, CISM, CRISC Philip is the Asia Regional Head for Information Security at Sun Life Financial (SLF). He covers the SLF offices in Hon Kong, India, Indonesia and the Philippines. His responsibilities include information security governance; security advisory; security operations oversight; and security program development and maintenance. Before SLF, he was the Assistant Vice-President and Chief Information Security Officer at China Banking Corporation (CBC). His responsibilities included security access management, security incident management, IT risk assessment, business continuity planning, policy development and maintenance, vulnerability assessment and penetration testing, and physical and environmental security. Prior to CBC, he was a Director in the Technology & Security Risk Services practice of Sycip Gorres Velayo & Co. a member practice of Ernst & Young. He was responsible for managing client engagements in IT security program review, vulnerability assessment and penetration testing, ISO advisory, IT program assurance, information systems strategic planning and review, and business continuity planning. He was also an Assistant Professor in the College of Computer Studies in DLSU-Professional Schools Inc. and was the Chairperson of the Computer Technology Department for three academic years. He obtained both Masters and Bachelor degrees in Computer Science at De La Salle University Manila.

6 RESOURCE SPEAKERS April 2, :00 AM 5:00 PM Domain 3 Information Security Program Development and Management (25%) Luis Chito A. Jacinto, CISA, CISM, CRISC, PIE, CPISI Chito is currently Vice President at the Corporate Risk Management Services (CRISMS) Group of the Rizal Commercial Banking Corporation (RCBC). He is currently the Bank's Chief Information Security Officer. His responsibilities include establishing and maintaining the enterprise vision, strategy and program to ensure information assets and technologies of the RCBC group are adequately protected. He directs the identification, development, implementation and maintenance of processes across the enterprise to reduce information and technology risks; respond to incidents; establish appropriate standards and controls; and direct the establishment and implementation of policies and procedures. He has been an Information Technology (IT) professional for over thirty (30) years, through which he gained his IT governance experience. He has concurrently spent more than half of those years as a training professional and an educator. April 16, :00 AM 5:00 PM Domain 4 Information Security Incident Management (18%) Solomon B. Anastacio, CISA, CISM Sol has more than 25 years of IT-related experience with 14 years of IT Administration and IT Project Management, 6 years in Information Security and 5 years in IT Auditing. He is a member of ISACA-Manila Chapter, was a member of the Board from 2005 to 2013 and was a Past President of the organization from He is also a currently member of the Institute of Internal Auditors Philippines (IIA-P), the Project Management Institute (PMI) Philippine Chapter and the Society of Risk Management Professionals (SRMP). He is a graduate of BS Computer Science from University of the Philippines Los Banos. He is a Certified Information Systems Auditor (CISA) and a Certified Information Security Manager (CISM).

7 New Course Fees ISACA Members NON-VAT Non Members Php 23, Php 26, The review classes will be held at: ISACA Manila Professional Development Center Suite 2109 Cityland 10 Tower 2, #154 H.V Dela Costa St., Makati City Telefax Nos or ABOUT THE CISM EXAMINATIONS The CISM Examination will be administered on 11 June 2016, Saturday For details of the registration, fees and payment and other details about the examination, you may visit the ISACA website at You may register by: Sending a confirmation at secretariat@isaca-manila.org or at isaca_manila@yahoo.com Calling the secretariat at (02) , and look for Apple Bernardez or Buboy Barasona or Nilda Andal Sending your completed application form at fax number (02) (T/F)

8 EXAM DETAILS AND REFERENCE MATERIALS The CISM Examination will be administered on 11 June 2016, Saturday EXAMINATION FEE ISACA Member Non Member Early registration deadline: 10 February 2016 US$450 US$635 Final registration deadline: 8 April 2016 US$500 US$685 Exam registration changes: Between 9 April and 22 April 2016, charged a US $50 fee, with no changes accepted after 22 April 2016 Refunds: By 8 April 2016, charged a US $100 processing fee, with no refunds after that date Deferrals: Requests received on or before 22 April 2016, charged a US $50 processing fee. Requests received from 23 April through 27 May 2016, charged a US $100 processing fee. Requests received from 28 May through 8 June 2016, charged a US $125 processing fee. After 8 June 2016, no deferrals will be permitted All deadlines are based upon Chicago, Illinois, USA 5 p.m. CT (central time) To request a deferral, please go to No refunds or exchanges will be given for study aids, associated taxes, shipping and handling charges, or membership dues. Exam registration and membership fees are non-transferable. Available Study Materials From ISACA: Passing an ISACA exam can be achieved through an organized plan of study. To assist individuals with the development of a successful study plan, ISACA offers study aids to exam candidates. Visit for more complete details including detailed descriptions of the products, costs, and languages available. Order early as delivery time can be one to two weeks, depending on geographic location and customs clearance practices. CISM Review Manual, 14th Edition Member price: $ Non-member price: $ CISM Review Questions, Answers & Explanations, 11th Edition Member price: $ Non-member price: $130.00

9 R E G I S T R A T I O N F O R M SUBJECT: CISM (March 12 May 7, 2016) Exam Date 11 June 2016 TO: ISACA SECRETARIAT FAX NO.: (02) / NAME COMPANY NAME COMPANY ADDRESS CURRENT FIELD OF EMPLOYMENT & PROFESSIONAL ACTIVITY YRS OF EXPERIENCE MEMBERSHIP ISACA MEMBER Please specify membership no. PERSONAL PAYMENT: (PLS CHECK ONE) COMPANY CONTACT DETAILS: PERSONAL How did you hear about us? Friend/Co-worker Local Chapter Employer Certification Programs Internet Search Direct Mail IS Control Journal Educational Event Other Publication (Pls. Specify) Other Organization (Pls. Specify) REMARKS (SPECIAL ARRANGEMENT PHYSICAL DISABILITIES, FOOD PREFERENCE, ETC.) ADDRESS: Fees, speakers and date are subject to change Please make your checks payable to INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION Training Fee is inclusive of Training Kit, Refreshments and Training certificate Any cancellations received within the last ten calendar days would be liable for 50% of the course fees. Registered attendees who are unable to attend the above course can send replacements subject to one week s notification. Cancellations must be received in writing at least one week prior to course commencement No-shows would be fully charged (REGISTRATION FORM IS REQUIRED) I/We hereby agree to the terms and condition as declared by the ISACA Manila Chapter. Name/Representative : Signature : Contact No. : Date :

Database Security and Auditing

Database Security and Auditing Database Security and Auditing COURSE DESCRIPTION: This seminar aims to provide the Database Administrators, System Administrators, Auditors and IT Security Officers an overview on how to secure and audit

More information

ISACA. Trust in, and value from, information systems. www.isaca.org

ISACA. Trust in, and value from, information systems. www.isaca.org ISACA Trust in, and value from, information systems www.isaca.org 2011 CISM Review Course Introduction ISACA Facts Founded in 1969 as the EDP Auditors Association More than 86,000 members in over 160 countries

More information

What Makes PMI Certifications Stand Apart?

What Makes PMI Certifications Stand Apart? What Makes PMI Certifications Stand Apart? Many certifications exist for managers that claim to offer practitioners and organizations a number of benefits. So, why are PMI credentials unique? PMI certifications

More information

What Makes PMI Certifications Stand Apart?

What Makes PMI Certifications Stand Apart? What Makes PMI Certifications Stand Apart? Many certifications exist for managers that claim to offer practitioners and organizations a number of benefits. So, why are PMI certifications unique? PMI certifications

More information

Candidate s Guide to the CISM Exam and Certification

Candidate s Guide to the CISM Exam and Certification 2013 Candidate s Guide to the CISM Exam and Certification CISM Exams 2013 Important Date Information Exam Date 8 June 2013 Early registration deadline: 13 February 2013 Final registration deadline: 12

More information

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup. Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.com DA! (by Global knowledge & TechRepublic) Top certifications by salary:

More information

Certified Information Security Manager 2011 Candidate s Guide to the CISM. Exam and Certification

Certified Information Security Manager 2011 Candidate s Guide to the CISM. Exam and Certification Certified Information Security Manager 2011 Candidate s Guide to the CISM Exam and Certification 2 CISM Exams 2011 Important Date Information Exam Date 11 June 2011 Early registration deadline: 9 February

More information

IT Conference: From Gatekeepers to Strategic Partners Leveraging IT to become CPAs of the Information Age

IT Conference: From Gatekeepers to Strategic Partners Leveraging IT to become CPAs of the Information Age IT Conference: From Gatekeepers to Strategic Partners Leveraging IT to become CPAs of the Information Age Date Saturday, 22 November 2008 Time Venue 9:00 am 1:00 pm Ballroom, The Mira Hong Kong Hotel,

More information

What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization?

What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization? What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization? What if you could not only maintain, but update and upgrade

More information

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

Director, IT Security District Office Kern Community College District JOB DESCRIPTION Director, IT Security District Office Kern Community College District JOB DESCRIPTION Definition Reporting to the Chief Information Officer, the Director of IT Security develops and implements procedures,

More information

HOW TO BECOME AN HR PROFESSIONAL

HOW TO BECOME AN HR PROFESSIONAL HOW TO BECOME AN HR PROFESSIONAL WITH GLOBAL STANDARDS? The key to this question lies in the journey to earning your SHRM-CP SM & SHRM-SCP SM Credential Great Vision Without Great People Is Irrelevant.

More information

Please feel free to call on our organizations if we can be of assistance in any way on further deliberations, task forces or committees.

Please feel free to call on our organizations if we can be of assistance in any way on further deliberations, task forces or committees. 17 May 2012 International Internal Audit Standards Board Via e-mail: Lily.Bi@theiia.org Re: Definition of Internal Auditing Ms. Lily Bi, CIA, CISA, CGEIT Director, Standards and Guidance The Institute

More information

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications Thomas K. Lee, Executive Director/CIO Human Resources Department (518) 447-2906 Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) The New York State

More information

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88 Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat

More information

Application Kit. A Guide to the AICPA Certified Information Technology Professional Credential

Application Kit. A Guide to the AICPA Certified Information Technology Professional Credential Application Kit A Guide to the AICPA Certified Information Technology Professional Credential Table of Contents What Is the CITP Credential?................................ 2 8 Great Reasons to Obtain

More information

The Standard for Laundry Managers

The Standard for Laundry Managers The Standard for Laundry Managers Table of Contents I. Program Overview A. Certification Eligibility B. Grandfather Clause II. Recertification Guide A. How To Earn Credits Required: 45 B. Deadlines C.

More information

State of South Carolina InfoSec and Privacy Career Path Model

State of South Carolina InfoSec and Privacy Career Path Model State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available

More information

Information Security Governance:

Information Security Governance: Information Security Governance: Designing and Implementing Security Effectively 2 nd Athens International Forum on Security 15 16 Jan 2009 Anestis Demopoulos, CISA, CISSP, CIA President of ISACA Athens

More information

Application for CISM Certification

Application for CISM Certification Application for CISM Certification 4/2015 Requirements to Become a Certified Information Security Manager become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade

More information

IRAP Policy and Procedures up to date as of 16 September 2014.

IRAP Policy and Procedures up to date as of 16 September 2014. Australian Signals Directorate Cyber and Information Security Division Information Security Registered Assessors Program Policy and Procedures 09/2014 IRAP Policy and Procedures 09/2014 1 IRAP Policy and

More information

CLASSIFICATION SPECIFICATION FORM

CLASSIFICATION SPECIFICATION FORM www.mpi.mb.ca CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information

More information

Introduction to Business Continuity Planning

Introduction to Business Continuity Planning Introduction to Business Continuity Planning Business Continuity and Disaster Resilience Forum May 10, 2012 Rizal Ballroom A, Makati Shangri-la Manila, Philippines Dr Goh Moh Heng President BCM Institute

More information

Terms of Reference for an IT Audit of

Terms of Reference for an IT Audit of National Maritime Safety Authority (NMSA) TASK DESCRIPTION PROJECT/TASK TITLE: EXECUTING AGENT: IMPLEMENTING AGENT: PROJECT SPONSOR: PROJECT LOCATION: To engage a professional and qualified IT Auditor

More information

ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE

ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE create better trained employees. choose the best value in training. ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE PRODUCTIVE train your workforce on-site. save on employee downtime

More information

The premier internationally recognized certification in Facility management

The premier internationally recognized certification in Facility management international facility management The premier internationally recognized certification in Facility management association 2 By achieving my CFM, I gained a new vision for my career. I came away from the

More information

Vendor. Management. For sponsorship or to become our partner, contact: marketing@achromicpoint.com

Vendor. Management. For sponsorship or to become our partner, contact: marketing@achromicpoint.com Knowledge Partner Presents 27th May 2015 - Bengaluru 5th June 2015 - New Delhi 24th June 2015 - Mumbai Vendor Risk Management For sponsorship or to become our partner, contact: marketing@achromicpoint.com

More information

Assessing & Managing IT Risks: Using ISACA's CobiT & Risk IT Frameworks

Assessing & Managing IT Risks: Using ISACA's CobiT & Risk IT Frameworks Assessing & Managing IT Risks: Using ISACA's CobiT & Risk IT Frameworks 2ο InfoCom Security Conference Anestis Demopoulos, Vice President ISACA Athens Chapter, & Senior Manager, Advisory Services, Ernst

More information

Application for CISA Certification

Application for CISA Certification Application for CISA Certification 4/2015 Requirements to Become a Certified Information Systems Auditor become a Certified Information Systems Auditor (CISA), an applicant must: 1. Score a passing grade

More information

How To Get A Shrim Certification

How To Get A Shrim Certification SHRM CERTIFICATION SHRM-CPTM AND SHRM-SCPTM THE NEW CREDENTIAL FOR HR PROFESSIONALS SHRMCertification.org EVOLUTION OF HR Business leadership has changed over recent decades. We now live and work in a

More information

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza Information Security Management System (ISMS) Overview Arhnel Klyde S. Terroza May 12, 2015 1 Arhnel Klyde S. Terroza CPA, CISA, CISM, CRISC, ISO 27001 Provisional Auditor Internal Auditor at Clarien Bank

More information

Continuing Professional Education Policy

Continuing Professional Education Policy S E R V I N G I T G O V E R N A N C E P R O F E S S I O N A L S Continuing Professional Education Policy Revised: 2008 January Table of Contents Overview..................................2 Certification

More information

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA Quality and security in application development Round Table Meeting/Discussion Group Wednesday 23rd May 2007 Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA 1 The International

More information

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

ISACA S CYBERSECURITY NEXUS (CSX) October 2015 ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration

More information

TERMS OF REFERENCE FOR CERTIFICATION BODIES (CBs)

TERMS OF REFERENCE FOR CERTIFICATION BODIES (CBs) TERMS OF REFERENCE FOR CERTIFICATION BODIES (CBs) AUGUST 2014 1. Introduction National Information Technology Authority (NITA-U) was established by the Act of Parliament (National Information Technology

More information

SHRM CERTIFICATION SHRM-CPTM AND SHRM-SCPTM THE NEW CREDENTIAL FOR HR PROFESSIONALS. SHRMCertification.org

SHRM CERTIFICATION SHRM-CPTM AND SHRM-SCPTM THE NEW CREDENTIAL FOR HR PROFESSIONALS. SHRMCertification.org SHRM CERTIFICATION SHRM-CPTM AND SHRM-SCPTM THE NEW CREDENTIAL FOR HR PROFESSIONALS SHRMCertification.org EVOLUTION OF HR Business leadership has changed over recent decades. We now live and work in a

More information

Certification and Training

Certification and Training Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

2015 CRIP. Certified Revenue Integrity Professional. Information & Applications. AAHAM... Providing Excellence in the Business of Healthcare

2015 CRIP. Certified Revenue Integrity Professional. Information & Applications. AAHAM... Providing Excellence in the Business of Healthcare 2015 CRIP Certified Revenue Integrity Professional Information & Applications AAHAM... Providing Excellence in the Business of Healthcare 2013 CERTIFICATION INFORMATION & APPLICATIONS American Association

More information

The Value of Information Security Certifications

The Value of Information Security Certifications The Value of Information Security Certifications Ed Zeitler, CISSP Executive Director, (ISC) 2 www.isc2.org Overview Why professional certificate for information security? About (ISC) 2 and its credentials

More information

Certification for Information System Security Professional (CISSP)

Certification for Information System Security Professional (CISSP) Certification for Information System Security Professional (CISSP) The Art of Service Copyright Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by

More information

Re: Experience with the Framework for Improving Critical Infrastructure Cybersecurity ( Framework )

Re: Experience with the Framework for Improving Critical Infrastructure Cybersecurity ( Framework ) 10 October 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Re: Experience with the Framework for Improving Critical Infrastructure

More information

Understanding the Federal IT Security Professional (FITSP) Certification

Understanding the Federal IT Security Professional (FITSP) Certification Understanding the Federal IT Security Professional (FITSP) Certification Jim Wiggins Executive Director Federal IT Security Institute ISACA NCAC Conference Certification and Emerging Standards Holiday

More information

Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA vandeke@gmail.com 11.16.2013

Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA vandeke@gmail.com 11.16.2013 Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA vandeke@gmail.com 11.16.2013 AGENDA IT s Changing Landscape ISACA s Response Vision and Mission COBIT 5

More information

ISACA Tools Help Develop Cybersecurity Expertise

ISACA Tools Help Develop Cybersecurity Expertise Volume 21, 8 October 2014 ISACA Tools Help Develop Cybersecurity Expertise Nominate Qualified Candidates for the ISACA Board of Directors Tips for Solving Data Classification Challenges Earn CPE at Professional

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

Updated: 2014 January. Continuing Professional Education (CPE) Policy

Updated: 2014 January. Continuing Professional Education (CPE) Policy Updated: 2014 January Continuing Professional Education (CPE) Policy Table of Contents Overview... 2 CISA Certification Requirements... 2 General Requirements Annual and Three-year Certification Period

More information

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there

More information

HRIP Recertification Program Guide

HRIP Recertification Program Guide Human Resource Information Professional (HRIP) HRIP Recertification Program Guide July 2012 IHRIM, inc. 1 Contents Overview... 3 Recertification Term... 3 Recertification Application Process... 3 How to

More information

Office Hours: By Appointment COURSE DESCRIPTION AND LEARNING GOALS

Office Hours: By Appointment COURSE DESCRIPTION AND LEARNING GOALS NYU Stern School of Business Summer 2012 ACCT- GB.6215 - IT Auditing Professor: Joel Lanz Tel: 516-933-3662 Office Hours: By Appointment email: TBD Course Website: Blackboard COURSE DESCRIPTION AND LEARNING

More information

AAHAM. Certified Compliance Technician. Information & Applications. AAHAM... Providing Excellence in the Business of Healthcare

AAHAM. Certified Compliance Technician. Information & Applications. AAHAM... Providing Excellence in the Business of Healthcare 2016 AAHAM Certified Compliance Technician Information & Applications AAHAM... Providing Excellence in the Business of Healthcare 2016 CERTIFICATION INFORMATION & APPLICATIONS American Association of Healthcare

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

Enabling Information PREVIEW VERSION

Enabling Information PREVIEW VERSION Enabling Information These following pages provide a preview of the information contained in COBIT 5: Enabling Information. The main benefit of this publication is that it provides COBIT 5 users with a

More information

Advanced IT Audit Training

Advanced IT Audit Training Advanced IT Audit Training Date: 28 th 30 th October 2014 Time: 8.30 am to 5.30 pm Venue: Iverson Associates, Center Point, Bandar Utama, Kuala Lumpur Advanced IT Audit Training Workshop Overview ISACA

More information

A Contrarian Risk Management Perspective. Nicole Keaton SVP Identity & Access Management CGEIT CISA CISM

A Contrarian Risk Management Perspective. Nicole Keaton SVP Identity & Access Management CGEIT CISA CISM A Contrarian Risk Management Perspective Nicole Keaton SVP Identity & Access Management CGEIT CISA CISM Introduction Nicole is a Senior Vice President of SunTrust Bank where she has spent six years of

More information

ISO 27001:2005 & ISO 9001:2008

ISO 27001:2005 & ISO 9001:2008 ISO 27001:2005 & ISO 9001:2008 September 2011 1 Main Topics SFA ISO Certificates ISO 27000 Series used in the organization ISO 27001:2005 - Benefits for the organization ISO 9001:2008 - Benefits for the

More information

How To Be A Security Officer

How To Be A Security Officer POSITION DESCRIPTION PROPOSED TITLE: Chief Information Security Officer CATEGORY: Administrative ETENDED TITLE: Chief Information Security Officer FLSA STATUS: Exempt GRADE: E JOB SUMMARY: Responsible

More information

BYLAWS FEDERATION OF SCHOOLS OF ACCOUNTANCY. The Organization of Accredited Graduate Programs in Accounting

BYLAWS FEDERATION OF SCHOOLS OF ACCOUNTANCY. The Organization of Accredited Graduate Programs in Accounting BYLAWS FEDERATION OF SCHOOLS OF ACCOUNTANCY The Organization of Accredited Graduate Programs in Accounting As Approved by the Federation December, 1988, and amended December 6, 1994, December 5, 1995,

More information

Executive Management of Information Security

Executive Management of Information Security WHITE PAPER Executive Management of Information Security _experience the commitment Entire contents 2004, 2010 by CGI Group Inc. All rights reserved. Reproduction of this publication in any form without

More information

CCT. Certified Compliance Technician. Information & Applications. AAHAM... Providing Excellence in the Business of Healthcare

CCT. Certified Compliance Technician. Information & Applications. AAHAM... Providing Excellence in the Business of Healthcare 2015 CCT Certified Compliance Technician Information & Applications AAHAM... Providing Excellence in the Business of Healthcare 2015 CERTIFICATION INFORMATION & APPLICATIONS American Association of Healthcare

More information

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus

More information

Social Networking and its Implications on your Data Security

Social Networking and its Implications on your Data Security Social Networking and its Implications on your Data Security Canadian Chamber of Commerce of the Philippines June 8, 2011 Warren R Bituin Partner -SGV & Co. About the Speaker Warren R. Bituin SGV & Co./Ernst

More information

Question: 1 Which of the following should be the FIRST step in developing an information security plan?

Question: 1 Which of the following should be the FIRST step in developing an information security plan? 1 ISACA - CISM Certified Information Security Manager Exam Set: 1, INFORMATION SECURITY GOVERNANCE Question: 1 Which of the following should be the FIRST step in developing an information security plan?

More information

Pacific Islands Telecommunications Association

Pacific Islands Telecommunications Association Pacific Islands Telecommunications Association 8 th Fl, Dominion Hse PHONE : (679) 331 1638 PO BOX 2027, Govt Bldg FAX : (679) 330 8750 SUVA, FIJI Islands E-mail: pita@connect.com.fj www.pita.org.fj INVITATION

More information

Academic Policies and Procedures

Academic Policies and Procedures Academic Policies and Procedures Academic policies can be changed at any time by the University of North Texas Health Science Center School of Public Health (UNTHSC-SPH). Students should review the Student

More information

ISO 9001:2015 Management System Training ISO 9001:2015 QMS Lead Auditor

ISO 9001:2015 Management System Training ISO 9001:2015 QMS Lead Auditor ISO 9001:2015 Management System Training ISO 9001:2015 QMS Lead Auditor Cavendish Scott, Inc. 984 S. Vine St. Denver, CO. 80209 Tel. 303 480 0111 www.cavendishscott.com training@cavendishscott.com Course

More information

Managerial Decision Making and leadership

Managerial Decision Making and leadership Managerial Decision Making and leadership Lead your team to make quality decisions for long-term success 5-6 Sep 2016 (Mon-Tue) Hong Kong Managerial Decision Making and Leadership by HKUST Business School

More information

OPM3 ProductSuite. Driving measurable business improvement.

OPM3 ProductSuite. Driving measurable business improvement. OPM3 ProductSuite. Driving measurable business improvement. Introducing OPM3 ProductSuite. Many activities undertaken within organizations are managed in the form of projects, and the impact of project

More information

Should I Pursue a Project Management Certification?

Should I Pursue a Project Management Certification? Should I Pursue a Project Management Certification? www.pmi.org Skilled project managers are in demand around the world. A globally recognized project management certification shows employers that you

More information

SECURING PAYMENTS IN THE CYBER WORLD

SECURING PAYMENTS IN THE CYBER WORLD The Central Bank of Kuwait Presents An Information Security Forum on SECURING PAYMENTS IN THE CYBER WORLD 16th NOVEMBER 2014 JUMEIRAH MESSILAH BEACH HOTEL, KUWAIT WELCOME In the last few years, the usages

More information

PMI-DVC Board of Directors Roles and Responsibilities

PMI-DVC Board of Directors Roles and Responsibilities PMI-DVC Board of Directors Roles and Responsibilities I. President Along with the responsibilities outlined in the chapter bylaws, the President: a. Serves as the chief executive officer for the chapter

More information

Effective Negotiations. Effective. are crucial to value creation and success. Jun 2015 (Wed-Thu) 10-11. Hong Kong

Effective Negotiations. Effective. are crucial to value creation and success. Jun 2015 (Wed-Thu) 10-11. Hong Kong Effective Negotiations Effective Negotiations are crucial to value creation and success 10-11 Jun 2015 (Wed-Thu) Hong Kong Effective Negotiations by Executive Education Office Established in 1991, the

More information

CISM (Certified Information Security Manager) Document version: 6.28.11

CISM (Certified Information Security Manager) Document version: 6.28.11 CISM (Certified Information Security Manager) Document version: 6.28.11 Important Note About CISM PDF techexams CISM PDF is a comprehensive compilation of questions and answers that have been developed

More information

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA Robert Stroud International President, ISACA VP Strategy & Innovation, CA Technologies

More information

ICSC John T. Riordan School for Retail Real Estate Professionals

ICSC John T. Riordan School for Retail Real Estate Professionals ICSC John T. Riordan School for Retail Real Estate Professionals WHAT IS THE RIORDAN SCHOOL FOR RETAIL REAL ESTATE PROFESSIONALS? The Riordan School for Retail Real Estate Professionals, through its cutting-edge

More information

The Advanced Program in. Workshop. and. Leaders from Alberta for the World

The Advanced Program in. Workshop. and. Leaders from Alberta for the World The Advanced Program in Project Management and PMP Exam Preparation Workshop Leaders from Alberta for the World The Alberta School of Business is one of the world s leading institutions of business education

More information

Information security governance has become an essential

Information security governance has become an essential Copyright 2007 ISACA. All rights reserved. www.isaca.org. Developing for Effective John P. Pironti, CISA, CISM, CISSP, ISSAP, ISSMP Information security governance has become an essential element of overall

More information

uman Resources nd Training 2012 2013 Program and Course Guide

uman Resources nd Training 2012 2013 Program and Course Guide uman Resources nd Training 2012 2013 Program and Course Guide THE CENTER FOR HUMAN RESOURCES AND TRAINING For more than 15 years, DePaul University has helped human resource (HR) practitioners and consultants

More information

Certified Nonprofit Consultant (CNC)

Certified Nonprofit Consultant (CNC) Certified Nonprofit Consultant (CNC) WHY DO EXECUTIVES SECURE THE CNC CREDENTIAL?...to validate their professional achievements and personal commitment to advance the common good. Certified Fundraising

More information

2015 CRCP-I CRCP-P. Certified Revenue Cycle Professional - Institutional. Certified Revenue Cycle Professional - Professional

2015 CRCP-I CRCP-P. Certified Revenue Cycle Professional - Institutional. Certified Revenue Cycle Professional - Professional 2015 CRCP-I Certified Revenue Cycle Professional - Institutional CRCP-P Certified Revenue Cycle Professional - Professional Information & Applications AAHAM... Providing Excellence in the Business of Healthcare

More information

Auditors Need to Know June 13th, 2012. ISACA COBIT 5 for Assurance

Auditors Need to Know June 13th, 2012. ISACA COBIT 5 for Assurance COBIT 5 What s New, What Auditors Need to Know June 13th, 2012 Anthony Noble Viacom Inc. ISACA COBIT 5 for Assurance Task Force Chair Special thanks to Derek Oliver & ISACA for supplying material for this

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

Certified Professional in Healthcare Information and Management Systems (CPHIMS) Renewal Guidelines and Application Revised March 01, 2011

Certified Professional in Healthcare Information and Management Systems (CPHIMS) Renewal Guidelines and Application Revised March 01, 2011 Certified Professional in Healthcare Information and Management Systems (CPHIMS) Renewal Guidelines and Application Revised March 01, 2011 Purpose The CPHIMS renewal program ensures that certified professionals

More information

How To Get A Job At The Talent Management Expert

How To Get A Job At The Talent Management Expert Cpbr94_ClientCertificationWorkshopBrochure2015_USLetter_PL_v9_Layout 1 2/16/2015 12:55 PM Page 1 D E V E L O P M E N T D I M E N S I O N S I N T E R N AT I O N A L Client Certification Workshops Facilitator

More information

Council for Interior Design Accreditation

Council for Interior Design Accreditation Mission The Council for Interior Design Accreditation provides the foundation for future excellence in the interior design profession by setting standards for education and accrediting academic programs

More information

Project Management Managing successful PCI DSS project

Project Management Managing successful PCI DSS project Project Management Managing successful PCI DSS project INTRODUCTION PCI-DSS is Payment Card Industry Data Security Standard, one of the fastest growing compliance currently affecting banks, payment service

More information

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls

More information

APPLICATION GUIDELINES

APPLICATION GUIDELINES APPLICATION GUIDELINES Admission Requirements Thank you for your interest in the Washington University Fudan University EMBA Program. Applicants to the program are expected to satisfy the following qualifications:

More information

5-Day Course for Appointed Person Lifting Operations

5-Day Course for Appointed Person Lifting Operations 5-Day Course for Appointed Person Lifting Operations Introduction As the Singapore Government pushes for higher productivity in various sectors, more and more cranes will be deployed at various work places.

More information

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 John R. Robles, CISA, CISM, CRISC www.johnrrobles.com jrobles@coqui.net 787-647-3961 John R. Robles- 787-647-3961 1 9/11-2001 The event

More information

Leading change 5-6. Hong Kong. Lead change effectively for desirable outcome. Oct 2015 (Mon-Tue)

Leading change 5-6. Hong Kong. Lead change effectively for desirable outcome. Oct 2015 (Mon-Tue) Leading change Lead change effectively for desirable outcome 5-6 Oct 2015 (Mon-Tue) Hong Kong Leading Change by HKUST Business School Executive Education Office Established in 1991, the HKUST Business

More information

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit 2020. Abstract from Nordic ISACA Conference 2014, Oslo, Norway.

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit 2020. Abstract from Nordic ISACA Conference 2014, Oslo, Norway. Aalborg Universitet Vision for IT Audit 2020 Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication from Aalborg University Citation

More information

SPINE SURGERY FELLOWSHIP MATCH PARTICIPATION AGREEMENT

SPINE SURGERY FELLOWSHIP MATCH PARTICIPATION AGREEMENT 1.0 Introduction SPINE SURGERY FELLOWSHIP MATCH PARTICIPATION AGREEMENT 1.1 Purpose. The Spine Surgery Fellowship Match ( SSFM ) is a program that utilizes a computer-based algorithm developed by San Francisco

More information

Wealth & Asset Management

Wealth & Asset Management Wealth & Asset Management 12-13 Jun 2015 (Fri-Sat) Hong Kong Wealth & Asset Management by HKUST Business School Executive Education Office Established in 1991, the HKUST Business School is recognized as

More information

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25

More information

UMAN RESOURCES ND TRAINING PROGRAM AND COURSE GUIDE

UMAN RESOURCES ND TRAINING PROGRAM AND COURSE GUIDE UMAN RESOURCES ND TRAINING PROGRAM AND COURSE GUIDE THE CENTER FOR HUMAN RESOURCES AND TRAINING For more than 15 years, DePaul University has helped human resource (HR) practitioners and consultants gain

More information

Frontier helps organizations develop and rollout successful information security programs

Frontier helps organizations develop and rollout successful information security programs C O N S U L T I N G F O R I N F O R M A T I O N S E C U R I T Y Frontier helps organizations develop and rollout successful information security programs F R O N T I E R B U S I N E S S S Y S T E M S A

More information

SHRM CERTIFIED PROFESSIONAL (SHRM-CP ) AND SHRM SENIOR CERTIFIED PROFESSIONAL (SHRM- SCP ) INFORMATION SHEET EVOLUTION OF HR

SHRM CERTIFIED PROFESSIONAL (SHRM-CP ) AND SHRM SENIOR CERTIFIED PROFESSIONAL (SHRM- SCP ) INFORMATION SHEET EVOLUTION OF HR SHRM CERTIFIED PROFESSIONAL (SHRM-CP ) AND SHRM SENIOR CERTIFIED PROFESSIONAL (SHRM- SCP ) INFORMATION SHEET EVOLUTION OF HR Business leadership has changed over recent decades. We now live and work in

More information

ANNEX D. GT CAPITAL HOLDINGS, INC. GT Tower International, Ayala Avenue corner H.V. Dela Costa St., Makati City

ANNEX D. GT CAPITAL HOLDINGS, INC. GT Tower International, Ayala Avenue corner H.V. Dela Costa St., Makati City GT CAPITAL HOLDINGS, INC. GT Tower International, Ayala Avenue corner H.V. Dela Costa St., Makati City CORPORATE GOVERNANCE COMMITTEE CHARTER PREAMBLE Corporate Governance is the empowerment of the Board

More information

HOW SECURE IS YOUR PAYMENT CARD DATA?

HOW SECURE IS YOUR PAYMENT CARD DATA? HOW SECURE IS YOUR PAYMENT CARD DATA? October 27, 2011 MOSS ADAMS LLP 1 TODAY S PRESENTERS Francis Tam, CPA, CISA, CISM, CITP, CRISC, PCI QSA Managing Director PCI Practice Leader Kevin Villanueva,, CISSP,

More information

About the Presenter About the Cloud Security Alliance Guidance 1.0 Getting Involved Call to Action

About the Presenter About the Cloud Security Alliance Guidance 1.0 Getting Involved Call to Action Governance, Risk Management, Compliance, & Audit An Overview of Cloud Security Alliance s Security Guidance for Critical Areas of Focus in Cloud Computing July 23, 2009 Agenda About the Presenter About

More information