CISM: Domain 1 - Module 2
In this lesson, we start off by looking at constraints that may prevent us from reaching our security objectives before moving on to how to form an action plan. This involves carrying out a gap analysis to see where you are and where you want to be (with regards to information security, of lesson) and then putting a plan into place to close the gap.
We then need to implement ways to measure progress towards closing the gap and we will look at that in the metrics and monitoring lecture. Finally, we look at the six strategic outcomes which help us to define what success looks like.
Learning Objectives
- Understand the potential constraints that may impede our security measures
- Learn how to create an action plan to reach our security goals
- Learn how to measure progress through metrics and monitoring
- Understand how we define success
Intended Audience
This lesson is intended for anyone preparing for the Certified Information Security Management exam or anyone who is simply interested in improving their knowledge of information security governance.
Prerequisites
Before taking this lesson, we recommend taking the CISM Foundations course first.