SIP Study Group - CISM Session 2 - 19th March 2025

Meeting summary for SIP Study Group - 19th March 2025

Quick recap

Winton, a cybersecurity professional, led a live study session on Information Security Risk Management for the CISM exam, emphasizing the importance of understanding and managing risks at a managerial level. He discussed various aspects of risk assessment, treatment, ownership, and monitoring, as well as the significance of frameworks, standards, and emerging threats in the cybersecurity landscape. Winton provided exam tips, shared personal experiences, and stressed the importance of considering both security and business perspectives in information security management.

Next steps

• Attendees to review Domain 2 content on Information Security Risk Management, focusing on risk assessment, analysis, and response strategies.

• Attendees to practice scenario-based questions related to risk and control ownership, particularly those involving different management levels and departments.

• Attendees to prepare for Domain 3, which covers 33% of the CISM exam.

• Attendees interested in personalized guidance to connect with Winton on LinkedIn for resume review or career advice.

• Attendees to stay tuned for the next session on Domain 3 of the CISM exam.

Summary

CISM Domain 2 Study Session

Winton led a live study session for the CISM domain 2, focusing on Information Security Risk Management. He introduced himself as a cybersecurity professional with various certifications and shared his experience as an IT auditor and GRC consultant. Winton emphasized the difference between the Security Plus and the CISM, noting the CISM's managerial approach and the requirement of 5 years of experience and education. He also offered to assist with other cybersecurity certifications and resume review for job seekers.

Information Security Risk Management Essentials

Winton discussed the importance of information security risk management, which accounts for 20% of the exam. He emphasized the need to understand the risk and threat landscape, distinguish between threats, vulnerabilities, and risks, and know how to manage them at a managerial level. He highlighted the importance of risk assessment, risk treatment options, risk and control ownership, and risk monitoring and reporting. Winton stressed the need for quick and appropriate responses to incidents and the importance of documenting every step of the process for future reference.

Risk Assessment and Business Impact Analysis

Winton discussed the importance of risk assessment and business impact analysis in a major proposed purchase and new process for an organization. He emphasized the need for collaboration between the information security manager and the business department manager to evaluate the results and identified risks. Winton also addressed a question about the relevance of the CompTIA Security+ certification in securing a job in the cybersecurity industry. He shared his personal experience of gaining confidence and applying for roles after obtaining the certification. Winton highlighted the value of having a mentor in the industry, which he believes was crucial in his career progression.

Security Plus and Evolving Risks

Winton discussed the importance of security plus in securing a job, emphasizing the need to understand general cybersecurity concepts. He shared his personal experience of passing the exam and improving his networking skills. Winton also highlighted the evolving risk landscape, including phishing and supply chain vulnerabilities, and the potential impact of geopolitical risks. He encouraged staying informed about security risks and subscribing to relevant newsletters.

Frameworks for Securing Devices and Networks

Winton discussed various frameworks and standards for securing devices and networks, including ISO 42,001 and Cis benchmarks. He emphasized the importance of real-time vulnerability analysis, using sandbox environments to understand and prevent threats. Winton also highlighted the use of CVSS scores to assess vulnerability severity and the importance of control deficiency analysis to test the effectiveness of a design. He concluded by suggesting a case study for further reading.

Risk Assessment and Control Implementation

Winton discussed the risk assessment and analysis process, emphasizing the importance of understanding the likelihood and impact of potential risks. He explained the use of quantitative examples like single loss expectancy and annual loss expectancy to model risks and predict potential impacts. Winton also highlighted the importance of having a control in place for potential risks and the use of AI-driven risk heat maps to prioritize vulnerabilities. He mentioned the CIS controls, which include inventory of hardware and software assets, vulnerability management, and secure configurations. Winton emphasized the need for ongoing monitoring and logging of devices to ensure their safety and proper functioning.

Model Poisoning and Risk Management

Winton discussed the emerging risk of model poisoning, where a model is manipulated to deviate from its intended parameters. He shared a personal experience where he initially faced restrictions due to perceived hacking attempts, but was later allowed to proceed after clarifying his intentions. Winton emphasized the importance of understanding different types of threats and their potential costs to the business. He also highlighted the need to prioritize risk management processes and incident response strategies, and to weigh potential security benefits against potential costs.

Risk and Control Ownership in Security

Winton discussed the importance of risk and control ownership, explaining that control owners typically lead operations and implement safeguards, while risk owners are accountable for overseeing the process. He also introduced the RACI matrix, which differentiates between responsible and accountable parties. Winton emphasized the need for continuous risk monitoring and reporting, including real-time dashboards and audit trails. He highlighted the importance of cost-benefit analysis and scenario-based questions in the exam, encouraging test-takers to think like managers and consider the business impact of security decisions.

Exam Tips and Risk Management Strategies

Winton shared exam tips and strategies for managing risk in organizations. He emphasized the importance of building stamina through practice exams and taking strategic breaks during the actual exam. Winton also discussed the impact of organizational culture on risk management and the need for a top-down approach. He highlighted the importance of continuous monitoring, reporting, and reassessment in risk management.

Implementing Proactive Security Measures

Winton discussed the importance of considering security measures in business operations, emphasizing that companies should not wait until a breach occurs to implement security protocols. He suggested that even the bare minimum security measures, such as updating software or implementing a firewall, could protect businesses. Winton also mentioned the need for organizations to be proactive in identifying emerging threats, particularly when expanding into IoT devices that collect sensitive customer data. He suggested reviewing vendor security documentation as a comprehensive approach to identifying emerging threats.

Understanding the First Step in Process

Winton discussed the importance of understanding the first step in a process, using the example of a control assessment where an information security manager discovers critical servers lacking proper patch management. Winton emphasized the need for analysis before action, suggesting that the most effective next step would be to analyze the situation before implementing any solutions. He also mentioned the importance of considering the magnitude of a situation before taking action.

Understanding Business Perspective in Security Management

Winton discussed the importance of understanding the business perspective in information security management. He emphasized the need for continuous risk management and the importance of accountability and responsibility. Winton also highlighted the need for a balanced response that considers both security and business needs. He mentioned that the next session would focus on the largest portion of the exam, which is 33%. Winton encouraged the team to reach out to him with any questions or concerns.

Complete and Continue  
Discussion

0 comments