1 - Class Introduction What is CISM Certification and Domains
2 - What is Information Security Function
3 - Information Security and GRC
4 - Criterias of Effective Information Security Program
5 - Governance vs Management
6 - Outcomes of Proper Security Governace
7 - Who is responsible for Security Governance
8 - Typical Organizational Structure
9 - CRO CISO CIO and their roles and responsibilities
10 - Goal and Objectives and Understanding RACI Matrix
11 - Strategy Constraints Overview
12 - Legal Regulations and Standards
13 - Retention of Business Records and Secure Disposal
14 - SOC 1 vs SOC 2 vs SOC 3
15 - Other Strategy Constraints and PDCA Model
16 - Security Governance Framework
17 - Capability Maturity Model Tool
18 - SABSA TOGAF FRAMEWORKS
19 - IT BSC BMIS
20 - Senior Management Support
21 - Business Case
22 - Policies as Governance Tools
23 - Standards Procedures and Guidelines
24 - Security Controls
25 - Control Objective and Targeted Compensating Controls