• Online, Self-Paced
Course Description

Information security is only effective if everyone involved is on-board and properly trained. Discover how to develop security awareness and training programs, and how to implement and test the effectiveness of security controls.

Learning Objectives

CISM: Information Security Program Development and Management Part 2

  • describe skills training for information security personnel
  • develop security awareness and training programs
  • integrate mandates into organizational processes
  • define contracts, agreements, and third-parties
  • review third-party contracts and agreements
  • implement operational security metrics
  • testing the effectiveness of security controls
  • communicate program status to key stakeholders
  • describe program development and management

Framework Connections