it security, isaca, cism, it certification, exam

ISACA CISM: One of World’s Best Security Credentials

  • By
  • September 4, 2015
0 Comment

 it security, isaca, cism, it certification, examWhen it comes to security certifications, most of us think about CompTIA Security+, CEH, CCNP SEcurity, and CISSP, right? Yet, there are more awesome security credentials that can help you stand out from other candidates during your next job search. ISACA’s CISM (The Certified Information Security Manager) is one of them

But First, What is ISACA?

In case you’re wondering, ISACA stands for Information Systems Audit and Control Association. This is an international professional association focused on IT Governance. The organization was created in the United States back in 1967. That year, a group of individuals working on auditing controls in computer systems started to become increasingly critical of the operations of their organizations. They identified a need for a centralized source of information and guidance in the field. In 1976 the association formed an education foundation to undertake large-scale research efforts to expand the knowledge of and value accorded to the fields of governance and control of information technology. The association became the Information Systems Audit and Control Association in 1994.

ISACA specifically targets IT professionals interested in the highest quality standards with respect to audit, control and security of information systems. The CISM certification holders demonstrate in-depth skills in security risk management, program development and management, governance, and incident management and response.

The CISM Credential and Certification Process

The Certified Information Security Manager (CISM) is ISACA’s flagship credential. This is a top certification for IT professionals involved in managing, developing and overseeing information security systems in enterprise-level applications, or who work on developing best organizational security practices. The CISM credential was introduced to security professionals in 2003 and has remained in high demand ever since.

Developed with experienced security professionals in mind, CISM certification sets new standards for IT security. To achieve this credential, candidates must agree to ISACA’s Code of Professional Ethics and pass a challenging certification exam. Furthermore, they are required to have a minimum of five years of proven security experience, comply with the Continuing Education Policy and submit a written application. Please note that some combinations of education and experience may be substituted to meet the experience requirement – check ISACA website for more information on this.

CISM Certification Prerequisites. To obtain the CISM credential, you must:

  • Pass the CISM exam.
  • Agree to the ISACA Code of Professional Ethics.
  • Possess a minimum of five years of information security work experience, including at least three years of work experience in information security management in three or more of the job practice analysis areas. Experience must be verifiable and obtained in the preceding 10-year period prior to the application date or within five years after passing the exam. There are some exceptions to this requirement depending on current credentials held.
  • Submit an application for CISM certification (processing fee is $50.) Credential must be obtained within five years of passing the exam.
  • Agree to the CISM Continuing Education Policy.

CISM Exam Cost

ISACA members who register early pay $440 for the exam; non-members pay $625 for early registration. Regular registration fee for members is $490 and for non-members is $675. The CISM credential is valid for three years, and credential holders must pay an annual maintenance fee of $45 (ISACA members) or $85 (non-members). Credential holders are also required to obtain a minimum of 120 continuing professional education (CPE) credits over the three-year term to maintain the credential. At least 20 CPEs must be earned every year.

ISACA Certification Program

In addition to the CISM, ISACA offers numerous other certifications for those interested in information security and best practices. Other credentials worth considering include:

  • Certified Information Systems Auditor (CISA) – for professionals working with information systems auditing, control or security.
  • Certified in the Governance of Enterprise IT (CGEIT) – targets IT professionals working in enterprise IT management, governance, strategic alignment, value delivery and risk, resource and performance management.
  • Certified in Risk and Information Systems Control certification (CRISC) – IT professionals seeking careers in all aspects of risk management

Interested in ISACA exams? Visit ExamCollection to find latest exam preparation materials.

Comments
* The most recent comment are at the top

Interesting posts

The Growing Demand for IT Certifications in the Fintech Industry

The fintech industry is experiencing an unprecedented boom, driven by the relentless pace of technological innovation and the increasing integration of financial services with digital platforms. As the lines between finance and technology blur, the need for highly skilled professionals who can navigate both worlds is greater than ever. One of the most effective ways… Read More »

CompTIA Security+ vs. CEH: Entry-Level Cybersecurity Certifications Compared

In today’s digital world, cybersecurity is no longer just a technical concern; it’s a critical business priority. With cyber threats evolving rapidly, organizations of all sizes are seeking skilled professionals to protect their digital assets. For those looking to break into the cybersecurity field, earning a certification is a great way to validate your skills… Read More »

The Evolving Role of ITIL: What’s New in ITIL 4 Managing Professional Transition Exam?

If you’ve been in the IT service management (ITSM) world for a while, you’ve probably heard of ITIL – the framework that’s been guiding IT professionals in delivering high-quality services for decades. The Information Technology Infrastructure Library (ITIL) has evolved significantly over the years, and its latest iteration, ITIL 4, marks a substantial shift in… Read More »

SASE and Zero Trust: How New Security Architectures are Shaping Cisco’s CyberOps Certification

As cybersecurity threats become increasingly sophisticated and pervasive, traditional security models are proving inadequate for today’s complex digital environments. To address these challenges, modern security frameworks such as SASE (Secure Access Service Edge) and Zero Trust are revolutionizing how organizations protect their networks and data. Recognizing the shift towards these advanced security architectures, Cisco has… Read More »

CompTIA’s CASP+ (CAS-004) Gets Tougher: What’s New in Advanced Security Practitioner Certification?

The cybersecurity landscape is constantly evolving, and with it, the certifications that validate the expertise of security professionals must adapt to address new challenges and technologies. CompTIA’s CASP+ (CompTIA Advanced Security Practitioner) certification has long been a hallmark of advanced knowledge in cybersecurity, distinguishing those who are capable of designing, implementing, and managing enterprise-level security… Read More »

Azure DevOps Engineer Expert Certification: What’s Changed in the New AZ-400 Exam Blueprint?

The cloud landscape is evolving at a breakneck pace, and with it, the certifications that validate an IT professional’s skills. One such certification is the Microsoft Certified: DevOps Engineer Expert, which is validated through the AZ-400 exam. This exam has undergone significant changes to reflect the latest trends, tools, and methodologies in the DevOps world.… Read More »

img