About 3,410 results
Open links in new tab
  1. Information Security Management - ISACA

    Explore career pathways in Information Security Management. Learn what employers expect, discover skills needed, and access ISACA resources to support your journey.

  2. CISM® Certification | Certified Information Security Manager®

    ISACA's Certified Information Security Manager (CISM) is the standard achievement certification for expert knowledge and experience in IS/IT security and control.

  3. ISACA Introduces First and Only AI-Centric Security Management ...

    Aug 19, 2025 · Empowering Security Leaders in the AI Era The first and only credential of its kind, AAISM is designed to equip cybersecurity leaders with the specialized skills needed to manage the …

  4. CISM® Exam Content Outline - ISACA

    Discover what the Certified Information Security Manager (CISM) exam covers, including in-depth information on its domains, the job practice areas tested, and more.

  5. Earn a CISM® Certification - ISACA

    Ready to become a Certified Information Security Manager (CISM)? Follow these three steps to elevate your IS/IT security career.

  6. How AAISM Can Differentiate Information Security Managers

    Aug 18, 2025 · The ISACA Advanced in AI Security Management (AAISM) credential enables security managers to demonstrate that they can identify, assess, monitor and mitigate enterprise AI risk, and …

  7. AAISM™ Certification | ISACA AI Security Management™

    The groundbreaking advanced AI credential, ISACA Advanced in AI Security Management (AAISM) proves the ability to identify, assess and mitigate risk related to AI.

  8. A Guide to the Updated ISO/IEC 27002:2022 Standard, Part 1

    Feb 15, 2023 · This is a preventive control to specify and manage information security for the use of cloud services. According to ISO/IEC 27001:2022, “Processes for acquisition, use, management and …

  9. 2019 Volume 5 Accountability for Information Security Roles and ...

    Oct 16, 2019 · In recent years, information security has evolved from its traditional orientation, focused mainly on technology, to become part of the organization’s strategic alignment, enhancing the need …

  10. Developing a Cyber Strategy and the Seven Pillars of Cyber ... - ISACA

    Feb 14, 2025 · An effective cybersecurity strategy that includes critical pillars of cyber resilience, such as embedding security into the design phase and prioritizing basic controls, can drive business success.