CISM Exam QuestionsBrowse all questions from this exam

CISM Exam - Question 879


Which of the following would BEST guide the development and maintenance of an information security program?

Show Answer
Correct Answer: BD

An established risk assessment process would best guide the development and maintenance of an information security program. This process involves systematically identifying, evaluating, and prioritizing potential risks to the organization's information security. By understanding the likelihood and potential impact of each risk, the organization can develop appropriate strategies and controls to mitigate them. Regular risk assessments ensure the information security program remains relevant, effective, and up-to-date, which is crucial for maintaining robust security in the face of evolving threats.

Discussion

10 comments
Sign in to comment
koala_layOption: D
Oct 20, 2023

The best option would be D. An established risk assessment process. An established risk assessment process helps identify and prioritize potential risks to the organization's information security. It involves evaluating the likelihood and potential impact of each risk, and developing strategies and controls to mitigate them. This process should be conducted on a regular basis to ensure that the information security program remains effective and up to date.

killaincOption: B
Jan 10, 2024

To guide the development and maintenance of an information security program, it is important to have a comprehensive understanding of the organization’s risk appetite 1. This will help in identifying the level of risk that the organization is willing to accept and the level of security that is required to protect the organization’s assets.

AlexJacobsonOption: D
Jan 28, 2024

IMO, risk assessment is needed for objective view of things. Risk appetite is too broad to guide development AND maintenance. It may serve as a starting point, but you need measurable, relevant and repeatable processes to be consistent. Also, infosec program also deals with security controls. How would you select the appropriate controls by just looking at risk appetite and no risk assessment?

richck102Option: D
Oct 3, 2023

D. An established risk assessment process

SoleandheelOption: B
Nov 25, 2023

B. The organization's risk appetite

Soleandheel
Nov 25, 2023

When you're still in the development stage of your information Security Program, the risk appetite is the driver. A well established risk assessment typically comes to play after the programm is already up. Risk appetite represents the organization's willingness to accept and tolerate risk, and it sets the overarching parameters for how the organization should approach information security. It helps determine the appropriate level of security controls, risk mitigation measures, and resource allocation needed to align with the organization's strategic goals and risk tolerance.

FenixOidOption: B
Dec 6, 2023

agree with Soleandheel1

yottabyteOption: B
Mar 21, 2024

Organization's risk appetite will dictate the stringent approach of risk assessments. So B is important than D here.

oluchecpointOption: D
Apr 27, 2024

D. An established risk assessment process

shootnotOption: B
May 13, 2024

B- Risk appetite serves as a guiding principal whereas the established risk assessment process is a vehicle.

03allenOption: B
Jul 18, 2024

the risks identified by D are still needed to be evaluated by B