The first step to establishing an effective information security program is to create a business case (option C). A business case outlines the justification for the program by identifying the business needs, goals, objectives, potential benefits, and costs associated with implementing the security program.
Creating a business case helps secure organizational buy-in and support for the program. It provides a clear understanding of why the program is necessary and what it aims to achieve. The business case also serves as a foundation for obtaining the necessary resources and funding to implement the program effectively.
The logical sequence of events would be:
1. Perform a business impact analysis (BIA) to understand the criticality and potential impacts of security incidents on business processes.
2. Use the findings from the BIA to create a business case that outlines the rationale, costs, benefits, and risks associated with implementing an information security program.
3. Once the business case is approved, assign accountability, establish roles and responsibilities, and begin the implementation of the information security program.
C- the question is about 'establishing a program' in an organization. So from an ISM perspective that takeaway would be a business case. Part of building a business case would require BIA.
C. Create a business case
The first step to establishing an effective information security program is to create a business case. A business case outlines the rationale for investing in information security measures by identifying the potential benefits, risks, costs, and strategic alignment with the organization's objectives. It helps garner support from stakeholders and decision-makers, securing the necessary resources and commitment to initiate the information security program. While options A, B, and D (Assign accountability, Perform a business impact analysis, Conduct a compliance review) are important steps in the process, creating a business case provides the foundational justification and framework for establishing the program.
I'm gonna go with C. The reason for that is that business case is defined as a justification for the effort and investment in the project, and information security program is considered "a project".
Performing a BIA is part of creating a business case. Creating a business case encompasses performing a Business Imapct Analysis. You typically perform a BIA after a strategy is already established. As such, C. Create a business case is the best answer especially as it will encompass a BIA.
B. Perform a business impact analysis (BIA).
Before assigning accountability, creating a business case, or conducting a compliance review, it's important to understand the potential risks and impacts to your organization's information and data. A business impact analysis helps identify critical assets, assess the potential impact of various threats and vulnerabilities, and prioritize security measures accordingly. This analysis forms the foundation for designing an effective information security program.
Performing a business impact analysis (BIA) is the first step to establishing an effective information security program. This is because a BIA helps identify the critical assets, systems, and processes of an organization, as well as the potential threats and vulnerabilities that could affect them.
While creating a business case is important in establishing an effective information security program, it is typically not the first step. The first step is usually to understand the potential impacts to the organization in the event of a security breach or disruption to the normal course of business operations. This is where a Business Impact Analysis (BIA) comes into play, as it helps identify and prioritize the critical systems, processes and data that must be protected. A BIA is the foundation for creating an effective information security program, including determining the scope, risk management strategies, and allocation of resources.
upvoted 4 times
...
This section is not available anymore. Please use the main Exam Page.CISM Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
drewl25
Highly Voted 1 year, 2 months agowello
Highly Voted 1 year, 4 months agoshootnot
Most Recent 5 months, 1 week agoREHAMAZZAM
8 months, 2 weeks agoAlexJacobson
8 months, 3 weeks agomaisarajarrah
9 months, 2 weeks agoUncle_Lucifer
10 months, 2 weeks agoUncle_Lucifer
10 months, 2 weeks agoSoleandheel
11 months agooluchecpoint
1 year, 1 month agoGoseu
1 year, 3 months agorichck102
1 year, 3 months agobambs
1 year, 6 months agoBroesweelies
1 year, 8 months ago