At a Glance
- Tasks: Master information security governance and risk management strategies.
- Company: Join a leading training provider in information security.
- Benefits: Gain valuable skills, prepare for CISM certification, and enhance your career prospects.
- Why this job: Become a certified expert in a high-demand field and make a real impact.
- Qualifications: 3-5 years of industry experience in security technologies required.
- Other info: Interactive workshops with practical insights and networking opportunities.
The predicted salary is between 36000 - 60000 £ per year.
Around the world, demand for skilled information security management professionals is on the rise, and the CISM certification is the globally accepted standard of achievement in this area. The uniquely management-focused CISM certification ensures holders understand business, and know how to manage and adapt technology to their enterprise and industry. CISM holders are consistently recognized among the most qualified professionals in the information security and risk management fields.
Effective Information Security Managers need to understand more than just Firewalls and Phishing. Having a clear Strategy and Roadmap with strong Governance and Charter is perhaps more important. Learn how to use COBIT methodology and security architectures like TOGAF and SABSA to build a value focused InfoSec programme with RiskIT and ValIT. Uniquely focused on the management and implementation of successful information security programmes, this event is more like an MBA than MSCE or CCNA!
Objective: This workshop fully covers the current ISACA CISM exam syllabus by explaining how to use COBIT, ValIT and RiskIT to implement an InfoSec Risk Management programme while supporting the core business strategy. Exam question techniques and study plans are also covered.
Outline:
- Domain 1—Information Security Governance (17%)
- Domain 3—Information Security Program Development and Management (33%)
- Domain 4—Information Security Incident Management (30%)
Exam: The event fully prepares delegates for the 2022 Certified Information Security Manager (CISM) exam from ISACA. Please note that the exam is not included with the course.
Pre-requisites: The delegate should have a basic understanding of security technologies gained from 3-5 years industry experience or equivalent experience from another training event like Nemstar's CISSP Programme. A basic understanding of information systems and networking is also required.
Courseware: Electronic courseware provided including study manual and practice exam questions.
We are scheduling future dates for this course. Register your interest in attending by email at contact@aku.training or call us on 028 9016 0587. If you have four or more participants, inhouse delivery may be more cost effective. Contact us today for a quote.
CISM InfoSec Leader: Governance & Risk Program Management in London employer: AKU Training Ltd
Contact Detail:
AKU Training Ltd Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land CISM InfoSec Leader: Governance & Risk Program Management in London
✨Tip Number 1
Network like a pro! Get out there and connect with folks in the InfoSec community. Attend workshops, webinars, or local meetups to meet potential employers and learn about job openings that might not be advertised.
✨Tip Number 2
Showcase your skills! Create a portfolio that highlights your projects and achievements in information security. This can be a great conversation starter during interviews and helps us see your practical experience.
✨Tip Number 3
Prepare for interviews by researching the company and its InfoSec practices. Tailor your answers to show how your skills align with their needs, especially around governance and risk management strategies.
✨Tip Number 4
Don’t forget to apply through our website! We’ve got loads of opportunities waiting for you, and applying directly can sometimes give you an edge over other candidates.
We think you need these skills to ace CISM InfoSec Leader: Governance & Risk Program Management in London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV reflects the skills and experiences that align with the CISM role. Highlight your governance and risk management experience, and don’t forget to mention any relevant certifications like CISM or COBIT.
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about information security and how your background makes you a perfect fit for our team. Keep it concise but impactful!
Showcase Your Knowledge: In your application, demonstrate your understanding of key concepts like InfoSec governance and risk management. Mention any specific methodologies you’ve used, such as COBIT or ValIT, to show us you’re in the know.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the easiest way for us to receive your application and ensures you don’t miss out on any important updates from us!
How to prepare for a job interview at AKU Training Ltd
✨Know Your Stuff
Make sure you brush up on your knowledge of the CISM certification and its key components. Understand the COBIT methodology, ValIT, and RiskIT, as these are crucial for the role. Being able to discuss how these frameworks apply to real-world scenarios will impress your interviewers.
✨Showcase Your Experience
With 3-5 years of industry experience under your belt, be ready to share specific examples of how you've managed information security programmes. Highlight any successful strategies you've implemented and how they aligned with business goals. This will demonstrate your practical understanding of the role.
✨Prepare for Scenario Questions
Expect to face scenario-based questions that test your problem-solving skills in information security governance and risk management. Practice articulating your thought process and decision-making strategies in these situations, as it shows your ability to think critically under pressure.
✨Ask Insightful Questions
At the end of the interview, don’t shy away from asking questions about the company’s current InfoSec challenges or their governance strategies. This not only shows your genuine interest in the role but also gives you a chance to demonstrate your knowledge and strategic thinking.