An information security manager is recommending an investment in a new security initiative to address recently published threats. Which of the following is MOST important to include in the business case?
A.
Alignment with the approved IT strategy
B.
Potential impact of threat realization
C.
Availability of resources to implement the initiative
If the threat is big enough to realign the strategy, then it should be realigned. Potential impact of threat realization seems to be the correct choice here. for example, until ten years ago, there was no ransomware attacks and when it realized, a lot of companies had to re-evaluate and re-align their security strategies.
I'm gonna go ahead and select B here, since A does not say "business strategy" or "information security strategy", but "IT strategy" alignment. So I feel explaining the impact of threat realization is more important than IT strategy. Information security strategy informs IT strategy, not the other way around.
Also, the question does not specify what is the nature and the type of new threats and also just says "security initiative" which doesn't necessarily means it's technical or IT related.
Since un doing something new or including a new control it has to be aligned with the syrategy ofcourse this is how senior management will even hear you out
B. Potential impact of threat realization
While all of the options listed are relevant and important, assessing the potential impact of threat realization should take precedence. Understanding the potential consequences and harm that can result from these threats is essential for making a strong business case for security investments. This information helps the organization assess the risk and prioritize security initiatives effectively. It allows decision-makers to weigh the potential costs and damages associated with not addressing the threats against the investment required for mitigation. Ultimately, the potential impact of threat realization is a critical factor in demonstrating the urgency and necessity of the security initiative.
Not all security issues are related to IT purposes.
upvoted 2 times
...
...
This section is not available anymore. Please use the main Exam Page.CISM Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
yottabyte
10 months agoAlexJacobson
12 months agoAlexJacobson
12 months agoMarcovic00
1 year, 2 months agooluchecpoint
1 year, 4 months agoVesta1807
1 year, 5 months agorichck102
1 year, 6 months agoddharia94
1 year, 7 months agochanke
1 year, 6 months ago