B. Security incidents are managed properly is the BEST indication of a mature information security program. A mature information security program is one that is able to effectively identify, respond to and recover from security incidents. This includes having robust incident management processes in place, such as incident response plans, incident response teams, and incident management procedures. Additionally, it includes having the necessary resources and capabilities to effectively detect, contain, and remediate incidents. A mature information security program should also be able to measure the effectiveness of its incident management processes and use the data to continuously improve the program. The other options are also important but they are more focused on the efficiency and effectiveness of the program rather than its ability to handle incidents.
1. Initial. At the initial level, processes are disorganized, ad hoc and even chaotic. Success likely depends on individual efforts and is not considered to be repeatable. This is because processes are not sufficiently defined and documented to enable them to be replicated.
2. Repeatable. At the repeatable level, requisite processes are established, defined and documented. As a result, basic project management techniques are established, and successes in key process areas are able to be repeated.
3. Defined. At the defined level, an organization develops its own standard software development process. These defined processes enable greater attention to documentation, standardization and integration.
4. Managed. At the managed level, an organization monitors and controls its own processes through data collection and analysis.
5. Optimizing. At the optimizing level, processes are constantly improved through monitoring feedback from processes and introducing innovative processes and functionality.
C. Security resources are optimized. Optimizing resources demonstrates the maturity of an information security program. Saying that incidents are managed properly is very vague compared to optimizing available resources.
B. Security incidents are managed properly.
The best indication of a mature information security program is the effective management of security incidents. This suggests that the organization has implemented proactive measures to prevent incidents, has a well-defined incident response plan in place, and can effectively detect, contain, and mitigate security breaches when they occur.
From CISM guide
D 100%
From CISM Certified Information Security Manager Study Guide, by Mike Chappell.
At the top tier of the CMM (capability maturity model), Level 5: Optimizing organizations use a continuous process improvement approach to adjust and fine-tune the way that they work to achieve peak efficiency and effectiveness.
From the CISM Review Manual, 15th Edition, by ISACA:
"An effective security program is one that optimizes the use of security resources. This does not mean simply spending less, but rather making sure that every security dollar is used in the most effective way. This is indicative of a mature information security program because it shows that the program is integrated into the overall business processes of the organization and is not merely a reactive measure to incidents or compliance requirements."
The BEST indication of a mature information security program is that security incidents are managed properly (Option B)
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.CISM Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Broesweelies
Highly Voted 1 year, 9 months agokaranvp
1 year, 4 months agoaokisan
Highly Voted 1 year, 10 months agoSHERLOCKAWS
Most Recent 1 month, 1 week agoMarcelus1714
7 months, 2 weeks agooluchecpoint
9 months, 1 week agoManix
9 months, 2 weeks agoPOWNED
11 months agoSoleandheel
11 months, 3 weeks agooluchecpoint
1 year, 2 months agoAaronS1990
1 year, 2 months agoAaronS1990
1 year, 2 months ago[Removed]
1 year, 3 months agorichck102
1 year, 4 months ago45
1 year, 4 months agowello
1 year, 5 months agoTsubasa1234
1 year, 7 months agoSouvik124
1 year, 8 months ago