ISACA • CISM
Validates expertise in information security governance, risk management, program development, and incident management for experienced security professionals.
Questions
1196
Duration
240 minutes
Passing Score
450/800
Difficulty
ProfessionalLast Updated
Jan 2026
The Certified Information Security Manager (CISM) is a globally recognized credential awarded by ISACA that validates expertise in managing, designing, and overseeing enterprise information security programs. First introduced in 2002, the certification has been earned by more than 107,000 professionals worldwide and was recognized as the 2025 Best Professional Certification Program. CISM is distinguished from technical certifications by its emphasis on governance, strategic alignment, and business outcomes — validating a practitioner's ability to bridge the gap between information security and organizational objectives.
The credential covers four core practice domains: Information Security Governance, Information Security Risk Management, Information Security Program, and Incident Management. Together, these domains assess a candidate's ability to establish security frameworks aligned with business goals, identify and manage information risk, develop and oversee a security program from inception through continuous improvement, and lead effective incident response and recovery operations. A forthcoming content outline update effective November 3, 2026 will reflect evolving job practice areas, with updated preparation materials available in September 2026.
CISM is designed for experienced information security professionals who have transitioned — or are seeking to transition — from purely technical roles into management and leadership positions. Ideal candidates include information security managers, IT directors, risk managers, security consultants, and compliance officers who are responsible for overseeing enterprise security strategy rather than executing day-to-day technical tasks.
Candidates typically have at least five years of professional information security work experience, with at least three years in security management roles across the CISM domains. The certification is particularly well-suited for professionals in financial services, healthcare, government, and technology sectors where security governance and risk oversight are critical organizational functions.
ISACA does not impose formal prerequisites for sitting the CISM exam — candidates may register and take the exam at any time. However, to apply for the full certification after passing, candidates must demonstrate a minimum of five years of professional information security management work experience within the CISM job practice domains. At least three of those five years must be in information security management. This experience must have been gained within the ten-year period preceding the certification application date, and candidates have five years from their exam passing date to submit their application.
While no specific prior certifications are required, a solid foundation in information security concepts, IT governance frameworks (such as COBIT or ISO/IEC 27001), risk management methodologies, and incident response principles is strongly recommended. Familiarity with regulatory and compliance environments relevant to one's industry will also be beneficial given the governance-heavy nature of the exam.
The CISM exam consists of 150 multiple-choice questions, all of which are scored. The exam is administered over a four-hour time limit. It is delivered as a computer-based test, available either at authorized PSI testing centers worldwide or via remote proctoring, giving candidates flexible delivery options. Registration is continuous — there are no fixed testing windows — and candidates can schedule an appointment as early as 48 hours after payment of the exam registration fee, up to 90 days in advance.
Scoring is reported on a scale of 200 to 800, with a passing score of 450. Questions are designed to assess practical, job-relevant judgment rather than rote memorization, drawing on real-world information security management scenarios. Exam fees are $575 USD for ISACA members and $760 USD for non-members, plus a $50 certification application fee upon passing.
CISM holders command some of the highest salaries in the information security field. U.S.-based professionals with the certification earn an average of approximately $140,000–$150,000 annually, with total compensation averaging above $165,000 when bonuses and benefits are included. Professionals who advance to CISO-level positions — a common trajectory for CISM holders — report average total compensation exceeding $300,000 at large enterprises. Most newly certified professionals report salary increases of $15,000 to $30,000 within their first year, and combining CISM with CISSP can command an additional 10–20% premium in many markets.
The certification opens doors to senior leadership roles including Information Security Manager, Security Director, Chief Information Security Officer, Risk Manager, and IT Compliance Manager across virtually every industry vertical. Government agencies and defense contractors frequently list CISM as a required or preferred credential for security management positions. With the U.S. Bureau of Labor Statistics projecting 33% job growth for information security analysts through 2033 and cybercrime costs projected at $10.5 trillion globally in 2025, demand for credentialed security managers remains strong. CISM's emphasis on business alignment and governance makes it particularly compelling to executive hiring managers who need security leaders who can communicate risk in terms of business impact.
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 1196 questions.
1. A security manager evaluates control types for a new data loss prevention (DLP) program. The program will use email scanning to detect sensitive data in outbound messages, block messages containing unencrypted credit card numbers, and quarantine messages containing customer lists for manual review. Additionally, the program will generate alerts when sensitive data is detected and log all scanning activities for audit review. How should these DLP capabilities be classified by control function? (Select one!)
Explanation
DLP controls serve multiple functions simultaneously based on their specific actions. Blocking messages containing unencrypted credit card numbers is preventive because it stops data loss before occurrence. Quarantining messages for manual review is corrective because it provides opportunity to remediate policy violations after detection but before data leaves organizational control. Generating alerts is detective because it identifies policy violations for investigation. The classification depends on what the control does, not when it acts. Email scanning is the detection mechanism, but blocking is the preventive action. Quarantining is not purely detective because it includes remediation opportunity making it corrective. Logging is a detective control that creates an audit trail, not corrective. Not all functions are detective; the system applies different control types based on policy rules. Control classification by function includes: Preventive (stop incidents before they occur), Detective (identify during or after occurrence), Corrective (remediate after detection), Deterrent (discourage policy violations), Compensating (alternative when primary control unavailable), and Recovery (restore operations). A single technology solution often implements multiple control types simultaneously.
2. An organization implements DevSecOps practices to integrate security throughout the software development lifecycle. Security testing currently includes SAST during code commits and DAST during staging deployment. Penetration testing occurs before production release. Which security testing gap should the security manager address to improve the DevSecOps maturity? (Select one!)
Explanation
Implementing Software Composition Analysis addresses a critical gap in modern application security because third-party libraries and open-source components comprise 60-90% of typical applications and represent a major attack vector through supply chain vulnerabilities. SCA tools automatically scan dependencies for known vulnerabilities and license compliance issues during the build process, enabling early detection and remediation. The current testing strategy of SAST and DAST doesn't analyze third-party component vulnerabilities. Security code reviews add value but are manual, slow, and don't scale in DevSecOps environments requiring rapid iterations. Increasing penetration testing frequency is expensive and conflicts with DevSecOps principles of automated security testing in the pipeline. WAF is a compensating control that protects deployed applications but doesn't improve security testing or prevent vulnerabilities from reaching production.
3. A CISO position reports directly to the CIO in a financial services organization. The internal audit department identifies potential conflicts of interest where IT operational priorities may override security requirements. Senior management is reviewing the organizational structure. Which reporting relationship would BEST address this concern? (Select one!)
Explanation
CISO reporting to CEO or Chief Risk Officer independent of IT operations represents best practice for eliminating conflicts of interest. When the CISO reports to the CIO, IT delivery priorities and operational goals can override security requirements since the CIO has ultimate authority over both functions. Direct reporting to CEO or CRO ensures security risks are evaluated alongside business priorities without IT operational bias. Reporting to CTO creates the same conflict as CIO reporting. CFO reporting focuses on financial controls but doesn't provide the strategic security positioning needed. General Counsel reporting emphasizes legal compliance but may not provide the business-wide security authority required.
4. A security manager develops executive reporting to communicate security program effectiveness to the board of directors. The board requests metrics that provide early warning of emerging risks rather than historical performance measures. The security manager must select appropriate indicators that are forward-looking and predictive. Which metrics BEST serve as Key Risk Indicators providing early warning of potential security issues? (Select two!)
Multiple correct answersExplanation
Key Risk Indicators are forward-looking metrics that provide early warning of emerging risks. Increasing unpatched vulnerabilities and unjustified privileged account growth both signal developing risk exposures before incidents occur. These trends indicate deteriorating security posture that could lead to future incidents. Mean time to detect represents historical performance measuring how well the organization responded to past incidents. Training completion rates measure program performance, not emerging risk. Incident response compliance measures past performance against objectives. KRIs predict future risk while KPIs measure past performance.
5. A security manager implements application security testing for DevSecOps pipeline integration. The development team releases web application updates every two weeks using continuous integration and continuous deployment. Which testing approach provides the EARLIEST identification of security vulnerabilities in the development lifecycle? (Select one!)
Explanation
Static Application Security Testing analyzes source code during development, identifying vulnerabilities like SQL injection and buffer overflows before code execution. Shift Left security principles emphasize finding and fixing issues as early as possible when remediation costs are lowest. SAST integration at code commit provides immediate developer feedback during the coding phase. Dynamic Application Security Testing requires running applications, occurring later in the pipeline during staging. Interactive Application Security Testing instruments running applications but occurs during testing phases after code development. Software Composition Analysis identifies known vulnerabilities in third-party components and should occur early, but SAST addresses custom code vulnerabilities during initial development. Early detection through SAST enables developers to fix security issues before they propagate through the pipeline.
One-time access to this exam