ISACA • CISM
Validates expertise in information security governance, risk management, program development, and incident management for experienced security professionals.
Questions
1196
Duration
240 minutes
Passing Score
450/800
Difficulty
ProfessionalLast Updated
Jan 2026
The Certified Information Security Manager (CISM) is a globally recognized credential awarded by ISACA that validates expertise in managing, designing, and overseeing enterprise information security programs. First introduced in 2002, the certification has been earned by more than 107,000 professionals worldwide and was recognized as the 2025 Best Professional Certification Program. CISM is distinguished from technical certifications by its emphasis on governance, strategic alignment, and business outcomes — validating a practitioner's ability to bridge the gap between information security and organizational objectives.
The credential covers four core practice domains: Information Security Governance, Information Security Risk Management, Information Security Program, and Incident Management. Together, these domains assess a candidate's ability to establish security frameworks aligned with business goals, identify and manage information risk, develop and oversee a security program from inception through continuous improvement, and lead effective incident response and recovery operations. A forthcoming content outline update effective November 3, 2026 will reflect evolving job practice areas, with updated preparation materials available in September 2026.
CISM is designed for experienced information security professionals who have transitioned — or are seeking to transition — from purely technical roles into management and leadership positions. Ideal candidates include information security managers, IT directors, risk managers, security consultants, and compliance officers who are responsible for overseeing enterprise security strategy rather than executing day-to-day technical tasks.
Candidates typically have at least five years of professional information security work experience, with at least three years in security management roles across the CISM domains. The certification is particularly well-suited for professionals in financial services, healthcare, government, and technology sectors where security governance and risk oversight are critical organizational functions.
ISACA does not impose formal prerequisites for sitting the CISM exam — candidates may register and take the exam at any time. However, to apply for the full certification after passing, candidates must demonstrate a minimum of five years of professional information security management work experience within the CISM job practice domains. At least three of those five years must be in information security management. This experience must have been gained within the ten-year period preceding the certification application date, and candidates have five years from their exam passing date to submit their application.
While no specific prior certifications are required, a solid foundation in information security concepts, IT governance frameworks (such as COBIT or ISO/IEC 27001), risk management methodologies, and incident response principles is strongly recommended. Familiarity with regulatory and compliance environments relevant to one's industry will also be beneficial given the governance-heavy nature of the exam.
The CISM exam consists of 150 multiple-choice questions, all of which are scored. The exam is administered over a four-hour time limit. It is delivered as a computer-based test, available either at authorized PSI testing centers worldwide or via remote proctoring, giving candidates flexible delivery options. Registration is continuous — there are no fixed testing windows — and candidates can schedule an appointment as early as 48 hours after payment of the exam registration fee, up to 90 days in advance.
Scoring is reported on a scale of 200 to 800, with a passing score of 450. Questions are designed to assess practical, job-relevant judgment rather than rote memorization, drawing on real-world information security management scenarios. Exam fees are $575 USD for ISACA members and $760 USD for non-members, plus a $50 certification application fee upon passing.
CISM holders command some of the highest salaries in the information security field. U.S.-based professionals with the certification earn an average of approximately $140,000–$150,000 annually, with total compensation averaging above $165,000 when bonuses and benefits are included. Professionals who advance to CISO-level positions — a common trajectory for CISM holders — report average total compensation exceeding $300,000 at large enterprises. Most newly certified professionals report salary increases of $15,000 to $30,000 within their first year, and combining CISM with CISSP can command an additional 10–20% premium in many markets.
The certification opens doors to senior leadership roles including Information Security Manager, Security Director, Chief Information Security Officer, Risk Manager, and IT Compliance Manager across virtually every industry vertical. Government agencies and defense contractors frequently list CISM as a required or preferred credential for security management positions. With the U.S. Bureau of Labor Statistics projecting 33% job growth for information security analysts through 2033 and cybercrime costs projected at $10.5 trillion globally in 2025, demand for credentialed security managers remains strong. CISM's emphasis on business alignment and governance makes it particularly compelling to executive hiring managers who need security leaders who can communicate risk in terms of business impact.
1. A security manager receives notification that a business unit implemented a new cloud-based collaboration platform without security review or approval. The platform has been in production for three months with 200 active users and contains confidential business documents. What should the security manager do FIRST? (Select one!)
2. A security manager receives notification that the organization must comply with GDPR after establishing operations in the European Union. A customer submits a request exercising their right under Article 17. Which data subject right is being invoked, and what is the organization's compliance obligation? (Select one!)
3. An organization implements ITIL 4 Service Value System to integrate security into service management. The security manager must ensure confidentiality, integrity, and availability of information through risk management and security controls. Which ITIL 4 management practice category includes Information Security Management? (Select one!)
4. A security manager reviews the organization's security controls after a malware infection. Antivirus software detected and quarantined the malware before it caused damage. Which type of security control did the antivirus software provide? (Select one!)
5. A security manager implements NIST SP 800-37 Rev 2 Risk Management Framework for federal information systems. The organization has completed system categorization using FIPS 199 and selected baseline controls. Before proceeding to the implementation phase, which activity must the security manager ensure is completed? (Select one!)
All exams included • Cancel anytime