ISC2 • ISSMP
The ISSMP validates advanced expertise in establishing, presenting, and governing information security programs. It demonstrates deep management and leadership skills across security governance, risk management, incident management, and compliance.
Questions
833
Duration
180 minutes
Passing Score
700/1000
Difficulty
ProfessionalLast Updated
Mar 2026
The Information Systems Security Management Professional (ISSMP) is an advanced concentration certification from ISC2 that validates deep expertise in establishing, presenting, and governing enterprise information security programs. Earning the ISSMP demonstrates mastery across six critical management domains: leadership and organizational management, systems lifecycle management, risk management, security operations, contingency management, and law, ethics, and compliance. The certification is accredited by ANAB under ISO/IEC Standard 17024 and is approved by the U.S. Department of Defense under DoD 8140, underscoring its recognition as an elite-level credential.
Unlike technical security certifications, the ISSMP is specifically oriented toward security executives and senior managers who must align information security programs with business objectives, manage risk across the enterprise, oversee incident response capabilities, and ensure regulatory compliance. As of October 2023, ISC2 updated the prerequisite structure, making the CISSP no longer strictly required, though CISSP holders with two years of qualifying experience remain a primary pathway to certification. The exam was also refreshed with updated domain outlines based on a current Job Task Analysis (JTA).
The ISSMP is designed for senior information security professionals who operate at the intersection of security and business leadership. Primary target roles include Chief Information Security Officers (CISOs), Chief Information Officers (CIOs), Chief Technology Officers (CTOs), Information Security Directors, and other senior security executives responsible for program governance and strategic direction. It is equally well-suited for seasoned Security Managers and Program Managers who are transitioning into executive leadership roles and need to validate their managerial and governance competencies.
Candidates should have a minimum of seven years of cumulative, full-time experience in two or more of the ISSMP domains, or hold an active CISSP certification plus two years of relevant experience. Those with a post-secondary degree in computer science, information technology, or a related field may apply one year of education toward the experience requirement. The certification is not entry-level; it assumes a practitioner who has already built and operated security programs and is seeking formal recognition of that management expertise.
ISC2 requires candidates to demonstrate substantial professional experience before sitting for the ISSMP. There are two pathways: candidates who already hold an active CISSP in good standing need a minimum of two years of cumulative, full-time paid work experience in one or more of the six ISSMP domains. Candidates without a CISSP must have at least seven years of cumulative, full-time paid work experience in two or more of the domains. A four-year college degree or a regional equivalent, or an additional credential from the ISC2 approved list, can satisfy one year of the required experience under either pathway.
Beyond the formal requirements, candidates should be well-versed in enterprise security program development, risk management frameworks (such as NIST RMF or ISO 27001), incident management methodologies, business continuity planning, and relevant legal and regulatory environments such as GDPR, HIPAA, or FISMA. Practical experience in budgeting, workforce management, vendor/supply chain oversight, and executive-level communication will also be essential for both passing the exam and applying the certification in practice.
The ISSMP exam consists of 125 items delivered over a 3-hour testing window. Questions include multiple-choice and advanced item types, which may include drag-and-drop, hotspot, or scenario-based formats that test applied judgment rather than rote recall. The exam is administered in English and can be taken at Pearson VUE testing centers worldwide or through online proctored delivery. The exam fee is $599 USD.
Scoring uses a scaled system with a maximum of 1,000 points, and candidates must achieve a minimum score of 700 to pass. ISC2 does not publish a fixed number of scored versus unscored items, but the 125-item count is the total presented. Upon passing and meeting the experience requirements, the certification is valid for three years and requires 60 CPE credits for renewal, with an annual maintenance fee. Candidates who do not pass may retake the exam after a waiting period per ISC2's retake policy.
The ISSMP positions certified professionals for the most senior roles in information security leadership, including CISO, Information Security Director, VP of Security, and Security Program Manager. According to salary data aggregated from KnowledgeHut and ZipRecruiter, CISSP-ISSMP holders earn an average of approximately $116,000–$140,000 annually in the United States, with CISO-level roles reaching $218,000 or more depending on organization size and geography. Top markets including San Francisco, New York, and Washington D.C. consistently offer compensation above these averages.
The broader demand environment for this credential is strong: the U.S. Bureau of Labor Statistics projects 33% job growth for information security analysts through 2033, and ISC2's 2024 Cybersecurity Workforce Study identified a global gap of 4.76 million cybersecurity professionals. The ISSMP is approved under DoD Directive 8140, making it particularly valuable for professionals pursuing or maintaining federal government and defense contractor positions. Compared to the base CISSP, the ISSMP signals specialization in governance and management — a differentiator that commands premium compensation and opens doors to executive-track opportunities that generalist certifications do not.
1. Fabrikam International operates across twelve countries and must address trans-border data flow requirements when transferring employee personal data from its European Union offices to its processing center in the United States. The legal team has advised that multiple legal mechanisms may be necessary. Which consideration should the security manager prioritize when addressing trans-border data flow compliance? (Select one!)
2. Northwind Media Corporation is documenting its security policy framework. A junior security analyst has drafted several documents but is unsure about the proper hierarchy and purpose of each document type. The CISO asks the analyst to correctly categorize a document that states: 'All passwords must be a minimum of 14 characters, include uppercase, lowercase, numbers, and special characters.' What type of security document is this? (Select one!)
3. Tailspin Medical Systems processes patient health data and has operations in both the United States and Germany. A data breach exposes personal health information of EU residents stored in the company's US-based data center. Under GDPR, what is the maximum time the organization has to notify the relevant supervisory authority after becoming aware of the breach? (Select one!)
4. Northwind Traders is conducting a quantitative risk analysis for its primary e-commerce platform. The platform has an asset value of $1,500,000. A recent threat assessment identifies a specific threat with an exposure factor of 30% and an annualized rate of occurrence of 0.5. The security team recommends implementing a control costing $75,000 annually that would reduce the exposure factor to 5%. Based on the safeguard value calculation, what is the correct safeguard value, and what should management decide? (Select one!)
5. Fabrikam Technology recently acquired a smaller competitor. During due diligence, the security manager discovers that the acquired company's intellectual property portfolio includes proprietary algorithms embedded in their software products, a customer database with trade secret protections, a registered product brand name, and source code for their applications. The security manager needs to ensure proper legal protections are maintained for each asset type. Which two intellectual property protection mechanisms are correctly matched to the assets they protect? (Select two!)
Select all that applyAll exams included • Cancel anytime