Session 1 — Risk Fundamentals & Enterprise Risk Management (Day 10, Mon Apr 6)

Objective: Understand how CISM defines risk, the components of risk, and how information security risk fits into Enterprise Risk Management.
1.5 hours

How CISM Defines Risk

Risk is the combination of the likelihood that a threat will exploit a vulnerability and the business impact if it does. CISM's fundamental risk equation:

Risk = Likelihood × Impact
Or: Risk = Threat × Vulnerability × Asset Value

Each component matters:

  • Threat: A potential cause of an unwanted incident. Threats are external (hackers, natural disasters) or internal (employees, system failures). You cannot eliminate threats — they exist in the environment.
  • Vulnerability: A weakness that could be exploited by a threat. Vulnerabilities can be reduced through controls. This is where security programs have the most leverage.
  • Asset: Anything of value to the organization that could be impacted. Information assets, systems, processes, reputation, financial resources.
  • Likelihood: How probable is it that this threat exploits this vulnerability? Influenced by threat frequency, attacker capability and motivation, existing controls.
  • Impact: What is the business consequence if the risk materializes? Financial loss, operational disruption, regulatory penalty, reputational damage.

Enterprise Risk Management (ERM) and Security Risk

ERM is the organization-wide framework for identifying, assessing, and managing all categories of risk: strategic, operational, financial, legal, and technology/security. CISM expects the information security manager to integrate security risk into the ERM framework — not manage it in isolation.

When security risk is integrated into ERM:

  • Security risks are visible to the same risk committee that sees financial and operational risks
  • Security risk is expressed in the same language as other business risks (financial exposure, probability, business impact)
  • Security investment decisions compete on an equal footing with other business risk investments
  • The board sees security risk as a business risk, not a technical issue
Key CISM Framing

CISM always frames security risk as a business risk. When asked what the information security manager should do with identified risks — the answer almost always involves communicating them to business leadership or integrating them into the enterprise risk framework. Security risk doesn't live in the security team's spreadsheet; it lives in the business's risk register.

Risk Appetite vs. Risk Tolerance vs. Risk Capacity

TermDefinitionWho Sets It
Risk AppetiteThe amount and type of risk an organization is willing to pursue or accept overall. A strategic, qualitative stance (e.g., "low risk tolerance for data breach, moderate for operational disruption").Board of Directors
Risk ToleranceThe acceptable variation in outcomes relative to risk appetite. More operational — the specific bounds within which risk must be kept (e.g., "no more than 3 major incidents per year").Executive management
Risk CapacityThe maximum amount of risk the organization could absorb before its existence or business model is threatened. The absolute ceiling.Board (informed by finance)

The information security manager ensures that identified security risks are evaluated against the organization's risk appetite. Risks within tolerance may be accepted. Risks approaching the tolerance boundary require attention. Risks exceeding capacity require immediate escalation.

Session 2 — Risk Assessment Methodology (Day 11, Tue Apr 7)

Objective: Master the risk assessment process — qualitative vs. quantitative, the steps, and what comes out of it.
1.5 hours

Risk Assessment — The Process

A risk assessment is a structured process for identifying, analyzing, and evaluating risks. CISM describes it as having clear sequential steps. Know these steps cold:

  1. Asset identification: What needs to be protected? Critical information assets, systems, processes. Prioritize by business value.
  2. Threat identification: What could harm these assets? Internal threats (employee error, insider threat), external threats (external attackers, natural disasters, third-party failures).
  3. Vulnerability identification: Where are the weaknesses that threats could exploit? Technical vulnerabilities (unpatched systems), process vulnerabilities (weak change management), human vulnerabilities (lack of awareness).
  4. Risk analysis: For each threat/vulnerability combination: how likely is it? What would the impact be? This produces a risk score or rating.
  5. Risk evaluation: Compare risk scores to risk appetite and tolerance. Which risks are acceptable? Which require treatment?
  6. Risk treatment: For unacceptable risks, select and implement a treatment option (next session).
  7. Documentation: Record all findings in the risk register.

Qualitative vs. Quantitative Risk Assessment

ApproachHow It WorksProsCons
QualitativeRates likelihood and impact on descriptive scales (High/Med/Low or 1-5). Produces heat maps.Fast, accessible, good for initial assessment. No data required.Subjective. Hard to compare across risks. Difficult to calculate ROI.
QuantitativeAssigns financial values. Uses ALE = SLE × ARO. Produces dollar figures.Objective, financial language. Enables ROI calculations. Board-friendly.Data-intensive. Requires accurate loss estimates. Time-consuming.
Semi-quantitativeQualitative ratings converted to numerical scores. Hybrid.Balance of speed and comparability.May give false precision.

Quantitative Risk Formulas — Memorize These

Asset Value (AV): The dollar value of the asset being protected.

Exposure Factor (EF): Percentage of asset value lost if the risk materializes (0 to 100%). A fire that destroys a server room = 100% EF. A breach that exposes 30% of records = 30% EF.

Single Loss Expectancy (SLE) = AV × EF
The expected financial loss from a single occurrence of a risk event.

Annualized Rate of Occurrence (ARO): How many times per year this risk is expected to occur. Once in 10 years = 0.1. Three times per year = 3.

Annualized Loss Expectancy (ALE) = SLE × ARO
The expected annual financial loss from this risk. This is what you compare to control costs.

Control Cost Justification: A control is justified if its cost is less than the ALE it prevents. If ALE = $100K and control costs $30K/year, the control delivers $70K net benefit.

Exam Calculation Example

A server worth $500,000 (AV) has a 40% exposure factor (EF) for a ransomware scenario. The organization estimates this scenario could occur once every 5 years (ARO = 0.2).

SLE = $500,000 × 0.40 = $200,000
ALE = $200,000 × 0.2 = $40,000/year

A backup solution costing $15,000/year that reduces EF to 10% would produce:
New SLE = $500,000 × 0.10 = $50,000
New ALE = $50,000 × 0.2 = $10,000/year
Risk reduction = $40,000 - $10,000 = $30,000/year
Net benefit = $30,000 - $15,000 = $15,000/year net positive

Session 3 — Risk Treatment Options & Controls (Day 12, Wed Apr 8)

Objective: Know the four risk treatment options, when to apply each, and how controls are classified.
1.5 hours

The Four Risk Treatment Options

Once a risk is assessed and found to exceed acceptable levels, the information security manager selects a treatment option. CISM defines four:

OptionAlso CalledWhat It MeansWhen To Use
AvoidTerminateEliminate the activity that causes the risk. Stop doing the thing.When risk exceeds any acceptable threshold and the activity isn't essential.
TransferShareShift financial consequence to a third party (insurance, contracts). Risk still exists — financial impact is shared.When risk can't be reduced to acceptable levels cost-effectively, but consequences can be insured.
MitigateReduceImplement controls to reduce likelihood or impact. Most common treatment.When risk is above tolerance but can be reduced to acceptable levels with cost-effective controls.
AcceptTolerateAcknowledge the risk and consciously choose not to treat it further. Must be documented and approved by appropriate authority.When residual risk is within tolerance, or treatment cost exceeds benefit.
Risk Acceptance — CISM's Rules

Risk acceptance is a legitimate treatment option — but it must be explicit, documented, and approved by appropriate authority. You cannot just ignore a risk and call it "accepted." The information security manager must document: what risk is being accepted, why, what the residual exposure is, and who approved acceptance. This is due care and due diligence in action.

Control Categories — Functional

CategoryPurposeExamples
PreventiveStop the risk event from occurringFirewalls, access controls, encryption, training
DetectiveIdentify that a risk event has occurredSIEM, audit logs, intrusion detection, monitoring
CorrectiveRestore normal operations after an incidentBackup restoration, incident response, patches
DeterrentDiscourage potential attackers or violatorsWarning banners, visible cameras, legal notices
CompensatingAlternative controls when primary controls can't be implementedManual reviews when automated controls aren't possible
RecoveryRestore operations after significant disruptionDisaster recovery, BCP

Control Categories — Implementation Type

TypeDescriptionExamples
AdministrativePolicies, procedures, training, background checksSecurity policy, awareness training, hiring procedures
Technical (Logical)Technology-based controlsFirewalls, encryption, MFA, IDS/IPS
PhysicalPhysical environment controlsLocks, guards, cameras, biometrics, environmental controls
Defense in Depth

CISM expects you to know that controls should be layered — administrative + technical + physical, preventive + detective + corrective. No single control is sufficient. Defense in depth means that the failure of one control does not result in a successful attack. The exam may ask what is "missing" from a control environment — look for the missing layer.

The Risk Register

The risk register is the central documentation tool for the risk management program. It records:

  • Risk identifier and description
  • Asset at risk
  • Threat and vulnerability involved
  • Likelihood and impact ratings
  • Current risk score (inherent risk)
  • Existing controls
  • Residual risk (after existing controls)
  • Treatment option selected
  • Treatment owner and timeline
  • Risk acceptance signature (if accepted)

The risk register is a living document. It must be reviewed regularly (at minimum annually, and whenever significant changes occur) and updated as risks change, controls are implemented, and the business environment evolves.

Session 4 — Risk Monitoring & Reporting (Day 13, Thu Apr 9)

Objective: Understand how to monitor risks over time and report on risk posture to management.
1.5 hours

Continuous Risk Monitoring

Risk assessment is not a once-a-year exercise. Risks change: new threats emerge, vulnerabilities are discovered, business processes change, controls fail. Effective risk management includes continuous monitoring to detect these changes and respond before they become incidents.

Key monitoring activities:

  • Vulnerability scanning: Regular automated scans to detect new vulnerabilities in systems and applications.
  • Threat intelligence: Monitoring of threat landscape changes — new attack techniques, active campaigns targeting the industry, zero-days.
  • Control effectiveness testing: Periodic testing to verify controls are working as designed (configuration reviews, penetration tests, log reviews).
  • KRI monitoring: Tracking key risk indicators for early warning signals that risk is increasing.
  • Third-party risk monitoring: Ongoing oversight of vendor security posture.

Risk Reporting

Risk reporting translates the risk register into actionable information for different audiences:

AudienceWhat They NeedFrequency
Board/Audit CommitteeTop risks, business exposure, governance-level decisions neededQuarterly
Executive/C-suiteRisk posture summary, significant risk changes, investment decisionsMonthly
Business unit leadersRisks specific to their area, control gaps, treatment progressQuarterly
Risk committeeFull risk register review, treatment plan status, escalationsMonthly
Security teamOperational risk details, control failures, remediation prioritiesContinuous

Session 5 — Threat & Vulnerability Management (Day 14, Fri Apr 10)

Objective: Understand the threat landscape, vulnerability management programs, and third-party risk.
1.5 hours

Threat Intelligence

Threat intelligence is the process of gathering, analyzing, and using information about threats to inform risk management decisions. For a CISO, threat intelligence answers: who is targeting organizations like ours, with what techniques, and what do we need to do about it?

Threat intelligence categories:

  • Strategic: High-level trends for executives — industry threat landscape, geopolitical factors, regulatory environment.
  • Operational: Details about specific campaigns and attack patterns for security managers.
  • Tactical: Specific IoCs (indicators of compromise), attack techniques (TTPs) for security operations.

CISM won't test you on specific IoCs — but it will test whether you know that threat intelligence should inform risk assessments and control priorities.

Vulnerability Management

A vulnerability management program systematically identifies, assesses, and remediates vulnerabilities in the organization's systems. Core components:

  1. Discovery: Asset inventory. You can't secure what you don't know you have.
  2. Scanning: Automated vulnerability scanning on all in-scope assets. Frequency based on criticality (critical systems more frequently).
  3. Assessment: Prioritize vulnerabilities based on criticality (CVSS score), exploitability, asset value, and exposure.
  4. Remediation: Patch, configure, or apply compensating controls. Track to closure within defined SLAs.
  5. Verification: Confirm the vulnerability is remediated. Re-scan.
  6. Reporting: Track metrics (patch compliance rate, mean time to remediate, open critical vulns).

Third-Party Risk Management

Third parties — vendors, suppliers, service providers, contractors — often have access to organizational systems and data. A supply chain attack or vendor breach can directly impact the organization. CISM expects the information security manager to manage third-party risk as part of the overall risk management program.

Third-party risk management lifecycle:

  • Due diligence at onboarding: Assess security posture before awarding a contract. Security questionnaires, SOC 2 reports, certifications.
  • Contractual requirements: Security requirements must be in the contract. Data protection clauses, breach notification obligations, right to audit.
  • Ongoing monitoring: Annual reassessments, continuous monitoring where possible. Adjust risk posture as vendors change.
  • Offboarding: Revoke access, ensure data return/destruction, close accounts.
Domain 2 Self-Check

Before moving to flashcards, verify you can answer:

  • What is the CISM risk formula?
  • Calculate ALE given AV, EF, and ARO
  • What are the four risk treatment options?
  • When is risk acceptance appropriate?
  • What is the difference between inherent risk and residual risk?
  • What are the three control types by implementation (administrative, technical, physical)?
  • What does a risk register contain?
Domain 2 Flashcards Domain 2 Quiz Next: Domain 3 →