{"id":10144,"date":"2024-05-01T15:04:04","date_gmt":"2024-05-01T15:04:04","guid":{"rendered":"https:\/\/sajinshivdas.com\/cybersecurity\/?p=10144"},"modified":"2024-06-18T09:36:55","modified_gmt":"2024-06-18T09:36:55","slug":"cism-interactive-mindmap-domain-2-information-security-risk-management","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-2-information-security-risk-management\/","title":{"rendered":"CISM Interactive Mindmap &#8211; Domain 2: Information Security Risk Management"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div id=\"ultimate-heading-255769da3ceb19f2c\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-255769da3ceb19f2c uvc-9288 \" data-hspacer=\"line_with_icon\" data-hline_width=\"auto\" data-hicon_type=\"selector\" data-hborder_style=\"solid\" data-hborder_height=\"3\" data-hborder_color=\"#000000\" data-icon_width=\"32\" data-hfixer=\"10\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-255769da3ceb19f2c h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"desktop:2px;\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">CISM Mindmap-Domain 2: Information Security Risk Management<\/h3><\/div><div class=\"uvc-heading-spacer line_with_icon\" style=\"topheight:32px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none \"  style=\"font-size:32px;display:inline-block;\">\n\t<i class=\"awesome-book\"><\/i>\n<\/div><\/div><\/div><\/div><div class=\"uvc-sub-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-255769da3ceb19f2c .uvc-sub-heading '  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:normal;\">\n<h5>An Interactive CISM Mindmap Series<\/h5>\n<\/div><\/div>[image_with_animation image_url=&#8221;9795&#8243; image_size=&#8221;medium_large&#8221; animation_type=&#8221;entrance&#8221; animation=&#8221;None&#8221; animation_movement_type=&#8221;transform_y&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;center&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Table of Contents<\/span><\/p>\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"#Key Terms &amp; Definitions\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Key Terms &amp; Definitions<\/span><\/a><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"#Key Areas\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Key Areas<\/span><\/a><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"#Information Security Risk Management_Mindmap\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Information Security Risk Management_Mindmap<\/span><\/a><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"#Resources\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Resources<\/span><\/a><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"#Credits &amp; Disclaimer\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Credits &amp; Disclaimer<\/span><\/a><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h1>CISM Mindmap &#8211; Domain 02<\/h1>\n[\/vc_column_text][vc_column_text]CISM Mindmap Series will include all 4 Domains. This collection is designed to equip prospective CISM aspirants with essential resources for exam preparation, training and reference.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Key Terms &amp; Definitions&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_wp_custommenu][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;]<div id=\"ultimate-heading-346669da3ceb19f59\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-346669da3ceb19f59 uvc-7217 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-346669da3ceb19f59 h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">CISM Domain_02: Key Terms &amp; Definitions<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]\n<ol>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Risk Assessmen<\/span>t: The process of identifying, analyzing, and evaluating risks. It is foundational in determining the extent of the potential threats and the risk they pose to the organization.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Risk Mitigation<\/span>: Actions taken to reduce the likelihood and\/or impact of a risk. This could include implementing controls, adopting new policies, or changing existing procedures.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Risk Transfer<\/span>: The process of shifting the risk to a third party, such as through insurance or outsourcing. This does not eliminate the risk but rather allocates the impact to another entity.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Risk Acceptance<\/span> : The decision to accept the risk as it is, typically because the cost of mitigating the risk would exceed the benefit gained from such actions.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Risk Avoidance<\/span>: Actions taken to avoid the risk entirely, often by not engaging in activities that would generate the risk.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Vulnerability Assessment<\/span>: A systematic examination of an information system or product to determine the adequacy of security measures, identify security deficiencies, and predict effectiveness of proposed security measures.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Threat Landscape<\/span>: An overview of the types of threats an organization faces, including the tactics, techniques, and procedures used by threat actors against specific industries or entities.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Impact Analysis<\/span>: The process of analyzing the consequences of an identified risk eventuating, and determining its impact on business operations.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Control Environment<\/span>: The overall atmosphere, attitude, awareness, and actions of directors, management, and personnel regarding the internal control system and its importance to the entity. This environment serves as the foundation for effective risk management.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Inherent Risk<\/span>: The level of risk inherent in a process or environment, without considering the effect of any risk controls. It represents the baseline risk that exists before any mitigative actions are taken.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Residual Risk<\/span>: The level of risk that remains after controls are applied. Understanding residual risk is crucial for deciding whether additional measures are needed or if the remaining risk is acceptable.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Risk Appetite<\/span>: The amount and type of risk an organization is willing to take in order to meet their strategic objectives. Risk appetite is a guide to risk management decisions and helps align risks with strategy.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Risk Tolerance<\/span>: The acceptable variation an organization is willing to withstand around specific business objectives or risks. It often quantifies the acceptable limit or boundary of risk appetite.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Security Posture:<\/span> The overall security status of an organization\u2019s software, hardware, services, networks, information, and physical premises, as well as the efficacy of the controls in place to protect from threats.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Risk Register<\/span>: A tool used to track risks and their status throughout the risk management process. It typically includes details on risk assessment, risk response plans, and current risk status.<\/li>\n<\/ol>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Key Areas&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div id=\"ultimate-heading-982169da3ceb19f7a\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-982169da3ceb19f7a uvc-6095 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-982169da3ceb19f7a h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">CISM Domain_02: Key Areas<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Risk Assessment:<\/span><\/p>\n<ul>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\">Identifying and evaluating risk to the organization\u2019s assets to determine the likelihood and impact of potential security incidents.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\">Utilizing various methodologies to assess risk.<\/li>\n<\/ul>\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Risk Response:<\/span><\/p>\n<ul>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\">Determining appropriate ways to handle identified risks, including avoidance, mitigation, sharing, and acceptance.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\">Developing and implementing risk management strategies.<\/li>\n<\/ul>\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Risk Monitoring and Reporting:<\/span><\/p>\n<ul>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\">Continuously monitoring risk and the effectiveness of the risk management strategies.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\">Reporting on risk and changes to senior management to facilitate decision-making.<\/li>\n<\/ul>\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Information Resource Valuation:<\/span><\/p>\n<ul>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\">Assigning value to information resources based on their importance to the business objectives and risk management strategy.<\/li>\n<\/ul>\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Risk Management Integration with Enterprise Risk Management (ERM):<\/span><\/p>\n<ul>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\">Ensuring that information security risk management aligns with the organization\u2019s broader risk management practices and business goals.<\/li>\n<\/ul>\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Risk Management Frameworks and Methodologies:<\/span><\/p>\n<ul>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\">Utilizing established frameworks and methodologies (such as ISO 31000, NIST SP 800-30) for a systematic and structured risk management process.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Information Security Risk Management_Mindmap&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div id=\"ultimate-heading-862369da3ceb19f95\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-862369da3ceb19f95 uvc-2441 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-862369da3ceb19f95 h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">CISM Domain_02: Information Security Risk Management<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_raw_html]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[\/vc_raw_html][nectar_btn size=&#8221;small&#8221; open_new_tab=&#8221;true&#8221; button_style=&#8221;regular&#8221; button_color_2=&#8221;Accent-Color&#8221; icon_family=&#8221;none&#8221; text=&#8221;Full Screen&#8221; url=&#8221;https:\/\/sajinshivdas.com\/cybersecurity\/cism_mindmap_domain-02\/&#8221;]\r\n\t\t\t<div class=\"ult_dual_button  ult-adjust-bottom-margin to-center  \"  data-response=\"on\" id=\"ult_btn_3200879377\">\r\n\r\n\t\t\t<div id=\"dualbtn-1032\" class=\"ulitmate_dual_buttons ult-dual-btn ult_main_dualbtn \" data-bcolor=\"#333333\"data-bhcolor=\"\">\r\n\r\n\t\t\t<div class=\"ult_dualbutton-wrapper btn-inline place-template bt1 \"><a href=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/05\/CISM_Domain_02_Information-Security-Risk-Management_PDF.zip\" target=\"_blank\" rel=\"noopener\"  class=\"ult_ivan_button round-square with-icon icon-before with-text place-template ult_dual1\" style=\";margin-right:px;;background-color:#ffffff !important;; border-color:#333333;border-style:;border-width:0px;border-radius:px;;\">\r\n\t\t\t<span class=\"ult-dual-btn-1 Style 1\" style=\"\"  data-bgcolor=\"#ffffff\" data-bghovercolor=\"#bcbcbc\" data-icon_color=\"#333333\" data-icon_hover_color=\"#333333\" data-textcolor=\"#333333\" data-texthovercolor=\"#333333\" data-iconbgcolor=\"transperent\" data-iconbghovercolor=\"transperent\" data-iconborder=\"transperent\" data-iconhoverborder=\"transperent\" >\r\n\t\t\t<span class=\"icon-simple icon-left1 ult_btn1span \"  style=\"; \">\n<span class=\"aio-icon btn1icon none \"  style=\"color:#333333;font-size:32px;\">\n\t<i class=\"Defaults-file-pdf-o\" ><\/i>\n<\/span><\/span>\r\n\t\t\t<span class=\"text-btn ult-dual-button-title ult-responsive\"  data-ultimate-target='#dualbtn-1032 .ult-dual-button-title'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"desktop:15px;\"}'  style=\"font-weight:normal;color:#333333;\">Download PDF Format<\/span>\r\n\r\n\t\t\t<\/span>\r\n\t\t\t<\/a><span class=\"middle-text\" style=\"line-height: 1.8em;color:#ffffff;background-color:#333333;border-width:0px;\">\r\n\t\t\t<span class=\"middle-inner\"  >or<\/span>\r\n\t\t\t<\/span>\r\n\r\n\t\t\t<\/div>\r\n\r\n\t\t\t<div class=\"ult_dualbutton-wrapper btn-inline place-template btn2 \"><a href=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/05\/CISM_Domain_02_Information-Security-Risk-Management_JPEG.zip\" target=\"_blank\" rel=\"noopener\"  class=\"ult_ivan_button round-square with-icon icon-after with-text place-template ult_dual2\"  style=\";background-color:#ffffff !important;;margin-left:px;;border-color:#333333;border-style:;border-width:0px;border-radius:px;\">\r\n\t\t\t<span class=\"ult-dual-btn-2 Style 1\"  data-bgcolor=\"#ffffff\" data-bghovercolor=\"#bcbcbc\" data-icon_color=\"#333333\" data-icon_hover_color=\"#333333\" data-textcolor=\"#333333\" data-texthovercolor=\"#333333\" data-iconbgcolor=\"transperent\" data-iconbghovercolor=\"transperent\" data-iconborder=\"transperent\" data-iconhoverborder=\"transperent\" >\r\n\t\t\t<span class=\"text-btn ult-dual-button-title\" style=\"font-weight:normal;color:#333333;\">Download JPG Format<\/span>\r\n\r\n\t\t\t<span class=\"icon-simple icon-right2 ult_btn1span \"  style=\"; \">\n<span class=\"aio-icon btn1icon none \"  style=\"color:#333333;font-size:32px;display:inline-block;\">\n\t<i class=\"Defaults-file-image-o file-photo-o file-picture-o\" ><\/i>\n<\/span><\/span>\r\n\t\t\t<\/span>\r\n\t\t\t<\/a><\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<\/div>[\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Resources&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div class=\"ult-spacer spacer-69da3ceb19ff7\" data-id=\"69da3ceb19ff7\" data-height=\"10\" data-height-mobile=\"10\" data-height-tab=\"10\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div><div id=\"ultimate-heading-952569da3ceb1a00a\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-952569da3ceb1a00a uvc-3170 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-952569da3ceb1a00a h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">Resources<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>CISM\u00ae Certified Information Security Manager <\/strong><strong>Study Guide<\/strong> by Mike Chapple<\/span><\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition, 2nd Edition <\/strong>by Peter H. Gregory<\/span><\/li>\n<\/ul>\n[\/vc_column_text][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Contribution&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div id=\"ultimate-heading-701269da3ceb1a023\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-701269da3ceb1a023 uvc-8896 \" data-hspacer=\"line_only\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-701269da3ceb1a023 h4'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h4 style=\"font-weight:bold;color:#3452ff;\">Contribution<\/h4><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]<span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">We have already included some reference images and short notes for most of the topics so that users can more effectively refer to the content in the mindmap. If you have any information, images, or notes that can make the mindmap more effective, please feel free to share them.<\/span><\/p>\n<p><a href=\"https:\/\/github.com\/ShivdaSaj\/CISM_Interactive_Mindmap\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">https:\/\/github.com\/ShivdaSaj\/CISM_Interactive_Mindmap<\/span><\/a><\/p>\n<p><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">For issues and concern please feel free to raise a issue in Github link <a href=\"https:\/\/github.com\/ShivdaSaj\/CISM_Interactive_Mindmap\/issues\">https:\/\/github.com\/ShivdaSaj\/CISM_Interactive_Mindmap\/issues<\/a><\/span><\/p>\n<p><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Connect with me <a href=\"http:\/\/www.linkedin.com\/in\/sajin-shivdas\">www.linkedin.com\/in\/sajin-shivdas<\/a><\/span>[\/vc_column_text]<div class=\"  uavc-icons \">\n<a class=\"aio-tooltip 69da3ceb1a082\" href=\"https:\/\/github.com\/sajinshivdas\/CISSP_Interactive_Mindmap\" target=\"_blank\" rel=\"noopener\"  data-toggle=\"tooltip\" data-placement=\"\" title=\"\"><div class=\"aio-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"font-size:32px;margin-right:5px;\">\n\t<i class=\"Defaults-github-square\"><\/i>\n<\/div><\/a>\n<a class=\"aio-tooltip 69da3ceb1a099\" href=\"http:\/\/www.linkedin.com\/in\/sajin-shivdas\" target=\"_blank\" rel=\"noopener\"  data-toggle=\"tooltip\" data-placement=\"\" title=\"\"><div class=\"aio-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"font-size:32px;margin-right:5px;\">\n\t<i class=\"Defaults-linkedin-square\"><\/i>\n<\/div><\/a><\/div>[\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Related Mindmaps&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/6&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][\/vc_column_inner][vc_column_inner column_padding=&#8221;padding-2-percent&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;left-right&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; centered_text=&#8221;true&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;2\/3&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; enable_animation=&#8221;true&#8221; animation=&#8221;fade-in&#8221; animation_easing=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][nectar_gradient_text heading_tag=&#8221;h5&#8243; color=&#8221;extra-color-gradient-2&#8243; gradient_direction=&#8221;horizontal&#8221; text=&#8221;Complete Mindmaps&#8221; margin_bottom=&#8221;10&#8243;][vc_custom_heading text=&#8221;Complete list of Mindmaps related to Cybersecurity&#8221; font_container=&#8221;tag:h2|font_size:52|text_align:center|line_height:52px&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;fadeInUp&#8221;][vc_custom_heading text=&#8221;Cybersecurity Mindmaps&#8221; font_container=&#8221;tag:p|text_align:center|color:rgba(0%2C0%2C0%2C0.7)&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1707775606373{margin-top: 10px !important;margin-bottom: 10px !important;}&#8221;][nectar_btn size=&#8221;jumbo&#8221; open_new_tab=&#8221;true&#8221; button_style=&#8221;regular&#8221; button_color_2=&#8221;extra-color-gradient-2&#8243; icon_family=&#8221;default_arrow&#8221; url=&#8221;https:\/\/sajinshivdas.com\/sajins-mind-maps\/&#8221; text=&#8221;Find More&#8221; css_animation=&#8221;zoomIn&#8221; margin_top=&#8221;30&#8243;][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/6&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":9713,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[81],"tags":[],"class_list":{"0":"post-10144","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-documents-and-reference"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISM Interactive Mindmap Domain 02 | Sajin Shivdas<\/title>\n<meta name=\"description\" content=\"Master Information Security Risk Management with our CISM interactive mindmap for Domain 2. Enhance your cybersecurity expertise.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-2-information-security-risk-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISM Interactive Mindmap Domain 02 | Sajin Shivdas\" \/>\n<meta property=\"og:description\" content=\"Master Information Security Risk Management with our CISM interactive mindmap for Domain 2. Enhance your cybersecurity expertise.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-2-information-security-risk-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-01T15:04:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-18T09:36:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/03\/CISM-Domain_01.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-2-information-security-risk-management\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-2-information-security-risk-management\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"CISM Interactive Mindmap &#8211; Domain 2: Information Security Risk Management\",\"datePublished\":\"2024-05-01T15:04:04+00:00\",\"dateModified\":\"2024-06-18T09:36:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-2-information-security-risk-management\\\/\"},\"wordCount\":3082,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-2-information-security-risk-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/CISM-Domain_01.png\",\"articleSection\":[\"Documents and Reference\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-2-information-security-risk-management\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-2-information-security-risk-management\\\/\",\"name\":\"CISM Interactive Mindmap Domain 02 | Sajin Shivdas\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-2-information-security-risk-management\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-2-information-security-risk-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/CISM-Domain_01.png\",\"datePublished\":\"2024-05-01T15:04:04+00:00\",\"dateModified\":\"2024-06-18T09:36:55+00:00\",\"description\":\"Master Information Security Risk Management with our CISM interactive mindmap for Domain 2. Enhance your cybersecurity expertise.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-2-information-security-risk-management\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-2-information-security-risk-management\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-2-information-security-risk-management\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/CISM-Domain_01.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/CISM-Domain_01.png\",\"width\":2400,\"height\":1350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-2-information-security-risk-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISM Interactive Mindmap &#8211; Domain 2: Information Security Risk Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISM Interactive Mindmap Domain 02 | Sajin Shivdas","description":"Master Information Security Risk Management with our CISM interactive mindmap for Domain 2. Enhance your cybersecurity expertise.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-2-information-security-risk-management\/","og_locale":"en_US","og_type":"article","og_title":"CISM Interactive Mindmap Domain 02 | Sajin Shivdas","og_description":"Master Information Security Risk Management with our CISM interactive mindmap for Domain 2. Enhance your cybersecurity expertise.","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-2-information-security-risk-management\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2024-05-01T15:04:04+00:00","article_modified_time":"2024-06-18T09:36:55+00:00","og_image":[{"width":2400,"height":1350,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/03\/CISM-Domain_01.png","type":"image\/png"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-2-information-security-risk-management\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-2-information-security-risk-management\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"CISM Interactive Mindmap &#8211; Domain 2: Information Security Risk Management","datePublished":"2024-05-01T15:04:04+00:00","dateModified":"2024-06-18T09:36:55+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-2-information-security-risk-management\/"},"wordCount":3082,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-2-information-security-risk-management\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/03\/CISM-Domain_01.png","articleSection":["Documents and Reference"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-2-information-security-risk-management\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-2-information-security-risk-management\/","name":"CISM Interactive Mindmap Domain 02 | Sajin Shivdas","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-2-information-security-risk-management\/#primaryimage"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-2-information-security-risk-management\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/03\/CISM-Domain_01.png","datePublished":"2024-05-01T15:04:04+00:00","dateModified":"2024-06-18T09:36:55+00:00","description":"Master Information Security Risk Management with our CISM interactive mindmap for Domain 2. Enhance your cybersecurity expertise.","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-2-information-security-risk-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-2-information-security-risk-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-2-information-security-risk-management\/#primaryimage","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/03\/CISM-Domain_01.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/03\/CISM-Domain_01.png","width":2400,"height":1350},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-2-information-security-risk-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"CISM Interactive Mindmap &#8211; Domain 2: Information Security Risk Management"}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/10144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=10144"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/10144\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media\/9713"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=10144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=10144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=10144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}