{"id":9712,"date":"2024-03-17T21:25:01","date_gmt":"2024-03-17T21:25:01","guid":{"rendered":"https:\/\/sajinshivdas.com\/cybersecurity\/?p=9712"},"modified":"2024-03-21T23:46:10","modified_gmt":"2024-03-21T23:46:10","slug":"cism-interactive-mindmap-domain-1","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-1\/","title":{"rendered":"CISM Interactive Mindmap &#8211; Domain 1: Information Security Governance"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div id=\"ultimate-heading-519369e7907903181\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-519369e7907903181 uvc-2194 \" data-hspacer=\"line_with_icon\" data-hline_width=\"auto\" data-hicon_type=\"selector\" data-hborder_style=\"solid\" data-hborder_height=\"3\" data-hborder_color=\"#000000\" data-icon_width=\"32\" data-hfixer=\"10\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-519369e7907903181 h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"desktop:2px;\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">CISM Mindmap-Domain 1: Information Security Governance<\/h3><\/div><div class=\"uvc-heading-spacer line_with_icon\" style=\"topheight:32px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none \"  style=\"font-size:32px;display:inline-block;\">\n\t<i class=\"awesome-book\"><\/i>\n<\/div><\/div><\/div><\/div><div class=\"uvc-sub-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-519369e7907903181 .uvc-sub-heading '  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:normal;\">\n<h5>An Interactive CISM Mindmap Series<\/h5>\n<\/div><\/div>[image_with_animation image_url=&#8221;9795&#8243; image_size=&#8221;medium_large&#8221; animation_type=&#8221;entrance&#8221; animation=&#8221;None&#8221; animation_movement_type=&#8221;transform_y&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;center&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Table of Contents<\/span><\/p>\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"#Key Terms &amp; Definitions\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Key Terms &amp; Definitions<\/span><\/a><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"#Key Areas\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Key Areas<\/span><\/a><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"#Information Security Governance_Mindmap\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Information Security Governance_Mindmap<\/span><\/a><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"#Resources\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Resources<\/span><\/a><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"#Credits &amp; Disclaimer\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Credits &amp; Disclaimer<\/span><\/a><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h1>CISM Mindmap &#8211; Domain 01<\/h1>\n[\/vc_column_text][vc_column_text]CISM Mindmap Series will include all 4 Domains. This collection is designed to equip prospective CISM aspirants with essential resources for exam preparation, training and reference.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Key Terms &amp; Definitions&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_wp_custommenu][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;]<div id=\"ultimate-heading-787969e79079031ad\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-787969e79079031ad uvc-2720 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-787969e79079031ad h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">CISM Domain_01: Key Terms &amp; Definitions<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]\n<ol>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Information Security Governance:<\/span>The process of establishing and maintaining a framework to provide assurance that information security strategies are aligned with and support the business objectives, while managing risks appropriately and delivering value to the business.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Strategic Alignment: <\/span>The practice of ensuring that information security activities are in line with the organization&#8217;s objectives and strategic direction, thereby ensuring that security supports business initiatives.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Security Culture: <\/span>The set of values, shared by everyone in an organization, that determine how people are expected to think about and approach security. A strong security culture is vital for the effective implementation of a security strategy.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Third-party Risk Management: <\/span>The process of analyzing and controlling risks associated with outsourcing to third-party vendors or service providers. This includes managing the security implications of business partnerships and contractual agreements.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Resource Management: <\/span><\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\">The effective and efficient deployment of the organization&#8217;s resources, including people, technology, and finances, to manage information security and achieve the objectives set out in the security strategy.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Performance Measurement: <\/span>The process of monitoring and assessing the efficiency and effectiveness of the information security program, using metrics and other evaluation tools to ensure objectives are met.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Value Delivery: <\/span>Demonstrating the business value of information security investments by optimizing risk management and resource deployment, thus enhancing the organization&#8217;s ability to achieve its goals.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Information Security Strategy: <\/span>A comprehensive plan that outlines how an organization will implement and manage security measures to protect its information assets and ensure alignment with business goals.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Governance Framework: <\/span>The structure of rules, practices, and processes used to direct and control an organization, including the mechanisms to ensure that information security aligns with business objectives.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Policy, Standards, and Procedures: <\/span>Documents that collectively define the organization&#8217;s security expectations, detail specific security controls, and describe how to implement those controls. Policies provide the overarching principles, standards offer detailed requirements, and procedures outline step-by-step instructions.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Security Awareness and Training: <\/span>Programs designed to enhance the security knowledge and behavior of employees, ensuring that they understand the importance of information security, the potential risks, and their responsibilities in protecting organizational assets.<\/li>\n<\/ol>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Key Areas&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div id=\"ultimate-heading-734869e79079031cd\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-734869e79079031cd uvc-3326 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-734869e79079031cd h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">CISM Domain_01: Key Areas<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]\n<ol>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Establishing and Maintaining an Information Security Governance Framework<\/span>: Creating a structure that aligns information security strategies with business goals and objectives. This involves defining roles and responsibilities, establishing clear communication channels, and ensuring that information security is integrated into the overall corporate governance.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Establishing Information Security Strategy<\/span>: Developing a strategy that supports business objectives and is aligned with the overall risk management approach. This includes understanding business goals, identifying critical assets and information, assessing threats and vulnerabilities, and setting security priorities.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Alignment of Information Security Strategy with Corporate Governance<\/span>: Ensuring that the information security strategy complements the broader goals and governance frameworks of the organization. This area focuses on the integration of security practices into business processes, risk management strategies, and corporate compliance efforts.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Information Security Governance Metrics<\/span>: Developing and implementing metrics to measure the effectiveness and efficiency of the information security governance framework. This involves selecting key performance indicators (KPIs) that are aligned with business objectives and can demonstrate the value of information security initiatives to stakeholders.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Establishing Information Security Policies, Standards, and Procedures<\/span>: Creating the documentation that guides the organization in managing and protecting its information assets. This includes developing policies that set out the organization&#8217;s security expectations, standards that detail specific security controls, and procedures that describe how policies and standards are to be implemented.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Information Risk Management<\/span>: A critical component of information security governance that involves identifying, evaluating, and managing information security risks. This area focuses on ensuring that risks are identified, assessed, and treated in a manner consistent with business objectives and risk appetite.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Integration of Risk Management into Business and IT Processes<\/span>: Embedding information risk management practices into business and IT operations to ensure that risks are identified and managed proactively. This includes the integration of risk assessments into project management processes, IT operations, and business decision-making.<\/li>\n<li lang=\"en-US\" style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"font-weight: bold; text-decoration: underline;\">Security Awareness and Training<\/span>: Developing and implementing programs to enhance the security awareness of all employees. This includes training staff on security policies, the importance of protecting information assets, and their roles in maintaining security.<\/li>\n<\/ol>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Information Security Governance_Mindmap&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div id=\"ultimate-heading-624069e79079031e9\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-624069e79079031e9 uvc-2659 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-624069e79079031e9 h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">CISM Domain_01: Information Security Governance<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_raw_html]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[\/vc_raw_html][nectar_btn size=&#8221;small&#8221; open_new_tab=&#8221;true&#8221; button_style=&#8221;regular&#8221; button_color_2=&#8221;Accent-Color&#8221; icon_family=&#8221;none&#8221; text=&#8221;Full Screen&#8221; url=&#8221;https:\/\/sajinshivdas.com\/cybersecurity\/cism_mindmap_domain-01\/&#8221;]\r\n\t\t\t<div class=\"ult_dual_button  ult-adjust-bottom-margin to-center  \"  data-response=\"on\" id=\"ult_btn_562422763\">\r\n\r\n\t\t\t<div id=\"dualbtn-2015\" class=\"ulitmate_dual_buttons ult-dual-btn ult_main_dualbtn \" data-bcolor=\"#333333\"data-bhcolor=\"\">\r\n\r\n\t\t\t<div class=\"ult_dualbutton-wrapper btn-inline place-template bt1 \"><a href=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/03\/ISACA-CISM-Mindmap_pdf.zip\" target=\"_blank\" rel=\"noopener\"  class=\"ult_ivan_button round-square with-icon icon-before with-text place-template ult_dual1\" style=\";margin-right:px;;background-color:#ffffff !important;; border-color:#333333;border-style:;border-width:0px;border-radius:px;;\">\r\n\t\t\t<span class=\"ult-dual-btn-1 Style 1\" style=\"\"  data-bgcolor=\"#ffffff\" data-bghovercolor=\"#bcbcbc\" data-icon_color=\"#333333\" data-icon_hover_color=\"#333333\" data-textcolor=\"#333333\" data-texthovercolor=\"#333333\" data-iconbgcolor=\"transperent\" data-iconbghovercolor=\"transperent\" data-iconborder=\"transperent\" data-iconhoverborder=\"transperent\" >\r\n\t\t\t<span class=\"icon-simple icon-left1 ult_btn1span \"  style=\"; \">\n<span class=\"aio-icon btn1icon none \"  style=\"color:#333333;font-size:32px;\">\n\t<i class=\"Defaults-file-pdf-o\" ><\/i>\n<\/span><\/span>\r\n\t\t\t<span class=\"text-btn ult-dual-button-title ult-responsive\"  data-ultimate-target='#dualbtn-2015 .ult-dual-button-title'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"desktop:15px;\"}'  style=\"font-weight:normal;color:#333333;\">Download PDF Format<\/span>\r\n\r\n\t\t\t<\/span>\r\n\t\t\t<\/a><span class=\"middle-text\" style=\"line-height: 1.8em;color:#ffffff;background-color:#333333;border-width:0px;\">\r\n\t\t\t<span class=\"middle-inner\"  >or<\/span>\r\n\t\t\t<\/span>\r\n\r\n\t\t\t<\/div>\r\n\r\n\t\t\t<div class=\"ult_dualbutton-wrapper btn-inline place-template btn2 \"><a href=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/03\/ISACA-CISM-Mindmap_png.zip\" target=\"_blank\" rel=\"noopener\"  class=\"ult_ivan_button round-square with-icon icon-after with-text place-template ult_dual2\"  style=\";background-color:#ffffff !important;;margin-left:px;;border-color:#333333;border-style:;border-width:0px;border-radius:px;\">\r\n\t\t\t<span class=\"ult-dual-btn-2 Style 1\"  data-bgcolor=\"#ffffff\" data-bghovercolor=\"#bcbcbc\" data-icon_color=\"#333333\" data-icon_hover_color=\"#333333\" data-textcolor=\"#333333\" data-texthovercolor=\"#333333\" data-iconbgcolor=\"transperent\" data-iconbghovercolor=\"transperent\" data-iconborder=\"transperent\" data-iconhoverborder=\"transperent\" >\r\n\t\t\t<span class=\"text-btn ult-dual-button-title\" style=\"font-weight:normal;color:#333333;\">Download JPG Format<\/span>\r\n\r\n\t\t\t<span class=\"icon-simple icon-right2 ult_btn1span \"  style=\"; \">\n<span class=\"aio-icon btn1icon none \"  style=\"color:#333333;font-size:32px;display:inline-block;\">\n\t<i class=\"Defaults-file-image-o file-photo-o file-picture-o\" ><\/i>\n<\/span><\/span>\r\n\t\t\t<\/span>\r\n\t\t\t<\/a><\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<\/div>[\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Resources&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div class=\"ult-spacer spacer-69e790790324f\" data-id=\"69e790790324f\" data-height=\"10\" data-height-mobile=\"10\" data-height-tab=\"10\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div><div id=\"ultimate-heading-151469e7907903261\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-151469e7907903261 uvc-9745 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-151469e7907903261 h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">Resources<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>CISM\u00ae Certified Information Security Manager <\/strong><strong>Study Guide<\/strong> by Mike Chapple<\/span><\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition, 2nd Edition <\/strong>by Peter H. Gregory<\/span><\/li>\n<\/ul>\n[\/vc_column_text][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Contribution&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div id=\"ultimate-heading-872369e790790327a\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-872369e790790327a uvc-7237 \" data-hspacer=\"line_only\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-872369e790790327a h4'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h4 style=\"font-weight:bold;color:#3452ff;\">Contribution<\/h4><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]<span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">We have already included some reference images and short notes for most of the topics so that users can more effectively refer to the content in the mindmap. If you have any information, images, or notes that can make the mindmap more effective, please feel free to share them.<\/span><\/p>\n<p><a href=\"https:\/\/github.com\/ShivdaSaj\/CISM_Interactive_Mindmap\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">https:\/\/github.com\/ShivdaSaj\/CISM_Interactive_Mindmap<\/span><\/a><\/p>\n<p><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">For issues and concern please feel free to raise a issue in Github link <a href=\"https:\/\/github.com\/ShivdaSaj\/CISM_Interactive_Mindmap\/issues\">https:\/\/github.com\/ShivdaSaj\/CISM_Interactive_Mindmap\/issues<\/a><\/span><\/p>\n<p><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Connect with me <a href=\"http:\/\/www.linkedin.com\/in\/sajin-shivdas\">www.linkedin.com\/in\/sajin-shivdas<\/a><\/span>[\/vc_column_text]<div class=\"  uavc-icons \">\n<a class=\"aio-tooltip 69e79079032db\" href=\"https:\/\/github.com\/sajinshivdas\/CISSP_Interactive_Mindmap\" target=\"_blank\" rel=\"noopener\"  data-toggle=\"tooltip\" data-placement=\"\" title=\"\"><div class=\"aio-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"font-size:32px;margin-right:5px;\">\n\t<i class=\"Defaults-github-square\"><\/i>\n<\/div><\/a>\n<a class=\"aio-tooltip 69e79079032f1\" href=\"http:\/\/www.linkedin.com\/in\/sajin-shivdas\" target=\"_blank\" rel=\"noopener\"  data-toggle=\"tooltip\" data-placement=\"\" title=\"\"><div class=\"aio-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"font-size:32px;margin-right:5px;\">\n\t<i class=\"Defaults-linkedin-square\"><\/i>\n<\/div><\/a><\/div>[\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Related Mindmaps&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/6&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][\/vc_column_inner][vc_column_inner column_padding=&#8221;padding-2-percent&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;left-right&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; centered_text=&#8221;true&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;2\/3&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; enable_animation=&#8221;true&#8221; animation=&#8221;fade-in&#8221; animation_easing=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][nectar_gradient_text heading_tag=&#8221;h5&#8243; color=&#8221;extra-color-gradient-2&#8243; gradient_direction=&#8221;horizontal&#8221; text=&#8221;Complete Mindmaps&#8221; margin_bottom=&#8221;10&#8243;][vc_custom_heading text=&#8221;Complete list of Mindmaps related to Cybersecurity&#8221; font_container=&#8221;tag:h2|font_size:52|text_align:center|line_height:52px&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;fadeInUp&#8221;][vc_custom_heading text=&#8221;Cybersecurity Mindmaps&#8221; font_container=&#8221;tag:p|text_align:center|color:rgba(0%2C0%2C0%2C0.7)&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1707775606373{margin-top: 10px !important;margin-bottom: 10px !important;}&#8221;][nectar_btn size=&#8221;jumbo&#8221; open_new_tab=&#8221;true&#8221; button_style=&#8221;regular&#8221; button_color_2=&#8221;extra-color-gradient-2&#8243; icon_family=&#8221;default_arrow&#8221; url=&#8221;https:\/\/sajinshivdas.com\/sajins-mind-maps\/&#8221; text=&#8221;Find More&#8221; css_animation=&#8221;zoomIn&#8221; margin_top=&#8221;30&#8243;][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/6&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":9713,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[81],"tags":[],"class_list":{"0":"post-9712","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-documents-and-reference"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISM Interactive Mindmap Domain 01 | Sajin Shivdas<\/title>\n<meta name=\"description\" content=\"CISM Mindmap - Domain 01 is a Interactive Mindmap Series is a collection designed to aid CISM aspirants for exam preparation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISM Interactive Mindmap Domain 01 | Sajin Shivdas\" \/>\n<meta property=\"og:description\" content=\"CISM Mindmap - Domain 01 is a Interactive Mindmap Series is a collection designed to aid CISM aspirants for exam preparation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-17T21:25:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-21T23:46:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/03\/CISM-Domain_01.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-1\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-1\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"CISM Interactive Mindmap &#8211; Domain 1: Information Security Governance\",\"datePublished\":\"2024-03-17T21:25:01+00:00\",\"dateModified\":\"2024-03-21T23:46:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-1\\\/\"},\"wordCount\":3182,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/CISM-Domain_01.png\",\"articleSection\":[\"Documents and Reference\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-1\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-1\\\/\",\"name\":\"CISM Interactive Mindmap Domain 01 | Sajin Shivdas\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-1\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/CISM-Domain_01.png\",\"datePublished\":\"2024-03-17T21:25:01+00:00\",\"dateModified\":\"2024-03-21T23:46:10+00:00\",\"description\":\"CISM Mindmap - Domain 01 is a Interactive Mindmap Series is a collection designed to aid CISM aspirants for exam preparation.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-1\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-1\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-1\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/CISM-Domain_01.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/CISM-Domain_01.png\",\"width\":2400,\"height\":1350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cism-interactive-mindmap-domain-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISM Interactive Mindmap &#8211; Domain 1: Information Security Governance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISM Interactive Mindmap Domain 01 | Sajin Shivdas","description":"CISM Mindmap - Domain 01 is a Interactive Mindmap Series is a collection designed to aid CISM aspirants for exam preparation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-1\/","og_locale":"en_US","og_type":"article","og_title":"CISM Interactive Mindmap Domain 01 | Sajin Shivdas","og_description":"CISM Mindmap - Domain 01 is a Interactive Mindmap Series is a collection designed to aid CISM aspirants for exam preparation.","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-1\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2024-03-17T21:25:01+00:00","article_modified_time":"2024-03-21T23:46:10+00:00","og_image":[{"width":2400,"height":1350,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/03\/CISM-Domain_01.png","type":"image\/png"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-1\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-1\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"CISM Interactive Mindmap &#8211; Domain 1: Information Security Governance","datePublished":"2024-03-17T21:25:01+00:00","dateModified":"2024-03-21T23:46:10+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-1\/"},"wordCount":3182,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-1\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/03\/CISM-Domain_01.png","articleSection":["Documents and Reference"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-1\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-1\/","name":"CISM Interactive Mindmap Domain 01 | Sajin Shivdas","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-1\/#primaryimage"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-1\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/03\/CISM-Domain_01.png","datePublished":"2024-03-17T21:25:01+00:00","dateModified":"2024-03-21T23:46:10+00:00","description":"CISM Mindmap - Domain 01 is a Interactive Mindmap Series is a collection designed to aid CISM aspirants for exam preparation.","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-1\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-1\/#primaryimage","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/03\/CISM-Domain_01.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/03\/CISM-Domain_01.png","width":2400,"height":1350},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cism-interactive-mindmap-domain-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"CISM Interactive Mindmap &#8211; Domain 1: Information Security Governance"}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/9712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=9712"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/9712\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media\/9713"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=9712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=9712"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=9712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}