Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Exam CISM Topic 1 Question 87 Discussion

Actual exam question for Isaca's CISM exam
Question #: 87
Topic #: 1
[All CISM Questions]

Following a risk assessment, an organization has made the decision to adopt a bring your own device (BYOD) strategy. What should the information security manager do NEXT?

Show Suggested Answer Hide Answer
Suggested Answer: D

Defining control requirements is the next step to ensure the security policy framework encompasses the new business model because it is a process of identifying and specifying the security measures and standards that are needed to protect the data and applications accessed by the BYOD devices. Defining control requirements helps to establish the baseline security level and expectations for the BYOD strategy, as well as to align them with the business objectives and risks. Therefore, defining control requirements is the correct answer.


https://www.digitalguardian.com/blog/ultimate-guide-byod-security-overcoming-challenges-creating-effective-policies-and-mitigating

https://learn.microsoft.com/en-us/mem/intune/fundamentals/byod-technology-decisions

Contribute your Thoughts:

Oliva
6 months ago
What, no option for 'hide under the desk and hope it goes away'? That's my personal device policy!
upvoted 0 times
Ty
5 months ago
C) Develop training specific to BYOD awareness
upvoted 0 times
...
Isidra
5 months ago
B) Implement a mobile device management (MDM) solution
upvoted 0 times
...
Annamae
5 months ago
C) Develop training specific to BYOD awareness
upvoted 0 times
...
Latosha
5 months ago
B) Implement a mobile device management (MDM) solution
upvoted 0 times
...
Nidia
6 months ago
A) Develop a personal device policy
upvoted 0 times
...
Lili
6 months ago
A) Develop a personal device policy
upvoted 0 times
...
...
Keneth
6 months ago
Defining control requirements is key. Gotta set those boundaries and guidelines for BYOD, you know?
upvoted 0 times
Kati
5 months ago
D) Define control requirements
upvoted 0 times
...
Tamala
5 months ago
C) Develop training specific to BYOD awareness
upvoted 0 times
...
Luisa
5 months ago
B) Implement a mobile device management (MDM) solution
upvoted 0 times
...
Alex
6 months ago
A) Develop a personal device policy
upvoted 0 times
...
...
Aimee
7 months ago
I think implementing a mobile device management solution would be more effective in managing security risks.
upvoted 0 times
...
Melissia
7 months ago
BYOD awareness training is crucial. Gotta make sure everyone knows how to use their devices securely, am I right?
upvoted 0 times
Salley
6 months ago
B) Implement a mobile device management (MDM) solution
upvoted 0 times
...
Weldon
6 months ago
C) Develop training specific to BYOD awareness
upvoted 0 times
...
Caprice
6 months ago
A) Develop a personal device policy
upvoted 0 times
...
...
Colton
7 months ago
I agree with Lashawn. It's important to have clear guidelines in place.
upvoted 0 times
...
Carli
7 months ago
Implementing an MDM solution sounds like a good next step to me. It'll help manage all those personal devices on the network.
upvoted 0 times
...
Nadine
7 months ago
I think the information security manager should develop a personal device policy first. It's the foundation for BYOD implementation.
upvoted 0 times
Omega
6 months ago
D) Define control requirements
upvoted 0 times
...
Rikki
6 months ago
C) Develop training specific to BYOD awareness
upvoted 0 times
...
Ira
7 months ago
B) Implement a mobile device management (MDM) solution
upvoted 0 times
...
Remedios
7 months ago
A) Develop a personal device policy
upvoted 0 times
...
...
Lashawn
7 months ago
I think we should develop a personal device policy first.
upvoted 0 times
...

Save Cancel