
Getty Images
It is sport in the information cybersecurity community to compare credentials. Those entering the industry want to know where best to invest their time and money to gethead starts on their careers. Those with experience in the industry, meanwhile, enjoy waxing philosophical about certifications -- debates over whether they provide value are as frequent as ever.
Two commonly compared certifications are ISC2's Certified Information Systems Security Professional (CISSP) and ISACA's Certified Information Security Manager (CISM). While the two have some educational overlap, they largely complement rather than compete with each other, with CISSP focusing on deep technical knowledge and CISM prioritizing business and management expertise.
Before committing to one over the other, users should be aware of their differences -- and why it might be wise to pursue both.
The proliferation of the ISC2 CISSPcertification on information security-related job postings is well documented. From entry-level to executive roles, including CIOs, CISOs, security consultants andsecurity analysts, CISSP continues to be an expectation.
Billing itself as being "an inch deep and a mile wide" in its body of knowledge, it expects exam candidates to be competent in a range of topics from cryptography to networking to common regulations across the following eight domains:
It requires knowledge of history to some extent as well. For example, ISC2 might ask, "What is The Orange Book more commonly known as, and in what year was it initially issued?" This is information most practitioners only need to recall to impress their peers at dinner parties -- or for as long as it takes them to get through the CISSP exam.
The three-hour exam, which consists of 125-150 multiple-choice questions, requires a 700/1,000 passing grade. Candidates must have at least five years of work experience in two or more of the eight domains. A bachelor's or master's degree in computer science, IT or a related field or an additional ISC2-approved credential satisfies up to one year of experience. Part-time work and internships can also count toward experience.
ISACA's CISM certifications, also a frequent flyer on job postings for CISOs, CTOs and directors of security and compliance, has occasionally been referred to as a "shadow of CISSP." It is identical in purpose but different in approach.
The CISMexam is transparent in its focus on the role of the information security manager (ISM), a title that translates seamlessly to real-world alternatives, including the coveted CISO position.
The CISM body of knowledge assumes familiarity of basic technology fundamentals, including networking and OS architecture, across the following four domains:
CISM test questions rarely require the candidate to recall specific details, unlike CISSP, which is known for its memorization requirements. For example, CISSP might ask what different key sizes are available for AES; CISM does not. CISM success comes in mastering concepts and principles over specifications and details. CISM recognizes constraints, such as budget or resource issues, and focuses on the ideals and principles of how to address those issues.
The exam consists of 150 multiple-choice questions and has a passing grade of 450/800. Candidates must have a minimum of five years of experience within the CISM domains.
I've been teaching CISSP and CISM programs for years. I am asked time and again which credential a candidate should choose if choosing only one. As an advocate for training and education, my rebuttal is to ask, "Do you mean which to pursue first?"
The overlap between the two credentials is incidental; they're less competitive than complementary. CISSP makes agood information security leader in the eyes of the engineers, administrators and technologists who report to that leader; CISM makes a good information security leader in the eyes of executive leadership and the board.
The CISSP and CISM credentials have the following commonalities:
The question of which credential to prioritize falls to job seekers and hiring managers. Only they can decide what they are looking for in their career paths and their employees.
For the technologist passionate about gaining deep information security expertise, CISSP might be more appealing. For business-focused professionals who want to be more visible -- and perhaps promotable -- as information security leaders, CISM might serve them well.
In the end, a well-rounded infosec leader would benefit from the knowledge that's represented in the curricula for both certifications.
Mike Pedrick is a vCISO and consultant, advisor, mentor and trainer. He has been on both sides of the IT, IS and GRC consulting/client table for more than 20 years.
The interim standard brings a boatload of major improvements to 5G on the way to 6G's planned release in 2030. Learn what they do...
Utilities increasingly choose private over public 5G for its superior control, flexibility and security, enabling applications ...
Palo Alto Networks acquired observability platform Chronosphere for $3.35 billion. The deal aims to enable AI-driven autonomous ...
These certifications and courses can help you gain the specialized knowledge you need to bolster your credentials and ...
Tech conferences are a vital way for CIOs and IT leaders to keep abreast of trends and make real-life connections in a ...
Enterprises are embracing short-form video for speed and engagement, but its rise brings new complexities. CIOs must establish ...
Firmware, such as BIOS or UEFI, plays a crucial role in how securely a Windows device starts and operates. Organizations need to ...
The battle for desktop agent mindshare heats up. Microsoft is the latest to arm everyday office workers with tools to make their ...
Learn how to set up multifactor authentication in Microsoft 365 to enhance security, prevent unauthorized access and protect ...
Transform manually created AWS resources into manageable, automated infrastructure with CloudFormation's import resource with ...
In today's rapidly changing tech landscape, cloud strategy is more important than ever. This guide explores how to best use your ...
Cloud dominance intensifies as AWS, Microsoft and Google capture 63% of the $107B market. AWS leads at 29%, despite erosion, ...
Acclaim Autism is a US organisation that has increased employee task discretion, with an increase in insurance approvals by using...
The latest Post Office prosecution to be sent to the Court of Appeal involves a third IT system in a 2001 case, after previous ...
Industry and healthcare leaders are concerned that NHS tech funding is too focused on already approved platforms, fails to tackle...

