Exam Complete!
You answered 0 out of 20 questions correctly
Ready for the Complete Exam?
Get access to all 1,500 practice questions across 12 full practice exams
About the ISSMP Exam
The Information Systems Security Management Professional (ISSMP) is one of three CISSP concentration credentials offered by ISC2, designed for CISSPs who have advanced into senior security management and leadership roles. While CISSP validates broad security knowledge and ISSAP validates architectural design capability, ISSMP validates expertise in the business management, leadership, and governance skills required to run comprehensive organizational security programs. The concentration is specifically targeted at security directors, security managers, CISOs, and senior security professionals responsible for security programs, teams, and budgets—not just technical implementation.
The ISSMP exam consists of 125 questions to complete in 3 hours, with a passing score of 700 out of 1000. The exam costs $599 USD and requires an active CISSP certification—ISSMP cannot be pursued without current CISSP status. The concentration covers six domains spanning leadership and business management, systems lifecycle management, risk management, threat intelligence and incident management, contingency management, and law, ethics, and compliance. ISSMP holders typically serve as CISOs, security directors, security program managers, or senior security executives responsible for organization-wide security governance.
ISSMP 6 Domains and Weighting:
- Domain 1: Leadership and Business Management (22%) - Security program leadership and organizational management, developing and managing security budgets and resource allocation, communicating security value to executive leadership and board of directors, building and leading high-performing security teams (recruiting, developing, retaining talent), managing security vendor relationships and contracts, aligning security programs with business strategy and objectives, and measuring and demonstrating security program effectiveness through metrics and reporting
- Domain 2: Systems Lifecycle Management (19%) - Integrating security into organizational IT governance frameworks, managing security through enterprise architecture processes, overseeing security in system acquisition and development lifecycles, managing security requirements for major programs and projects, establishing security standards and baselines across the organization, and overseeing security technical reviews and approval processes for major system changes and new initiatives
- Domain 3: Risk Management (18%) - Establishing and overseeing enterprise risk management programs from a security leadership perspective, integrating security risk into enterprise risk management (ERM) frameworks (COSO, ISO 31000), presenting security risk to board audit committees and senior leadership, managing risk acceptance decisions and exception processes, overseeing third-party risk management programs, and ensuring risk management aligns with organizational risk appetite and strategic objectives
- Domain 4: Threat Intelligence and Incident Management (17%) - Establishing and overseeing threat intelligence programs at the organizational level, managing security incident response capabilities and teams, overseeing major incident response (executive crisis management, external communications, regulatory notification), managing relationships with law enforcement and government agencies during incidents, overseeing forensic investigation programs, and ensuring lessons learned from incidents feed back into security program improvements
- Domain 5: Contingency Management (12%) - Overseeing business continuity and disaster recovery planning at the organizational level, integrating security considerations into BCP/DRP programs, managing crisis communications for security incidents and disasters, overseeing BCP/DR testing programs and ensuring test results drive program improvements, managing relationships with critical business partners during contingency events, and ensuring contingency plans address the evolving threat landscape
- Domain 6: Law, Ethics and Security Compliance Management (12%) - Managing organizational compliance programs across multiple regulatory frameworks (GDPR, HIPAA, PCI-DSS, SOX, FISMA), overseeing security audits and assessment programs, managing relationships with external auditors and regulators, ensuring ethics programs address security and data privacy obligations, overseeing security-relevant contracts and agreements (NDAs, DPAs, security addenda), and managing data breach notification obligations and regulatory reporting
ISSMP is maintained in conjunction with CISSP, with ISSMP CPE credits counting toward CISSP renewal. The concentration is most valued by organizations looking for credentialed evidence of security management expertise—particularly large enterprises, financial institutions, healthcare organizations, and government agencies where the CISO role carries formal responsibility for regulatory compliance, board reporting, and organizational security governance. ISSMP complements the technical depth of CISSP with management and leadership competencies that are not covered in the CISSP CBK.
Why Take This Certification?
- Validates CISO-Level Management Competencies Beyond CISSP: CISSP validates broad security knowledge across eight technical and governance domains, but does not deeply test the management and leadership competencies required for CISO and senior security management roles—budgeting, team leadership, board communication, vendor management, and regulatory compliance program oversight. ISSMP directly addresses this gap, validating the management skills that distinguish security executives from senior security practitioners. For CISSPs pursuing CISO, VP of Security, or Director of Information Security roles, ISSMP demonstrates the business leadership dimension alongside CISSP's technical depth.
- Recognized Signal of Security Executive Credibility: In an environment where many "CISOs" lack formal credentials beyond CISSP, ISSMP provides a credentialed signal of security executive competency. The combination of CISSP (technical breadth and experience) and ISSMP (management specialization) creates a compelling credential profile for board-level credibility and executive hiring decisions. Security recruiters and executive search firms increasingly recognize ISSMP as evidence of leadership maturity that complements CISSP's technical validation—particularly for CISO roles in regulated industries where both technical and governance competencies are evaluated rigorously.
- Addresses the Growing Business Leadership Expectations of Modern CISOs: The CISO role has transformed from a technical position to a business leadership role. Modern CISOs are expected to present to boards, manage multi-million dollar budgets, lead diverse teams, navigate regulatory environments across multiple jurisdictions, manage vendor ecosystems, and communicate security risk in business language rather than technical jargon. ISSMP's focus on business management, leadership, compliance program oversight, and strategic risk management directly prepares candidates for these expanded expectations, making it uniquely relevant for the contemporary security executive role.
- Differentiates in the Competitive Senior Security Leadership Market: The market for senior security leadership (CISO, VP Security, Director Security) is highly competitive, with most candidates holding CISSP and 10-15 years of experience. ISSMP provides meaningful differentiation in this competitive field—demonstrating not just that you have passed an advanced exam but that you have specifically committed to developing and validating the management and leadership competencies that the most demanding senior security roles require. For security professionals in the final stages of their ascent to executive leadership, ISSMP provides the certification credential that completes the CISSP foundation with management depth.
What You'll Learn in the ISSMP Exam
The ISSMP exam tests advanced security management and leadership knowledge across 6 domains, building directly on CISSP's foundational security knowledge to validate the organizational and business competencies required for senior security management roles. The exam shifts from CISSP's "think like a security manager making a decision" framing to "think like a security executive responsible for a program, team, and organizational outcomes." Candidates must demonstrate mastery of managing security as a business function—with accountability for budget, talent, risk posture, regulatory compliance, and board-level governance.
Leadership, Business Management, and Risk Governance
- Security Program Leadership and Business Alignment: Building and communicating security program vision and strategy that aligns with business objectives, developing security budgets with evidence-based justification for security investments, presenting security risk and program status to board of directors and audit committees using business-relevant metrics and frameworks (FAIR risk quantification, security scorecards), managing security teams through talent acquisition, professional development, and retention strategies, and establishing security culture programs that build organization-wide security awareness beyond compliance checkboxes.
- Enterprise Risk Management Integration: Embedding security risk into enterprise risk management frameworks (COSO ERM, ISO 31000) so that security risks are managed with the same rigor as financial and operational risks, developing executive risk reporting that communicates security risk in terms of business impact and financial exposure, managing risk acceptance processes that involve appropriate senior stakeholders, overseeing third-party risk management programs that provide assurance about vendor security without creating unmanageable administrative burden, and ensuring the organization's security risk posture evolves with changes in threat landscape, business model, and regulatory environment.
- Threat Intelligence and Incident Executive Management: Establishing threat intelligence programs that provide strategic, operational, and tactical intelligence relevant to the organization's industry and risk profile, managing executive crisis response during major security incidents (coordinating with legal, communications, HR, and business units), overseeing regulatory breach notification processes with appropriate legal counsel, managing external relationships during incidents (law enforcement, regulators, CISA, sector-specific ISACs), and ensuring incident response programs are adequately resourced, tested, and improved through post-incident reviews.
Systems Lifecycle Governance, Contingency, and Compliance
- Security Governance for Systems and Programs: Establishing security governance frameworks that embed security decision-making into enterprise architecture, project management, and IT service management processes, managing security requirements for large programs from initiation through deployment and operations, overseeing security technical review boards and approval processes for major changes, establishing security baselines and exception management processes that balance security rigor with operational agility, and managing security in complex sourcing environments (cloud services, managed services, outsourced development, SaaS procurement).
- Business Continuity and Contingency Program Oversight: Overseeing enterprise-level BCP and DRP programs to ensure they are comprehensive, tested, and maintained, integrating security incident management into broader organizational crisis management frameworks, managing stakeholder communication during crisis events (customers, partners, regulators, media), overseeing tabletop exercises and full-scale BCP tests that stress-test organizational resilience, and ensuring contingency programs address emerging threats (ransomware recovery, supply chain disruption, cloud provider outages) relevant to the organization's current risk landscape.
- Compliance Program Management and Ethics: Managing comprehensive compliance programs across multiple simultaneous regulatory frameworks without creating compliance-as-checkbox cultures, overseeing internal audit relationships and ensuring security audit findings are properly remediated, managing relationships with external regulators (preparing for examinations, responding to regulatory inquiries, managing consent orders or corrective action plans), ensuring ethics programs address data privacy, acceptable use, and security behavior obligations, and overseeing contract security requirements across the supply chain ecosystem (data processing agreements, security addenda, right-to-audit clauses).
How to Prepare for the ISSMP Exam
ISSMP preparation typically requires 2-4 months for active CISSPs with senior security management experience. The exam is the most management-oriented of the three CISSP concentrations—testing leadership, business management, and program governance competencies rather than technical security depth. Candidates who are currently in or have recently held senior security management roles (security manager, CISO, VP of Security, director of security programs) will find many exam scenarios directly reflect the challenges they manage daily. Candidates with primarily technical security backgrounds pursuing ISSMP to transition into management roles must invest more time in business management, leadership, and regulatory compliance program topics.
- Study the Official ISSMP Study Guide and Management Frameworks (3-4 weeks): Begin with the Official ISC2 ISSMP Study Guide (Sybex), which covers all 6 domains comprehensively. Supplement with business management and security executive resources: the COSO Enterprise Risk Management framework (for risk management integration), ISO 31000 (risk management principles), and the NIST Cybersecurity Framework (for security program measurement and communication). For the compliance domain, review ISACA's COBIT framework as an IT governance reference. Many ISSMP candidates find that business management resources aimed at CISOs—security executive leadership books, ISACA's journal, and Harvard Business Review articles on security leadership—provide valuable context for management-focused exam scenarios that feel different from technical security questions.
- Connect Exam Content to Your Security Management Experience (ongoing): ISSMP rewards candidates who translate their security management experience into the exam's conceptual framework. For each ISSMP domain, actively connect exam concepts to decisions you have made in your security management career: How did you communicate security risk to executives? How did you manage a significant incident's external communications? How did you allocate budget across competing security initiatives? How did you manage a compliance program across multiple frameworks? Reviewing your own management decisions through the ISSMP domain framework accelerates study and improves retention of management concepts that are less amenable to pure memorization than technical security topics.
- Complete Practice Questions with Management Scenario Focus (2-3 weeks): Work through at least 500 practice questions, focusing on Domain 1 (Leadership and Business Management, 22%) and Domain 3 (Risk Management, 18%), which together represent 40% of the exam. ISSMP questions present complex management scenarios where multiple options may be technically defensible but one option is most aligned with effective security program management principles. Practice identifying the option that best reflects executive-level security management thinking—prioritizing program effectiveness, stakeholder communication, and business alignment over narrow technical correctness. Track performance by domain and invest additional study time in Domains 5 and 6 (Contingency Management, Law and Compliance), which many candidates find most unfamiliar if their backgrounds are primarily in technical security operations.
- Review Regulatory Compliance Management and CISO Leadership Resources (final 2 weeks): In the final preparation phase, review regulatory requirements for major compliance frameworks from a program management perspective—not just what the requirements are, but how security leaders structure compliance programs to meet multiple simultaneous obligations efficiently. The IAPP (International Association of Privacy Professionals) provides useful resources on privacy compliance program management relevant to GDPR and CCPA questions. Review ISACA's CISO resources and the CSO Online CISO Executive Summit materials for current CISO leadership challenges and best practices. Take 2-3 full-length timed practice exams targeting 75%+ scores before scheduling. Review the official ISC2 ISSMP certification page for the current exam outline.
ISSMP rewards CISSPs who have made the transition from technical security roles to security leadership and management responsibilities. The certification is most valuable for professionals who regularly present to senior executives, manage security teams and budgets, oversee compliance programs, and are accountable for organizational security posture as a business function. Budget 120-200 hours of study time, with the investment weighted toward management frameworks, leadership concepts, and compliance program management topics that complement rather than repeat CISSP technical knowledge you already hold.