Vendors

ISACA Advanced in AI Security Management (AAISM) validates security management professionals’ ability to demonstrate their expertise in AI. This credential builds upon existing security best practices to enhance expertise and adapt to the evolving AI-driven landscape, ensuring robust protection and a strategic edge.

img-course-overview.jpg

What You'll Learn

  • Understand and apply AI governance and program management practices.
  • Assess and manage AI-related risks, threats, and vendor/supply-chain issues.
  • Design and implement security controls, architectures, and data management for AI systems.

Who Should Attend

This credential is intended for experienced security management professionals who already hold either a CISM or CISSP certification.

img-who-should-learn.png

Prerequisites

Must possess a CISM or CISSP to be eligible for certification.

Learning Journey

Coming Soon...

1. AI Governance and Program Management

A. Stakeholder Considerations, Industry Frameworks, and Regulatory Requirements

  • Organizational Structure and Overall Governance
  • Roles and Responsibilities
  • Charter and Steering Committee
  • Identifying Stakeholders
  • Risk Appetite and Tolerance
  • Frameworks, Standards, and Regulations
  • Selecting appropriate Frameworks
  • Business and Use Cases for AI
  • Privacy Considerations

B. AI-related Strategies, Policies, and Procedures

  • AI Strategy
  • Consumer v. Enterprise
  • Buy vs. Build
  • AI Policies
  • Responsible Use
  • Acceptable Use
  • AI Procedures
  • Implementation
  • Manuals
  • Ethics

C. AI Asset and Data Life Cycle Management

  • AI Asset and Data Inventory
  • Inventory management
  • Model cards
  • Data handling, classification, discovery
  • Data Augmentation and Cleaning
  • Data Storage
  • Data Protection
  • Destruction

D. AI Security Program Development and Management

  • Documented Program Plan
  • Security team, roles, responsibilities, and proficiencies
  • Alignment to existing info sec
  • Use of AI-enabled security tools in the program
  • Metrics and management
  • KRIs and KPIs for AI use with regard to the security
  • Management reporting

E. Business Continuity and Incident Response

  • Incident detection
  • Notification
  • Incident classification
  • Criticality and severity
  • Resiliency
  • Business Continuity Plan
  • Red-button requirements for compliance
  • Incident response playbooks specifically for AI
  • Break glass policies/ go no go
  • Authority
  • RTO RPO – AI perspective
  • Disaster recovery
  • Testing

2. AI Risk Management

A. AI Risk Assessment, Thresholds, and Treatment

  • Impact assessment
  • conformity assessment
  • PIAs
  • Risk documentation
  • Acceptable levels of risk
  • Treatment plans
  • KRIs and KPIs for AI us

B. AI-related Strategies, Policies, and Procedures

  • PEN test
  • Vulnerability tests
  • Red teaming
  • AI related vulnerabilities
  • Adversarial threats
  • Threat intelligence
  • AI-enabled threats/Attack chains
  • Anomalies
  • Threat landscape
  • Deep fakes
  • Insider threat
  • AI agents

C. AI Vendor and Supply Chain Management

  • Dependencies of software packages and libraries
  • Vendor due diligence and contracts
  • SLAs
  • Vendor usage
  • Accountability models
  • Provider vs. deployer
  • Third, fourth, and fifth parties
  • Ownership and intellectual property
  • Access controls
  • Liability
  • Vendor monitoring for risk and changes

3. AI Technologies and Controls

A. AI Security Architecture and Design

  • Change management
  • SDL
  • Secure by design
  • Securing infrastructure as code
  • Data flows
  • Approved base models
  • Interconnectivity and interaction with architecture

B. AI Life Cycle (e.g., model selection, training, and validation)

  • Testing models interconnectivity
  • Linkages between models
  • Regression
  • Model testing
  • Progression
  • TEVV
  • Model accuracy testing and evaluation

C. Data Management Controls

  • Data collection
  • Data control
  • Data Poisoning
  • BIAS
  • Accuracy
  • Data position requirements

D. Privacy, Ethical, Trust and Safety Controls

  • Explainability
  • Privacy controls – like right to be forgotten, data subject rights
  • Consent
  • Transparency
  • Decision making
  • Fairness
  • Ethics
  • Automated decision making
  • Human in the loop
  • Trust and safety - content moderation
  • Potential harm
  • Environmental impacts
  • Data minimization and anonymization

E. Security Controls and Monitoring

  • Security monitoring metrics
  • Selecting the right controls
  • Implementing controls
  • Self-assessment of controls (CSA)
  • Control life cycle
  • Continuous monitoring
  • KPIs and KRIs for security controls and monitoring
  • Technical controls
  • Threat controls mapping
  • Security awareness training

img-exam-cert

Frequently Asked Questions (FAQs)

  • Why get ISACA certified?

    ISACA certifications validate your expertise in critical areas like IT governance, risk management, audit, and cybersecurity.

    These globally recognized credentials demonstrate your commitment to professional standards and best practices, enhancing your credibility and opening doors to career advancement.

    ISACA-certified professionals are highly sought after by employers worldwide, as they possess the knowledge and skills to navigate the complex landscape of IT governance, risk, and cybersecurity.

  • What to expect for the examination?

    ISACA certification exams are rigorous assessments designed to test your knowledge and understanding of specific domains.

    Exams typically consist of multiple-choice questions, and some may include scenario-based questions that assess your ability to apply your knowledge in real-world situations.

    Note: Certification requirements and policies may be updated by ISACA from time to time. We apologize for any discrepancies; do get in touch with us if you have any questions.

  • How long is ISACA certification valid for?

    ISACA certifications do not expire. However, to maintain your certified status and demonstrate your ongoing commitment to professional development, you must: adhere to the Continuing Professional Education (CPE) policy.

    This involves earning and reporting a specific number of CPE hours annually through activities like attending conferences, webinars, training courses, or self-study.

    Other requirements include paying an annual maintenance fee as well as complying with the annual CPE audit if selected.

    Note: Certification requirements and policies may be updated by ISACA from time to time. We apologize for any discrepancies; do get in touch with us if you have any questions.

  • Why take this course with Trainocate?

    Here’s what sets us apart:

    - Global Reach, Localized Accessibility: Benefit from our geographically diverse training hubs in 24 countries (and counting!).

    - Top-Rated Instructors: Our team of subject matter experts (with high average CSAT and MTM scores) are passionate to help you accelerate your digital transformation.

    - Customized Training Solutions: Choose from on-site, virtual classrooms, or self-paced learning to fit your organization and individual needs.

    - Experiential Learning: Dive into interactive training with our curated lesson plans. Participate in hands-on labs, solve real-world challenges, and take on comprehensive assessments.

    - Learn From The Best: With 30+ authorized training partnerships and countless awards from Microsoft, AWS, Google – you're guaranteed learning from the industry's elite.

    - Your Bridge To Success: We provide up-to-date course materials, helpful exam guides, and dedicated support to validate your expertise and elevate your career.

Keep Exploring

Course Curriculum

Course Curriculum

Training Schedule

Training Schedule

Exam & Certification

Exam & Certification

FAQs

Frequently Asked Questions

img-improve-career.jpg

Improve yourself and your career by taking this course.

img-get-info.jpg

Ready to Take Your Business from Great to Awesome?

Level-up by partnering with Trainocate. Get in touch today.

Name*
Email*
Phone*
I'm inquiring for
Inquiry Details*

By submitting this form, you consent to Trainocate processing your data to respond to your inquiry and provide you with relevant information about our training programs, including occasional emails with the latest news, exclusive events, and special offers.

You can unsubscribe from our marketing emails at any time. Our data handling practices are in accordance with our Privacy Policy.