ISACA Advanced in AI Security Management, AAISM™

  • Home
  • /
  • Courses
  • /
  • ISACA Advanced in AI Security Management, AAISM™
Private in-house training

Apart from public, instructor-led classes, we also offer private in-house trainings for organizations based on their needs. Call us at +852 2116 3328 or email us at [email protected] for more details.

What are the skills covered
  • Evaluate and secure AI-enabled systems across the enterprise
  • Integrate AI into existing security operations and workflows
  • Identify and respond to risks tied to AI technologies
  • Reinforce governance, compliance and responsible innovation
Training Outlines

Domain 1 — AI Governance and Program Management (31%)

This Domain demonstrates your ability to advise stakeholders on implementing AI security solutions through appropriate and effective policy, data governance, program management and incident response.

A–STAKEHOLDER CONSIDERATIONS, INDUSTRY FRAMEWORKS, AND REGULATORY REQUIREMENTS
B–AI-RELATED STRATEGIES, POLICIES, AND PROCEDURES
C–AI ASSET AND DATA LIFE CYCLE MANAGEMENT
D–AI SECURITY PROGRAM DEVELOPMENT AND MANAGEMENT
E–BUSINESS CONTINUITY AND INCIDENT RESPONSE

 

Domain 2 — AI Risk Management (31%)

This Domain confirms your skill at assessing and managing risks, threats, vulnerabilities and supply chain issues related to the enterprise-wide adoption of AI.

A–AI RISK ASSESSMENT, THRESHOLDS, AND TREATMENT
B–AI THREAT AND VULNERABILITY MANAGEMENT
C–AI VENDOR AND SUPPLY CHAIN MANAGEMENT

 

Domain 3 — AI Technologies and Controls (38%)

This Domain focuses on optimizing AI security and highlights your knowledge of security technologies, techniques and controls tailored to AI systems.

A–AI SECURITY ARCHITECTURE AND DESIGN
B–AI-RELATED STRATEGIES, POLICIES, AND PROCEDURES
C–DATA MANAGEMENT CONTROLS
D–PRIVACY, ETHICAL, TRUST AND SAFETY CONTROLS
E–SECURITY CONTROLS AND MONITORING

 

Supporting Tasks

  1. Collaborate on charter, roles, and responsibilities for governance and management of AI to align with business objectives.
  2. Establish and maintain AI-specific security policies and procedures to inform the development and implementation of AI standards and guidelines.
  3. Ensure the responsible use of AI by utilizing leading practices, ethical principles, regulatory requirements, and industry frameworks.
  4. Participate in or oversee the AI risk management life cycle, including impacts on enterprise risk.
  5. Identify and assess the AI threat landscape.
  6. Monitor for internal and external AI-related factors to identify the need for reassessment of risk.
  7. Design and implement testing and vulnerability management of AI solutions.
  8. Conduct AI impact assessments and ensure conformity with regulatory requirements.
  9. Embed, monitor, and verify AI security requirements when utilizing vendor AI-enabled solutions.
  10. Design and implement security architecture specifically for AI.
  11. Advise on the integration of AI architecture as part of enterprise architecture.
  12. Design, implement, and regularly review AI security controls to treat risk to an acceptable level.
  13. Establish and maintain processes to identify, inventory, and classify data and assets related to AI.
  14. Identify and treat security risk associated with data used in the AI life cycle.
  15. Establish and maintain AI-specific processes to investigate, document, and report on AI security incidents in accordance with regulatory and contractual requirements.
  16. Establish and maintain AI incident handling processes, including containment, notification, escalation, eradication, and recovery.
  17. Address AI security risk as part of business continuity and disaster recovery planning.
  18. Define and monitor security metrics for AI solutions used throughout the organization.
  19. Review and implement AI security tools as part of the information security program.
  20. Conduct risk-based human oversight of AI inputs/outputs including trust and safety, quality, explainability, and robustness.
  21. Develop and maintain AI-specific security awareness training and acceptable use guidelines.
  22. Advise on security risk and controls related to the AI solution development life cycle within an organization.
Certified Requirements
  • AAISM candidates must hold either a CISM or CISSP certification
  • Pass the AAISM exam
  • Adherence to the Code of Professional Ethics
Master Trainer

Mr. Alan Yau

  • CISSP, CISA, CISM, CGEIT, CRISC, CDPSE, AAIA, AAISM
  • The first and only accredited trainer of AAIA and AAISM in the region
  • Alan is currently holding a Senior Management Role as Principal Cybersecurity Consultant and Trainer with 20+ years of experience
  • Specializes in leading engagements and serving clients in Information Security, including Next Generation Security Operation Center, IT Risk Assessment, Penetration Testing and IT Audit
  • Led the implementation and execution of Next Generation Security Operation Center, Security Operation Center, Infrastructure Security for Mobile Device Management, Security Exchange 2010 and Infrastructure Security for Enterprise Cloud Services
  • Holds ISACA Accredited Trainer and Certified Mile2 Instructor credentials

Search for a course