Rachel McBride Talks Online CISM Training with InfoSec Institute

Rachel McBride is a certified ITIL Expert and Senior Consultant at Vintun, a Virginia-based information, program and technology solutions provider. A seasoned business analyst and project manager with over 15 years of experience, Rachel enrolled in InfoSec Institute’s Certified Information Security Manager (CISM) Boot Camp in early 2018 to secure her CISM certification and advance her career.

Rachel passed her CISM exam shortly after class and plans to enroll in InfoSec Institute’s CISSP Boot Camp training in the coming months. Here’s what Rachel had to say about her first training experience with InfoSec Institute.

DevOps Connect:DevSecOps @ RSAC 2022

Why Did You Want to Become CISM Certified?

A few projects back, I was working as a project engineer. We were preparing for a Command Cyber Readiness Inspection (CCRI) at the time, and I took the lead on the project. I oversaw the System Administrators completing the system checks and Security Technical Implementation Guides (STIG) to ensure compliance with IA requirements. I was performing daily checks to determine the status of the STIG checklists and tracking percentages completed to ascertain our level of readiness. I was also reviewing the STIG checklists to see how many CAT I and CAT II were still open for each system.

This is when I first became interested in earning my CISM. I felt it would provide me increased understanding of information security management and qualify me for jobs requiring increased levels of 8570 compliance.

Why Did You Pick InfoSec Institute as Your Training Partner?

I shopped around for a few months before selecting InfoSec Institute as my training provider. Factors I looked at included exam pass rates, course pricing and whether or not the exam voucher was included in the cost. When I saw InfoSec Institute’s pass rate was above 90% for both online and in-person training and the course (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Megan Sawle. Read the original post at: