Domain 2: Information Security Risk Management Module 7 of 47

Emerging Risk and Threat Landscape

CISM Domain 2 — Information Security Risk Management A — Information Security Risk Assessment 8–10 minutes

What the Exam Is Really Testing

The core question behind every scenario here:

Security leadership must anticipate emerging risks and adjust strategy proactively.

This includes:

  • Monitoring external threat intelligence
  • Understanding industry-specific exposure
  • Evaluating geopolitical and technological shifts
  • Identifying new regulatory expectations
  • Assessing business model changes

The exam evaluates whether you can translate evolving threats into enterprise risk decisions.


The Executive Mindset Shift

Quick fix:

Deploy new controls when a new threat appears.

Sustainable answer:

Assess enterprise exposure and adjust risk management strategy accordingly.

Security leaders must:

  • Distinguish hype from material risk
  • Evaluate impact on business objectives
  • Integrate threat awareness into risk assessments
  • Inform executive leadership appropriately
  • Adjust controls based on risk appetite

Not every emerging threat requires immediate investment.


What “Emerging Risk” Includes

CISM defines emerging risk broadly:

  • New technologies (AI, cloud-native, IoT)
  • Supply chain vulnerabilities
  • Geopolitical instability
  • Regulatory shifts
  • New attack vectors
  • Business model transformation
  • Third-party ecosystem expansion

The key question is always:

Does this materially affect enterprise risk exposure?


Core Risk Assessment Principles

1. Threat Awareness Must Be Continuous

Security leaders must:

  • Monitor threat intelligence sources
  • Track industry trends
  • Assess regulatory developments
  • Review incident patterns
  • Evaluate internal capability gaps

Proactive awareness reduces reactive spending.

2. Risk-Based Prioritization

Not every emerging threat is relevant.

Evaluate:

  • Likelihood
  • Impact
  • Asset exposure
  • Business dependency
  • Existing control maturity

CISM rewards proportional response.

3. Integration Into Risk Assessment Process

Emerging risks must be:

  • Incorporated into formal risk assessments
  • Documented in risk registers
  • Reported to leadership when material
  • Linked to strategic planning

Ad hoc reaction is a governance weakness.


Pattern Recognition

When emerging threats appear in a scenario, ask:

  1. Has enterprise exposure been assessed?
  2. Does the threat affect strategic objectives?
  3. Has risk been documented formally?
  4. Has leadership been informed appropriately?
  5. Is response aligned with risk appetite?

Correct answers often involve:

  • Formal risk assessment
  • Threat impact analysis
  • Integration into governance process
  • Executive communication

Not:

  • Immediate tool deployment
  • Panic-driven investment
  • Ignoring business context
  • Dismissing without evaluation

Trap Pattern

Common incorrect instincts:

  • “This is trending — buy the tool.”
  • “Eliminate the threat completely.”
  • “Ignore because no incident has occurred yet.”
  • “Implement full remediation before assessment.”

CISM emphasizes structured evaluation before reaction.


Scenario Practice

Question 1

Industry reports indicate a surge in ransomware attacks targeting cloud-based infrastructure. Your organization recently migrated critical systems to the cloud.

What should the information security manager do FIRST?

A. Conduct a risk assessment evaluating cloud exposure and control effectiveness
B. Purchase advanced ransomware detection tools
C. Disconnect cloud services
D. Notify customers of potential threats

Answer & reasoning

Correct: A

Structured risk assessment must precede operational decisions.

CISM prioritizes evaluation of exposure before tool acquisition.

Question 2

A new AI technology is rapidly adopted by business units without security oversight.

What is the MOST appropriate action?

A. Ban all AI tools immediately
B. Conduct a risk assessment to evaluate potential data exposure and governance impact
C. Increase monitoring tools
D. Replace existing data protection systems

Answer & reasoning

Correct: B

Emerging technology must be evaluated through structured risk assessment.

Question 3

Geopolitical tensions increase the likelihood of state-sponsored cyberattacks in your region.

What is the MOST appropriate strategic response?

A. Implement emergency security lockdown
B. Increase encryption universally
C. Notify regulators immediately
D. Conduct threat impact analysis and reassess enterprise risk posture

Answer & reasoning

Correct: D

Strategic reassessment aligns response with enterprise exposure.

Question 4

Security leadership becomes aware of a newly disclosed vulnerability affecting widely used software. No exploitation has occurred internally.

What should be done FIRST?

A. Replace all affected systems
B. Conduct an exposure analysis and assess impact
C. Publicly disclose vulnerability risk
D. Terminate vendor contracts

Answer & reasoning

Correct: B

CISM emphasizes exposure assessment before drastic action.

Question 5

A competitor suffers a major data breach due to supply chain compromise.

What is the MOST appropriate action?

A. Conduct targeted risk assessment of third-party exposure
B. Assume similar vulnerability exists internally
C. Replace all vendors
D. Ignore the event

Answer & reasoning

Correct: A

Threat awareness must trigger structured internal evaluation — not assumption or panic.


Key Takeaway

In CISM:

Emerging threats require structured evaluation — not immediate reaction.

When new risks appear:

  • Assess exposure.
  • Evaluate likelihood and impact.
  • Integrate into formal risk processes.
  • Inform leadership appropriately.
  • Align response with risk appetite.

Anticipation matters more than reaction on this exam.

Next Module Module 8: Vulnerability and Control Deficiency Analysis