Session 1 - Week 1
Check List

Concept Tracker
Self-track confidence of knowledge on key concepts
Still Working It
    Got It
      Needs Attention

        Session One - Week One

        Dashboard
        Session 1 Chatgpt Lecture

        CISSP Week 1, Session 1: Security Governance Foundations


        Welcome to Session 1 of your CISSP journey. Today, we’re diving into the bedrock of everything you’ll be building on—Security Governance Foundations. That means ethics, core security principles, and how organizations make risk-based decisions in complex environments. Let’s get into it.

        1. ISC² Code of Ethics

        The CISSP isn’t just about tech—it’s about trust. The ISC² Code of Ethics sets that tone. There are four canons:

        • Protect society, the common good, and infrastructure.
        • Act honorably, honestly, justly, responsibly, and legally.
        • Provide competent service to principals.
        • Advance and protect the profession.

        Violating these can result in sanctions or revocation of your certification. This isn’t just a checkbox—ethical behavior is critical.

        2. Professional Practices

        Professionalism in cybersecurity means understanding due care and due diligence:

        • Due Care: Taking the right actions (precautions).
        • Due Diligence: Doing your homework (researching risks).

        When breaches happen, investigators ask: “Did you act like a reasonable security professional would?”

        3. Core Security Concepts (CIA Triad)

        All security controls aim to protect one or more parts of the CIA Triad:

        • Confidentiality – Keep data secret (e.g., encryption, access controls).
        • Integrity – Ensure data accuracy (e.g., checksums, hashing).
        • Availability – Ensure systems/data are accessible (e.g., DR plans).

        Whether it's policies or technical controls—always ask, “What part of the triad does this support?”

        4. Risk-Based Management

        Security is about managing limited resources effectively using risk management:

        1. Identify risks – What could go wrong?
        2. Analyze risks – How likely and how bad?
        3. Treat risks – Avoid, transfer, mitigate, or accept.

        You can’t protect everything equally—align controls to business value. Standards like NIST RMF and ISO 27005 help with this.

        5. Supply Chain and Third-Party Risk (2 min)

        You might have great internal security—but still get compromised by a vendor (remember SolarWinds?).

        • Assess third-party risk during onboarding.
        • Include security terms in contracts.
        • Continuously monitor vendor compliance.

        Cloud models and external services shift risk—but don’t remove your responsibility.

        Wrap-Up: Key Takeaways

        • Follow the Code of Ethics—your certification depends on it.
        • Use due care and diligence in all decisions.
        • Anchor controls to the CIA triad.
        • Apply risk-based thinking across the board.
        • Manage your third-party exposure.

        Final Thoughts

        You just took your first step toward CISSP mastery. This isn’t just about passing an exam—it’s about thinking differently about trust, responsibility, and risk in our digital world. Great work—onward to Session 2!

        Timestamped Notes
        Add custom notes in real time while listening. Select a subdomain, or leave blank. Manually set the time if desired.
        0:00:00
        Select a Sub-domain
        Subdomains
        1.1Understand, adhere to, and promote professional ethics
        1.2Understand and apply security concepts
        Keywords
        ISC² Code of Ethics
        Professional Practices
        Confidentiality (CIA Triad)
        Integrity (CIA Triad)
        Availability (CIA Triad)
        Risk‑Based Management
        Supply Chain Security
        Third‑Party Risk
        Flashcards