๐๏ธ Welcome to Tech Explained: CISSP Domain 1 โSecurity & Risk Management
Whether youโre preparing for the CISSP exam or just boosting your cybersecurity knowledge, this podcast has you covered!
๐ Want More CISSP Resources?
Check out whatโs waiting for you on our channel:
๐น CISSP Shorts โ Key Concepts in Short Format Visuals
Need a quick refresher? Dive into our YouTube Shorts playlist for fast, visual breakdowns of must-know CISSP concepts:
๐ https://www.youtube.com/playlist?list=PLn2aCFpQV2DE2J8H2sp0nWvl5SSsfOS1t
๐น CISSP Practice Question Series
Put your knowledge to the test with real CISSP-style questions, plus detailed explanations to help you learn as you go:
๐ https://www.youtube.com/playlist?list=PLn2aCFpQV2DHo-n7BVxf20MC9hLsrJRqs
CISSP Domain 1: Security & Risk Management
mm:ss
00:00 - Introduction to CISSP Domain 1 (Security & Risk Management)
00:29 - Importance of Corporate Governance in Cybersecurity
01:28 - Understanding Roles: Accountability vs. Responsibility
01:57 - Accountability vs. Responsibility (Cloud Example)
02:29 - Due Care and Due Diligence Explained
02:56 - Introduction to Import/Export Controls and Cryptography
03:25 - Historical Context of Cryptography & Export Controls (ITAR/EAR)
04:27 - Understanding ITAR, EAR, and the Wassenaar Arrangement
05:26 - Transborder Data Flow & Data Residency Laws
06:24 - GDPR & International Data Protection Regulations
06:50 - Introduction to Privacy in Cybersecurity
07:23 - Data Lifecycle & Privacy Connection
08:53 - Ethics in Cybersecurity: Why It Matters
07:23 - ISCยฒ Code of Professional Ethics (Four Canons Explained)
08:53 - Risk Management Overview (Asset Valuation, Risk Analysis, Risk Treatment)
09:22 - Asset Valuation (Quantitative vs. Qualitative Analysis)
10:21 - Threat Modeling & Risk Analysis (STRIDE Methodology)
11:51 - Identifying Vulnerabilities (Vulnerability Assessment & Penetration Testing)
13:19 - Understanding Risk Likelihood and Impact
13:50 - Quantitative Risk Analysis & ALE Calculation
14:55 - Qualitative Risk Analysis Explained
15:22 - Four Methods of Risk Treatment (Avoid, Transfer, Mitigate, Accept)
18:53 - Understanding Risk Acceptance & When to Use It
19:20 - Risk Management Frameworks Overview
19:50 - NIST Risk Management Framework (RMF) Overview
20:23 - Detailed Breakdown of NIST RMF Steps:
- Prepare, Categorize, Select, Implement, Assess, Authorize, Monitor
22:47 - Other Risk Management Frameworks (ISO 31000, COSO, ISACA Risk IT)
23:18 - Security Policies & Their Importance
24:46 - Hierarchy of Security Policies:
- Policies, Standards, Procedures, Baselines, Guidelines
27:48 - The Link Between Security and Privacy
28:48 - Developing a Strong Privacy Policy & Implementing Privacy Controls
30:47 - What Constitutes Personal Data (Direct, Indirect, Online Identifiers)
32:42 - Data Lifecycle Stages Explained (Creation, Storage, Use, Sharing, Archiving, Destruction)
34:11 - Importance of Data Classification & Protection
34:42 - International Privacy Guidelines (OECD Privacy Principles)
35:38 - GDPR Explained (Scope & Importance)
37:06 - Intellectual Property (Patents, Trademarks, Copyrights, Trade Secrets)
40:08 - Deep Dive into Import/Export Controls & Cryptography
41:32 - Key Legal and Regulatory Considerations (Data Breach Notifications, Industry-Specific Laws)
43:56 - "Thinking Like a CEO": Strategic Security Leadership
44:22 - Due Care vs. Due Diligence Explained Clearly
46:37 - Importance of Security Awareness, Training, & Education
47:18 - Building the "Human Firewall" in Organizations
48:45 - Online vs. Traditional Security Training Methods & Benefits
50:14 - Importance of Security in Procurement & Procurement Process
51:51 - Service Level Requirements (SLR) & Service Level Agreements (SLA)
54:07 - Physical Security Controls & Their Importance
55:36 - Types of Physical Security Controls (Administrative, Technical, Physical)
57:38 - Practical Implementation of Physical Security Controls
58:37 - Recap of CISSP Domain 1 Topics Covered
59:07 - Essential Advice for CISSP Exam Success
01:01:32 - Final Thoughts & Importance of Continuous Security Management
Our Mission & Method: This podcast is an exploration of how we can learn better in the modern age. Our team performs all the core research, develops the ideas, and writes the content you hear. In the spirit of our mission, we partner with AI tools to help organize our findings and polish our production. Itโs a human-AI collaboration designed to bring you clear, insightful episodes. We're learning as we go and welcome your feedback on this journey!
โ ๏ธ Note: This content is not endorsed by (ISC)ยฒ. Always cross-reference official materials.
#CISSP2025 #RiskManagement #CyberSecurityCertification #GDPRCompliance #TechGuruCISSP