<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security governance in CISSP Study Group</title>
    <link>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/74072#M1691</link>
    <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/715155969"&gt;@dcontesti&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1688194833"&gt;@Mahender&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783051913"&gt;@Steve-Wilme&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Hello all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for reaching out via the ISC2 Community board.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I am looking to see if there is an internal ISC2 association/connection/oversight between what we publish as content for training and the Self-Study Material (that have links on our website) such as the I&lt;EM&gt;&lt;STRONG&gt;SC2 CISSP Certified Information Systems Security Professional Official Study Guide (Sybex Study Guide)&lt;/STRONG&gt;&lt;/EM&gt;.&lt;BR /&gt;&lt;BR /&gt;In the meantime, I read through the first 2 paragraphs on Page 14 (either edition), &lt;EM&gt;Chapter 1 - Security Governance Through Principles and Policies, &lt;/EM&gt;Security Governance is seen as a "collection of practices..." as opposed to the reference from Gartner, "Security Governance is a process..." With regards to the exam and the sample questions provided in the study material, I believe it's up to the test taker to determine exactly what the question is looking for; definition, concept, or linking of two or more concepts.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I'm not sure if the above is helpful, but I'm offering it up anyway. Feel free to ignore it if it's not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can also tell you that the verbiage regarding &lt;EM&gt;Security Governance&lt;/EM&gt;&amp;nbsp;is the same in both the 9th and 10th editions of that publication; no change or update between editions.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I'll let you know what I find out about ISC2 and the study publication in question.&lt;/P&gt;</description>
    <pubDate>Tue, 24 Sep 2024 17:43:14 GMT</pubDate>
    <dc:creator>CBMExamTeam</dc:creator>
    <dc:date>2024-09-24T17:43:14Z</dc:date>
    <item>
      <title>Security governance</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/73976#M1676</link>
      <description>&lt;P&gt;Optimally, security governance is performed by a board of directors, but smaller organizations may simply have the CEO or CISO perform the activities of security governance. Which&lt;BR /&gt;of the following is true about security governance?&lt;BR /&gt;A. Security governance ensures that the requested activity or access to an object is possible&lt;BR /&gt;given the rights and privileges assigned to the authenticated identity.&lt;BR /&gt;B. Security governance is used for efficiency. Similar elements are put into groups, classes,&lt;BR /&gt;or roles that are assigned security controls, restrictions, or permissions as a collective.&lt;BR /&gt;C. Security governance is a documented set of best IT security practices that prescribes&lt;BR /&gt;goals and requirements for security controls and encourages the mapping of IT security&lt;BR /&gt;ideals to business objectives.&lt;BR /&gt;D. Security governance seeks to compare the security processes and infrastructure used&lt;BR /&gt;within the organization with knowledge and insight obtained from external sources.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hard to believe on the answer given by ISC2 which is D, but the correct answer is C. Correct me if I am wrong?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2024 10:06:36 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/73976#M1676</guid>
      <dc:creator>Mahender</dc:creator>
      <dc:date>2024-09-20T10:06:36Z</dc:date>
    </item>
    <item>
      <title>Re: Security governance</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/73978#M1677</link>
      <description>&lt;P&gt;D is like an incomplete version of C, although C itself isn't a good description.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes governance will involve examining the external context, starting with applicable legislation and regulation, codes that apply in your industry, then the frameworks which best match those and the capabilities/resources of the organisation.&amp;nbsp; Generally, you find different external stakeholders will generate or refer out to their preferred frameworks and then the challenge often is to map all of that across to the controls your organisation can implement and operate.&amp;nbsp; So governance isn't about best in class or ideals it's about what are appropriate to the context and can be complied with.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2024 10:53:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/73978#M1677</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2024-09-20T10:53:42Z</dc:date>
    </item>
    <item>
      <title>Re: Security governance</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/73982#M1680</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783051913"&gt;@Steve-Wilme&lt;/a&gt;&amp;nbsp;, yeah, I agree with you that it is poorly worded.&amp;nbsp;&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1688194833"&gt;@Mahender&lt;/a&gt;&amp;nbsp;, are you certain that this question came from ISC2?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2024 11:38:11 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/73982#M1680</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2024-09-20T11:38:11Z</dc:date>
    </item>
    <item>
      <title>Re: Security governance</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/73991#M1683</link>
      <description>&lt;P&gt;I mean, in our ISC2 9E document questionnaire, the answer was given as Option D. We mostly refer this document, but in fact it is not accurate to follow some times.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2024 13:16:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/73991#M1683</guid>
      <dc:creator>Mahender</dc:creator>
      <dc:date>2024-09-20T13:16:18Z</dc:date>
    </item>
    <item>
      <title>Re: Security governance</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/74017#M1686</link>
      <description>&lt;P&gt;I think this question should be referred back to the Exam Development team for review.&amp;nbsp; Maybe&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1533099493"&gt;@CBMExamTeam&lt;/a&gt;&amp;nbsp;can stick handle to the correct folk.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I personally do not like any of the answers as any and all of them are partially correct..&amp;nbsp; I prefer the Gartner definition:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Security governance is a process for overseeing the cybersecurity teams who are responsible for mitigating business risks. Security governance leaders make the decisions that allow risks to be prioritized so that security efforts are focused on business priorities rather than their own.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Others&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;d&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2024 22:41:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/74017#M1686</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2024-09-20T22:41:24Z</dc:date>
    </item>
    <item>
      <title>Re: Security governance</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/74069#M1689</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1688194833"&gt;@Mahender&lt;/a&gt;&amp;nbsp;I don't mean to belabor the question, but what does "&lt;SPAN&gt;in our ISC2 9E document questionnaire" refer to?&amp;nbsp; Is it a book?&amp;nbsp; A PDF?&amp;nbsp; Who publishes it?&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/715155969"&gt;@dcontesti&lt;/a&gt;&amp;nbsp;I'm curious if he's referring to the Sybex ninth edition, myself... which ain't an ISC2 responsibility&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 12:34:03 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/74069#M1689</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2024-09-24T12:34:03Z</dc:date>
    </item>
    <item>
      <title>Re: Security governance</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/74072#M1691</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/715155969"&gt;@dcontesti&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1688194833"&gt;@Mahender&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783051913"&gt;@Steve-Wilme&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Hello all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for reaching out via the ISC2 Community board.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I am looking to see if there is an internal ISC2 association/connection/oversight between what we publish as content for training and the Self-Study Material (that have links on our website) such as the I&lt;EM&gt;&lt;STRONG&gt;SC2 CISSP Certified Information Systems Security Professional Official Study Guide (Sybex Study Guide)&lt;/STRONG&gt;&lt;/EM&gt;.&lt;BR /&gt;&lt;BR /&gt;In the meantime, I read through the first 2 paragraphs on Page 14 (either edition), &lt;EM&gt;Chapter 1 - Security Governance Through Principles and Policies, &lt;/EM&gt;Security Governance is seen as a "collection of practices..." as opposed to the reference from Gartner, "Security Governance is a process..." With regards to the exam and the sample questions provided in the study material, I believe it's up to the test taker to determine exactly what the question is looking for; definition, concept, or linking of two or more concepts.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I'm not sure if the above is helpful, but I'm offering it up anyway. Feel free to ignore it if it's not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can also tell you that the verbiage regarding &lt;EM&gt;Security Governance&lt;/EM&gt;&amp;nbsp;is the same in both the 9th and 10th editions of that publication; no change or update between editions.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I'll let you know what I find out about ISC2 and the study publication in question.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 17:43:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/74072#M1691</guid>
      <dc:creator>CBMExamTeam</dc:creator>
      <dc:date>2024-09-24T17:43:14Z</dc:date>
    </item>
    <item>
      <title>Re: Security governance</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/74105#M1694</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1533099493"&gt;@CBMExamTeam&lt;/a&gt;&amp;nbsp;wrote:&lt;P&gt;&lt;BR /&gt;In the meantime, I read through the first 2 paragraphs on Page 14 (either edition), &lt;EM&gt;Chapter 1 - Security Governance Through Principles and Policies, &lt;/EM&gt;Security Governance is seen as a "collection of practices..."&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I suppose we can call things whatever we want, but I would consider governance more than just "practices." Otherwise, under what umbrella do you include policy, standards, guidelines, and procedures? Where do you include industry regulations, etc. ("external governance" by another name)?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 03:13:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/74105#M1694</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2024-09-26T03:13:39Z</dc:date>
    </item>
    <item>
      <title>Re: Security governance</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/74122#M1696</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1688194833"&gt;@Mahender&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/715155969"&gt;@dcontesti&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783051913"&gt;@Steve-Wilme&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1005241419"&gt;@JoePete&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Hello all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your patience.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have contacted several internal experts in both Professional Development and Exam Content/Standards &amp;amp; Practices.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Professional Development has 100% control over ISC2 training content. They have no control over contents in publications from&amp;nbsp; Wiley &amp;amp; Sons. They do, however, have a business relationship with Wiley and will reach out to their Wiley contact.&lt;/LI&gt;&lt;LI&gt;Exam Content/Standards &amp;amp; Practice reviewed both the Security Governance post and the Incident Management Steps post. For both, they agreed they were poorly written ("terrible").&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;All I spoke with concur - you should reach out to Wiley &amp;amp; Sons and report these as errata. The contact information for that is in the publication, but I'll save you the time and trouble of finding it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;Reader Support for this Book&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="3"&gt;How to Contact the Publisher&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you believe you’ve found a mistake in this book, please bring it to our attention. At John Wiley &amp;amp; Sons, we understand how important it is to provide our customers with accurate content, but even with our best efforts an error may occur.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In order to submit your possible errata, please email to our Customer Service Team at &lt;A href="mailto:wileysupport@wiley.com" target="_blank"&gt;wileysupport@wiley.com&lt;/A&gt;&amp;nbsp;with the subject line: &lt;EM&gt;"Possible Book Errata Submission."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/715155969"&gt;@dcontesti&lt;/a&gt;&amp;nbsp;for your faith that I could "stick handle this inquiry to the right internalteam." LOL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope you can get a resolution from Wiley &amp;amp; Sons.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 18:23:26 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/74122#M1696</guid>
      <dc:creator>CBMExamTeam</dc:creator>
      <dc:date>2024-09-26T18:23:26Z</dc:date>
    </item>
    <item>
      <title>Re: Security governance</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/74128#M1698</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1533099493"&gt;@CBMExamTeam&lt;/a&gt;&amp;nbsp;THANK YOU for you diligence on this one and others.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And thank you for clarifying that these questions are related to the Riley publication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 23:58:06 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/74128#M1698</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2024-09-26T23:58:06Z</dc:date>
    </item>
    <item>
      <title>Re: Security governance</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/74132#M1700</link>
      <description>Yes sir, it's CISSP ISC2 Official 9th edition guide in PDF format. Seems it will be addressed below by Wiley &amp;amp; Sons publications. Sorry for the delayed response.</description>
      <pubDate>Fri, 27 Sep 2024 04:14:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/74132#M1700</guid>
      <dc:creator>Mahender</dc:creator>
      <dc:date>2024-09-27T04:14:42Z</dc:date>
    </item>
    <item>
      <title>Re: Security governance</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/74784#M1731</link>
      <description>&lt;P&gt;I answered "C" but now think "D" is best.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For "C", I would say "&lt;SPAN&gt;Security Governance" (SG) is an oversight that a standard is being met. I think what the answer says is part of the oversight, but not SG itself.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For "D", SG is the top tier of oversight, While it does not set the standard (that could be management instruction), SG role is to make sure it is being met (see answer C as to how) and provide assurance of it. However it can not&amp;nbsp; do that in isolation, it needs external input to determine best practice, it needs external input to determine new risks (e.g. supply chain with AI python repositories).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;However I could be CISSP definition of SG is different to mine.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 17:58:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Security-governance/m-p/74784#M1731</guid>
      <dc:creator>JohnEricsson</dc:creator>
      <dc:date>2024-10-29T17:58:24Z</dc:date>
    </item>
  </channel>
</rss>

