Activity
Mon
Wed
Fri
Sun
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
Mar
What is this?
Less
More

Owned by Vincent

CISSP Study Group

2k members • Free

Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!

OpenAI Study Group

1 member • Free

Share resources, get advice, and connect with peers studying for OpenAI certifications! Join our Study Group and meet fellow professionals today!

Memberships

CyberMAYnia CAREER

363 members • Free

Skoolers

192k members • Free

757 contributions to CISSP Study Group
CISSP Practice Question (Domain 2: Asset Security - AI Exam Guidance)
A financial services firm acquires a pre-trained ML model from a third-party vendor for fraud detection. During onboarding, the security team discovers the vendor cannot provide documentation on the origin of the training dataset. What should the CISO address FIRST? A. Commission an independent bias audit before production deployment B. Classify the model and its training data as high-value intellectual property C. Assess whether the undocumented data sourcing introduces unmanageable supply chain risk D. Require the vendor to retrain the model using only internally sourced datasets Come back for the answer tomorrow, or study more now!
Introductions
Welcome to the group! Please share what you hope to gain from being here, and for fun, tell us the best piece of advice you've ever received!
2 likes • Feb 20
@James Dobbin some would even say it’s the key, 😉
1 like • 1d
@Ms. Marlow 100% done is better than perfect, love it
OFFICIAL ISC2 AI security exam guidance doc
ISC2 published this yesterday. It maps out exactly how AI security concepts show up across the CISSP exam. This is NOT a new exam outline. The current outline (April 2024) already has AI baked in. But this document spells out the specifics so you know what to expect. The big picture: AI isn't a separate topic. It's woven into everything from risk management (Domain 1) to software development security (Domain 8). A few things that stood out to me: - You need to know about protecting training data and model weights (Domain 2) - Prompt injection and adversarial attacks are fair game (Domain 3) - AI red teaming is now part of security testing (Domain 6) - Managing identities for AI agents and service accounts - least privilege still applies (Domain 5) - Model drift and AI in the SOC are covered in operations (Domain 7) If you're studying right now, don't panic. Most of this maps to concepts you already know -- just applied to AI systems. But you should absolutely be familiar with terms like data poisoning, adversarial attacks, algorithmic bias, model drift, and prompt injection. On our end we're going to keep weaving more AI-focused questions into the https://cissp.app and bringing more of this into our study group discussions. I attached the PDF if you want to read the full thing.
CISSP Practice Question (Domain 3: Security Architecture and Engineering)
An architect proposes implementing end-to-end encryption for all internal microservice communications. The SOC team warns this will eliminate their ability to inspect east-west traffic for lateral movement detection. Both teams escalate to you. What is the BEST course of action? A. Prioritize encryption and accept reduced network visibility as residual risk B. Reject encryption to preserve the SOC's detection capabilities C. Implement encryption with TLS termination points that allow authorized inspection D. Defer the decision until a formal threat model evaluates both risks Come back for the answer tomorrow, or study more now!
2 likes • 2d
@Sebastian Maute Correct Answer: D. Defer the decision until a formal threat model evaluates both risks Explanation (CISSP logic): Two legitimate security objectives are in direct conflict: confidentiality of service communications versus visibility for threat detection. Neither team is wrong. This is a classic CIA triad seesaw, and the CISSP answer is never to pick a side without understanding the risk landscape. A formal threat model quantifies what you lose with each approach: What's the likelihood and impact of lateral movement going undetected? What's the exposure if internal traffic is intercepted unencrypted? That analysis drives the architecture decision, not organizational politics. Breakdown: A. Prioritize encryption, accept reduced visibility - Makes a risk acceptance decision without a risk assessment. You're trading one exposure for another without quantifying either. B. Reject encryption to preserve detection - Same problem in reverse. Unencrypted east-west traffic is a real vulnerability, especially in zero trust environments. You can't dismiss it to protect one team's workflow. C. TLS termination for authorized inspection - This is likely the eventual technical solution, and it's the strongest distractor. But implementing an architecture without first understanding the threat landscape puts the cart before the horse. What if the threat model reveals certain services don't need inspection, or others need stronger isolation? D. ✅ Correct. A threat model provides the evidence base for an informed decision. It may lead to Option C, or a hybrid approach, or different controls entirely. The point is the decision is risk-driven, not opinion-driven. Think like a manager: When two security controls conflict, don't pick a winner. Model the threats and let the risk data break the tie.
FREE CISSP Masterclass with May Brooks - Next Tuesday, April 7th
Hey everyone, We've got another masterclass coming up with May Brooks next Tuesday. If you don't know May, she's a CISSP instructor who's helped a ton of people pass the exam, and she's been a great partner to our community. This is a live session where she breaks down how top scorers actually think through exam questions, how they eliminate traps, and what separates people who pass from people who don't. If you've been studying and want to sharpen your approach before exam day, this is worth your time. When: Tuesday, April 7th at 11:00 AM Eastern / 8:00 AM Pacific Where: 👉Register here Cost: Free for study group members!
Poll
40 members have voted
1-10 of 757
Vincent Primiani
7
5,099points to level up
Cybersecurity. The Study Group Guy.

Active 2h ago
Joined Apr 29, 2024
New York, NY
Powered by