SlideShare uma empresa Scribd logo
1 de 12
DOMAIN 3: Information Security Governance and Risk
Management
# 3.05
CISSPills Table of Contents
 Security Policy Framework
 Security Policy Framework Hierarchy
 Security Policy
 Standards
 Guidelines
 Procedures
 Baselines
 Data Classification
CISSPills Security Policy Framework
In order to reduce the likelihood of a security failure, the information security
implementation has to be somewhat formalised by implementing a Security
Policy Framework (SPF).
An SPF involves the creation of a hierarchical set of documents that at each
level increase the level of details and cover specific information and issues.
CISSPills Security Policy Framework Hierarchy
Policies
Standards
Guidelines
Procedures
Strategic
Tactical
CISSPills Security Policy
This is an overall general statement produced by the senior management to define the
main security objectives and to outline the security framework of an organisation. It’s a
strategic plan for implementing security and is used to:
 assign responsibilities;
 define roles;
 specify audit requirements;
 outline enforcement processes;
 indicate compliance requirements;
 define acceptable risk.
The Security Policy is often used as a proof that management is exercising due care
and is compulsory.
Policies are written in broad terms, however more granularity is needed to support
them and this is where standards, guidelines and procedures come into play.
CISSPills Security Policy (cont’d)
 Organisational security policy: this focuses on issues relevant to every aspects of an
organisation. This is also referred to as master security policy;
 Issue-specific policy: this focuses on individual topics that the management feels need
more detailed explanations and attention to make sure a comprehensive structure is built
(e.g. e-mails);
 System-specific policy: this focuses on individual systems, or types of systems, and
outlines how these should be protected (e.g. databases).
In addition to these focused types of policies, there are three overall categories of security
policies: regulatory, advisory and informative.
 Regulatory policy: this type of policy ensures that the organisation is following standards
set by specific industry regulations (e.g. HIPAA, PCI-DSS, etc.); it’s very detailed and specific
to a type of industry (e.g. Financial Services);
 Advisory policy: this type of policy discusses behaviours and activities that are acceptable
and defines consequence of violations;
 Informative policy: this type of policy is designed to provide information or knowledge about
a specific subject; it’s not enforceable, but rather teaches individuals about specific issues.
CISSPills Standards
Standards are mandatory activities, actions or rules that help supporting and
reinforce policies.
They are tactical documents, which ensure that specific technologies,
applications and parameters are applied in a consistent fashion
(standardised) across the organisation.
It is more granular than a policy and specify how protection should be
implemented and followed.
CISSPills Guidelines
Guidelines are the next tier in the SPF hierarchy and offer recommendation
on how standards are implemented and serve as operational guides for both
security professionals and users.
Whereas standards are specific mandatory rules, guidelines are not
compulsory.
CISSPills Procedures
Procedures are the final element of the hierarchy; they provide detailed step-
by-step documents that describe the exact actions necessary to implement a
specific security mechanism, control or solution.
The purpose of a procedure is to ensure the integrity of a business process: if
everything is accomplished by following the detailed steps, then all the
activities should be in compliance with policies, standards and guidelines.
Procedures ensure standardisation of security across all systems.
CISSPills Baselines
The term baseline can have two meanings:
 It can refer to a point in time configuration/status that is used as a
comparison for future changes;
 It can also refer to define the minimum level of protection required.
CISSPills Data Classification
Data Classification is the process of organising items, information, objects
and so forth based on their need for secrecy, sensitivity or confidentiality.
The reason for this categorisation is because securing any asset in the same
way is not cost-effective; hence data classification is the practice by which it
is possible ensuring that assets are protected proportionally to their level of
criticality.
Once data are categorised according to their sensitivity level, it is possible
deciding what security controls are necessary to protect the different
classification levels.
Data classification allows to follow a risk-based approach when it comes to
asset protection, which means that the number and strength of controls
deployed for an asset depends on its importance.
CISSPills That’s all Folks!
We are done, thank you for the interest! Hope you have enjoyed these pills as much
as I have had fun writing them.
For comments, typos, complaints or whatever your want, drop me an e-mail at:
cisspills <at> outlook <dot> com
More resources:
 Stay tuned on for the next issues;
 Join ”CISSP Study Group Italia” if you are preparing your exam.
Brought to you by Pierluigi Falcone. More info about me on
Contact Details

Mais conteúdo relacionado

Mais procurados

Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Famework
lneut03
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
wardjo
 
Risk Presentation
Risk Presentation Risk Presentation
Risk Presentation
lneut03
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
charlesgarrett
 
Security Policies
Security PoliciesSecurity Policies
Security Policies
phanleson
 
Centralized Cybersecurity in a Decentralized World
Centralized Cybersecurity in a Decentralized WorldCentralized Cybersecurity in a Decentralized World
Centralized Cybersecurity in a Decentralized World
Bob Turner
 

Mais procurados (20)

Isms info
Isms infoIsms info
Isms info
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Famework
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Risk Presentation
Risk Presentation Risk Presentation
Risk Presentation
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
Security Policies
Security PoliciesSecurity Policies
Security Policies
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Security policies
Security policiesSecurity policies
Security policies
 
So you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to SuccessSo you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to Success
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Mhdscs2019 v049n03 010
Mhdscs2019 v049n03 010Mhdscs2019 v049n03 010
Mhdscs2019 v049n03 010
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
 
CISO-Fundamentals
CISO-FundamentalsCISO-Fundamentals
CISO-Fundamentals
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020
 
Business case for enterprise continuity planning
Business case for enterprise continuity planningBusiness case for enterprise continuity planning
Business case for enterprise continuity planning
 
Centralized Cybersecurity in a Decentralized World
Centralized Cybersecurity in a Decentralized WorldCentralized Cybersecurity in a Decentralized World
Centralized Cybersecurity in a Decentralized World
 
Implementing security
Implementing securityImplementing security
Implementing security
 
SABSA Implementation(Part II)_ver1-0
SABSA Implementation(Part II)_ver1-0SABSA Implementation(Part II)_ver1-0
SABSA Implementation(Part II)_ver1-0
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game plan
 

Semelhante a CISSPills #3.05

1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docx
durantheseldine
 
NIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NISTNIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NIST
ebonyman0007
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
sdfghj21
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
alokkesh
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
AbuHanifah59
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
ImXaib
 
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Bonagiri Rajitha
 
Information security policy how to writing
Information security policy how to writingInformation security policy how to writing
Information security policy how to writing
PasangdolmoTamang
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, a
MaximaSheffield592
 
CHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapCHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chap
EstelaJeffery653
 

Semelhante a CISSPills #3.05 (20)

1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docx
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
 
CISSPills #3.06
CISSPills #3.06CISSPills #3.06
CISSPills #3.06
 
NIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NISTNIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NIST
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Chapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfChapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdf
 
Chapter003
Chapter003Chapter003
Chapter003
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and Prospect
 
Information security policy how to writing
Information security policy how to writingInformation security policy how to writing
Information security policy how to writing
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity Model
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, a
 
Cyber Families - Incident Response.pptx
Cyber Families - Incident Response.pptxCyber Families - Incident Response.pptx
Cyber Families - Incident Response.pptx
 
CHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapCHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chap
 

Mais de Pierluigi Falcone, CISSP, CISM, CCSK, SABSA Foundation

Mais de Pierluigi Falcone, CISSP, CISM, CCSK, SABSA Foundation (6)

CISSPills #1.03
CISSPills #1.03CISSPills #1.03
CISSPills #1.03
 
CISSPills #1.02
CISSPills #1.02CISSPills #1.02
CISSPills #1.02
 
CISSPills #1.01
CISSPills #1.01CISSPills #1.01
CISSPills #1.01
 
Annex 01
Annex 01Annex 01
Annex 01
 
CISSPills #3.04
CISSPills #3.04CISSPills #3.04
CISSPills #3.04
 
CISSPills #3.03
CISSPills #3.03CISSPills #3.03
CISSPills #3.03
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Último (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

CISSPills #3.05

  • 1. DOMAIN 3: Information Security Governance and Risk Management # 3.05
  • 2. CISSPills Table of Contents  Security Policy Framework  Security Policy Framework Hierarchy  Security Policy  Standards  Guidelines  Procedures  Baselines  Data Classification
  • 3. CISSPills Security Policy Framework In order to reduce the likelihood of a security failure, the information security implementation has to be somewhat formalised by implementing a Security Policy Framework (SPF). An SPF involves the creation of a hierarchical set of documents that at each level increase the level of details and cover specific information and issues.
  • 4. CISSPills Security Policy Framework Hierarchy Policies Standards Guidelines Procedures Strategic Tactical
  • 5. CISSPills Security Policy This is an overall general statement produced by the senior management to define the main security objectives and to outline the security framework of an organisation. It’s a strategic plan for implementing security and is used to:  assign responsibilities;  define roles;  specify audit requirements;  outline enforcement processes;  indicate compliance requirements;  define acceptable risk. The Security Policy is often used as a proof that management is exercising due care and is compulsory. Policies are written in broad terms, however more granularity is needed to support them and this is where standards, guidelines and procedures come into play.
  • 6. CISSPills Security Policy (cont’d)  Organisational security policy: this focuses on issues relevant to every aspects of an organisation. This is also referred to as master security policy;  Issue-specific policy: this focuses on individual topics that the management feels need more detailed explanations and attention to make sure a comprehensive structure is built (e.g. e-mails);  System-specific policy: this focuses on individual systems, or types of systems, and outlines how these should be protected (e.g. databases). In addition to these focused types of policies, there are three overall categories of security policies: regulatory, advisory and informative.  Regulatory policy: this type of policy ensures that the organisation is following standards set by specific industry regulations (e.g. HIPAA, PCI-DSS, etc.); it’s very detailed and specific to a type of industry (e.g. Financial Services);  Advisory policy: this type of policy discusses behaviours and activities that are acceptable and defines consequence of violations;  Informative policy: this type of policy is designed to provide information or knowledge about a specific subject; it’s not enforceable, but rather teaches individuals about specific issues.
  • 7. CISSPills Standards Standards are mandatory activities, actions or rules that help supporting and reinforce policies. They are tactical documents, which ensure that specific technologies, applications and parameters are applied in a consistent fashion (standardised) across the organisation. It is more granular than a policy and specify how protection should be implemented and followed.
  • 8. CISSPills Guidelines Guidelines are the next tier in the SPF hierarchy and offer recommendation on how standards are implemented and serve as operational guides for both security professionals and users. Whereas standards are specific mandatory rules, guidelines are not compulsory.
  • 9. CISSPills Procedures Procedures are the final element of the hierarchy; they provide detailed step- by-step documents that describe the exact actions necessary to implement a specific security mechanism, control or solution. The purpose of a procedure is to ensure the integrity of a business process: if everything is accomplished by following the detailed steps, then all the activities should be in compliance with policies, standards and guidelines. Procedures ensure standardisation of security across all systems.
  • 10. CISSPills Baselines The term baseline can have two meanings:  It can refer to a point in time configuration/status that is used as a comparison for future changes;  It can also refer to define the minimum level of protection required.
  • 11. CISSPills Data Classification Data Classification is the process of organising items, information, objects and so forth based on their need for secrecy, sensitivity or confidentiality. The reason for this categorisation is because securing any asset in the same way is not cost-effective; hence data classification is the practice by which it is possible ensuring that assets are protected proportionally to their level of criticality. Once data are categorised according to their sensitivity level, it is possible deciding what security controls are necessary to protect the different classification levels. Data classification allows to follow a risk-based approach when it comes to asset protection, which means that the number and strength of controls deployed for an asset depends on its importance.
  • 12. CISSPills That’s all Folks! We are done, thank you for the interest! Hope you have enjoyed these pills as much as I have had fun writing them. For comments, typos, complaints or whatever your want, drop me an e-mail at: cisspills <at> outlook <dot> com More resources:  Stay tuned on for the next issues;  Join ”CISSP Study Group Italia” if you are preparing your exam. Brought to you by Pierluigi Falcone. More info about me on Contact Details