TrailBlaze Adventures · CISSP Domain 1 Case

Security and Risk Management

A classroom and workshop case about governance, risk management, compliance, accountability, and security strategy in a fast-growing global adventure travel company.

Scenario — TrailBlaze Adventures Expansion Crisis

TrailBlaze Adventures is entering a phase of rapid global expansion, launching new travel experiences in South America, Southeast Asia, and Africa.

To support growth, the company is:

External pressure

  • Regulatory requirements (GDPR, regional privacy laws)
  • Customer expectations regarding safety and privacy
  • Investors demanding rapid scaling
  • Recent cybersecurity incidents in the travel sector, including data breaches, ransomware, and social platform abuse

Internal struggle

  • Inconsistent security policies across regions
  • Limited visibility into third-party risks
  • Unclear ownership of data and risk decisions
  • Growing tension between business agility and security controls
Management request: “Provide a structured risk and governance approach that enables growth while maintaining trust, compliance, and security.”

Student assignment

1

Investigate the case

Analyze the TrailBlaze scenario and identify key challenges related to security and risk management.

  • What are the most critical assets?
  • What types of risks are emerging?
  • Where are responsibilities unclear?
  • What governance gaps exist?
  • Which external pressures affect security decisions?
2

Identify Domain 1 challenges

Students should group their findings under governance, risk management, compliance, responsibilities, and policy-control structure.

3

Link challenges to Domain 1 concepts

Students must connect each identified challenge to CISSP Domain 1 concepts and explain why the concept is relevant.

Deliverable: A structured list of at least 10 security and risk management challenges, each linked to one or more Domain 1 concepts.

Domain 1 challenges to investigate

Governance & Strategy

  • Lack of centralized security governance
  • No clearly defined risk appetite or tolerance
  • Misalignment between business growth and security strategy

Risk Management

  • No consistent risk assessment process across regions
  • Difficulty evaluating third-party and supply chain risks
  • Incomplete risk register

Compliance & Legal

  • Exposure to GDPR violations due to personal and health data
  • Lack of clarity on regional regulatory requirements
  • Insufficient privacy controls

Roles & Responsibilities

  • Undefined data ownership
  • Weak accountability structures
  • Limited security awareness among global staff and partners

Policy & Control Framework

  • Inconsistent policies, standards, and procedures
  • Lack of enforcement and monitoring
  • Weak integration between policy and operations

Link challenges to Domain 1 concepts

Students must connect each identified challenge to CISSP Domain 1 concepts.

ChallengeDomain 1 ConceptExplanation
No clear ownership of customer dataData Ownership / AccountabilityWithout defined ownership, no one is responsible for protecting or classifying sensitive data.
Inconsistent regional security policiesSecurity GovernanceGovernance ensures policies are defined, enforced, and aligned globally.
Expansion without risk analysisRisk Assessment / Risk ManagementNew markets introduce threats that must be evaluated before launch.
Third-party logistics providersThird-Party Risk ManagementExternal partners introduce additional risk exposure.
Health and location data collectionPrivacy / Data ProtectionSensitive personal data requires strict legal and ethical controls.
Rapid growth pressureRisk Appetite / Risk ToleranceOrganization must define how much risk it is willing to accept for growth.
No unified risk trackingRisk RegisterRisks must be documented, tracked, and prioritized.
Weak employee awarenessSecurity Awareness & TrainingHuman factors are a major risk vector.
Regulatory uncertaintyCompliance / Due DiligenceOrganization must actively ensure adherence to laws.
Lack of structured policiesPolicy / Standards / ProceduresFormal structure is needed to guide consistent behavior.

Learning outcomes

Outcome 1

Identify risks

Identify organizational security risks in a complex global environment.

Outcome 2

Apply frameworks

Apply risk management frameworks to real-world situations.

Outcome 3

Understand governance

Understand the role of governance and policy in cybersecurity.

Outcome 4

Analyze strategy

Analyze the relationship between business strategy, compliance, and security decisions.

Instructor tip

Use this case in three phases:

Phase 1

Exploration

Students brainstorm risks freely.

Phase 2

Structuring

Introduce Domain 1 concepts.

Phase 3

Mapping

Students connect theory to practice.