Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.


Share knowledge about CyberSecurity with other ISACA members and idenfity and discuss issues that need more guidance from ISACA. Collaborate, make connections and learn how to keep your organization safe from Cyber risks.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
3050 Members
0 Online
0 Visits

Community Leader



Title: CISO



Title: Service Area Manager / Senior Managing Consultant


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 423 total

Must be a Topic member to contribute
View All »
Read on “ The US attorney's office in San Francisco on Friday (21 October) announced that the 29-year-old Russian man – Yevgeniy Nikulin – who was arrested in Czech Republic, wa...
M.Lambert | 10/27/2016 7:47:05 AM | COMMENTS(0)
Liviu Arsene from reports “As today’s vehicles incorporate more interconnected technologies aimed at either improving safety on the road or offering new features to drivers, security researchers have demonstrated that some of these in...
M.Lambert | 10/27/2016 7:32:23 AM | COMMENTS(0)
Another example of vulnerability of IoTs as DDOS attack agents -
Shamik | 10/24/2016 9:58:50 AM | COMMENTS(0)
One of the ways in which IOTs could become attack agents for a DDOS attack - Massive cyberattack turned ordinary devices into weapons - Thanks
Shamik | 10/23/2016 10:13:18 AM | COMMENTS(0)
While some of them are "elementary", it is still a good refresher list - Thanks
Shamik | 10/23/2016 10:09:40 AM | COMMENTS(0)

Documents & Publications: 82 total

Must be a Topic member to contribute
View All »
Posted by ISACA 19 days ago
Posted by ISACA 90 days ago
Press release that summarizes the provisions in the new rules and implementation information
Posted by M.Lambert 195 days ago

Events & Online Learning: 5 total

Journal Articles: 94 total

Volume 5, 2016
by Furkan Caliskan, CISA
With today’s fast-growing cybersecurity needs, building an effective cyberdefense infrastructure is a big challenge for many organizations.
Volume 5, 2016
by Daksha Bhasker, CISM, CISSP
When women are in leadership positions in significant numbers, “the bottom line improves—from financial success to the quality and scope of decision making.”
Volume 5, 2016
by Syed K. Ishaq, CISA, CRISC, CCISO
Although the short-term impact from a cyberattack can be overwhelming, the long-term implications can be quite burdensome
Volume 5, 2016
by Tom Pendergast, Ph.D.
Despite a wealth of preventive measures, employees remain one of the costliest vectors in a number of data breaches and security incidents, which are increasing at an alarming rate.
Volume 5, 2016
by Craig R. Hollingsworth, CISA
Within the last two years, the author’s research-oriented company installed a commercial, off-the-shelf (COTS) tool within its Moderate network to use for survey work.
Volume 5, 2016
by Jeimy J. Cano, Ph.D., CFE
In a world of accelerating change that is moving toward more digital tendencies, security and control practices have become an ongoing exercise in reinvention.

Wikis: 2 total

Blog Posts: 22 total

Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments
For a long time, the main focus of most organization was to have a solid protected network perimeter, by installing the most powerful shiny firewall, IPS/IDS to avoid intruders to trespass inside their networks. The endpoint (host) protection was always c...
Posted By : Willian Guilherme | 0 comments
The PCI Council has announced some new information on the upcoming version of PCI - Version 3.2.  Find out the latest here: http:/
Posted By : Stewart141 | 0 comments
On my last post in the CCI Blog, I described how American Water Works Association Cyber Security Framework didn’t addressed the detection Cyber Security events measures for these control systems.Today I have seen a good tweet (as always) from our collea...
Posted By : Enrique229 | 0 comments
Water Management Cyber Security guide from the American Water Works Association is bypassing certain critical controls on ICS Networks. Are we still in time in Spain to avoid this mishap? I know I should be looking for the needle in the Haystack, but lo...
Posted By : Enrique229 | 0 comments
Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments