Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

CyberSecurity

Share knowledge about CyberSecurity with other ISACA members and idenfity and discuss issues that need more guidance from ISACA. Collaborate, make connections and learn how to keep your organization safe from Cyber risks.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
2208 Members
10 Online
16439 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 71 total

Must be a Topic member to contribute
View All »
We often get invites about attending free online webinars on catchy topics like Cyber Security, Data breach prevention, next generation blah blah etc. I wonder how ofter its really a knowledge transfer (KT) session, and not a hidden sales pitch promot...
Navin Daund | 2/28/2015 6:50:45 AM | COMMENTS(5)
NEW!! Last piece of my IoT Security series: Privacy and Humanity Elements for the IoT / IoE: #InfoSec #CyberSecurity #IoT #IoE #CISO #CSO #CTO #CIO #CEO #Privacy http://blog.norsecorp.com/2015/02/17/privacy-and-humanity-elements-for-the-iot-ioe/
Michael S. Oberlaender | 2/22/2015 7:22:45 PM | COMMENTS(4)
http://phys.org/news/2015-02-banks-sophisticated-cyberattack.html
Shahab547 | 2/16/2015 8:38:46 PM | COMMENTS(7)
What are the technologies for threats we're facing on 2015? New risks?
MaximoPatino | 2/15/2015 3:01:37 AM | COMMENTS(5)
This is an interesting blog article summarizing the FBI findings that indicate North Korea was behind the hack and future implications for US corporations: http://krebsonsecurity.com/2014/12/fbi-north-korea-to-blame-for-sony-hack/
JasonY | 2/14/2015 12:29:53 PM | COMMENTS(17)
Remote Deposit Capture (RDC) facilitates processing of bank cheque payments through images captured by an RDC app residing on the customer's mobile phone. Thus, information relating about customer, beneficiary, accounts, transaction amounts, etc., are col...
NARASIMHAM NVL | 2/13/2015 1:47:31 PM | COMMENTS(3)

Documents & Publications: 58 total

Must be a Topic member to contribute
View All »
Emergency planning is an important component to ensuring that an organization survives a catastrophic event. Mr. Wlosinski discussed many threats, the emergency framework, and the many plans that are in place to ensure continuity of the federal government. The intended audience includes IT security managers and professionals, federal government managers and directors, contractors, continuity planners, and anyone interested in how the federal government conducts continuity planning.
Posted by Larry Wlosinski 8 days ago
Posted by ISACA 40 days ago
Mapping IBM Security Solutions to NIST Cybersecurity Framework
Posted by JasonY 116 days ago
Research
Posted by ISACA 119 days ago

Events & Online Learning: 4 total

Journal Articles: 64 total

Volume 2, 2015
by Larry G. Wlosinski, CISA, CISM, CRISC, CAP, CBCP, CDP, CISSP, ITIL V3
Information security events that affect cloud systems are occurring with no end in sight, so it should be no surprise that the cloud should be treated as a nonsecure environment with numerous threats and concerns.
Volume 2, 2015
by Steven J. Ross, CISA, CISSP, MBCP
I did a Google search on the word cyber and was told there are 467 million references to that term.
Volume 1, 2015
by Tyson Macaulay and Bryan Singer | Reviewed by A. Krista Kivisild, CISA, CA
ICSs are not new, but more and more they are being exposed to new threats as they become Internet-facing and their critical services are exposed to attack.
Volume 1, 2015
by Guiliano Pozza and John D. Halamka | Reviewed by Ibe Etea, CISA, CRISC, CA, CFE, CIA, CRMA
For anyone who is interested in the modern dynamics and possible impacts of cybersecurity and cyberhacking, the benefits of the book are twofold: learn and enjoy this well-written novel.
Volume 1, 2015
by Steven J. Ross, CISA, CISSP, MBCP
The jumble of systems, new and antiquated, well and poorly controlled, leads me to conclude that: Cyberthreats are not a security problem. They are a systems problem.
Volume 1, 2015
by Tieu Luu
In November 2013, the US Office of Management and Budget (OMB) issued memorandum M-14-03 requiring all federal departments and agencies to establish an information security continuous monitoring (ISCM) program.

Wikis: 2 total

Blog Posts: 17 total

Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments
  Rob Stroud is the New York based Vice President of Strategy and Innovation at CA Technologies and is the current President for the 2014-15 administrative term.  I caught up with Rob in Australia when he visited Canberra in June 2014...
Posted By : Rob Hanson | 2 comments
I saw Garry at the Sydney Chapter’s successful Strategic Planning event in July 2014.  He was animated and gregarious during the evening’s cocktail event and it felt good to see him again and catch...
Posted By : Rob Hanson | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
Having been associated with the BS 7799 from its introduction as a Security Standard, and as a Contributor to the ISO 27001, and the last and final Chair of the ISO 27001 at the Department of Trade and Industry (DTI) I have been a long term supporter, and...
Posted By : John379 | 0 comments
and Become More Secure As a penetration tester I find it TOO EASY to fully compromise an internal network – without finding a single “vulnerability”! I spend most of my time on two types of engagements — PCI projects and penetration tests. The pen test...
Posted By : Stewart141 | 0 comments