Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.


Share knowledge about CyberSecurity with other ISACA members and idenfity and discuss issues that need more guidance from ISACA. Collaborate, make connections and learn how to keep your organization safe from Cyber risks.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
2566 Members
7 Online
19170 Visits

Community Leader



Badge: Energizer



Title: Service Area Manager / Senior Managing Consultant

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 157 total

Must be a Topic member to contribute
View All »
Many countries participate in the Cyber Security Awareness Month. ISACA is offering several events and initiatives around cybersecurity. Look into the newly added events under the Events & Online Learning section below. There are free CPE’...
M.Lambert | 10/6/2015 9:49:37 AM | COMMENTS(2)
What do you think of this ? There is a claim that the IoT has the potential to revolutionize everyday security measures especially authentication. However, «If your password gets hacked, you can easily change it. If your fingerprint signa...
M.Lambert | 10/5/2015 9:41:08 AM | COMMENTS(1)
Did anyone already take the CSX-P exam? Is there any information about the exam that your are able to disclose?What to expect? Level of expertise? How did you prepare? Did you pass? Kind regards, Patric
Patric Versteeg | 10/3/2015 7:17:07 AM | COMMENTS(9)
Hello! Do you know any reliable and secure phishing simulation tool to use within a company? It can be free or not. Thanks!  
Melanie168 | 9/29/2015 1:27:06 AM | COMMENTS(14)
Read more at: And share your thoughts.
M.Lambert | 9/15/2015 8:15:07 AM | COMMENTS(2)
Take a moment and read this PCmag article : «How Cybersecurity Has Changed Since 9/11»,2817,2392642,00.asp And share your thoughts
M.Lambert | 9/11/2015 10:34:09 AM | COMMENTS(1)

Documents & Publications: 77 total

Must be a Topic member to contribute
View All »
ISACA conducted a global survey of more than 900 member cybersecurity experts to look at the biggest security risks of and best security measures for mobile payment. Among the findings: •Only 23% believe that mobile payments are secure in keeping personal information safe. •Nearly half (47%) say mobile payments are not secure and 30% are unsure. •87% expect to see an increase in mobile payment data breaches over the next 12 months, yet 42% of respondents have used this payment method in 2015.
Posted by M.Lambert 22 hours ago
Posted by ISACA 24 days ago

Events & Online Learning: 4 total

Journal Articles: 78 total

Volume 5, 2015
by Jeimy J. Cano, Ph.D., COBIT Foundation, CFE
Cyberinsurance is a way to account for cyberrisk and considers the new possible business responsibilities arising from operating in an international context.
Volume 5, 2015
by Fredric Greene, CISSP
Detective controls are a key component of a cybersecurity program in providing visibility into malicious activity, breaches and attacks on an organization’s IT environment.
Volume 5, 2015
by Gary Lieberman, Ph.D., CISSP
With 2014 being known as The Year of the Mega Breach, cyberattacks have quickly become a key focus in almost every BC/DR program.
Volume 5, 2015
by Michele Mosca, Ph.D.
In the Information Age, many of one’s most valuable belongings—finances, medical histories and, to a large extent, identities—are kept safe behind digital deadbolts.
Volume 5, 2015
by Steven J. Ross, CISA, CISSP, MBCP
If you think of cyberattacks as war, which it is in both the figurative and literal senses, make yourself ready to win it.
Volume 5, 2015
by Ganapathi Subramaniam
How do I ensure that my organization has controls to protect itself from cyberrisk?

Wikis: 2 total

Blog Posts: 19 total

On my last post in the CCI Blog, I described how American Water Works Association Cyber Security Framework didn’t addressed the detection Cyber Security events measures for these control systems.Today I have seen a good tweet (as always) from our collea...
Posted By : Enrique229 | 0 comments
Water Management Cyber Security guide from the American Water Works Association is bypassing certain critical controls on ICS Networks. Are we still in time in Spain to avoid this mishap? I know I should be looking for the needle in the Haystack, but lo...
Posted By : Enrique229 | 0 comments
Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments
  Rob Stroud is the New York based Vice President of Strategy and Innovation at CA Technologies and is the current President for the 2014-15 administrative term.  I caught up with Rob in Australia when he visited Canberra in June 2014...
Posted By : Rob Hanson | 2 comments
I saw Garry at the Sydney Chapter’s successful Strategic Planning event in July 2014.  He was animated and gregarious during the evening’s cocktail event and it felt good to see him again and catch...
Posted By : Rob Hanson | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments