Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.


Share knowledge about CyberSecurity with other ISACA members and idenfity and discuss issues that need more guidance from ISACA. Collaborate, make connections and learn how to keep your organization safe from Cyber risks.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
2729 Members
9 Online
20438 Visits

Community Leader



Badge: Energizer



Title: Service Area Manager / Senior Managing Consultant

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 205 total

Must be a Topic member to contribute
View All »
NSA adopted a new framework, called NSA21, that NSA Director Mike Rogers said " “will enable us to consolidate capabilities and talents to ensure that we're using all of our resources to maximum effect to accomplish our mission" more détails in this SC...
M.Lambert | 2/11/2016 9:14:38 AM | COMMENTS(2)
ISACA just released this new tool designed to help you assess where you are in your cyber career, where you want to go, and what you need to get there. I tried it and thought it was interesting. I...
M.Lambert | 2/11/2016 9:06:47 AM | COMMENTS(0)
The podium for worst passwords in 2015: 1rst place = "123456" (again) 2nd place = "password" (again) 3rd place = "12345678" (up from last year) Among the newest: "12345678890", "welcome", "login", "princess", "solo", "starwars" have a look at ...
M.Lambert | 2/9/2016 9:58:52 AM | COMMENTS(6)
Intel : Use Case Intel used Tier Definitions to try to express risk as a number on a heat map. There is language within the framework that points out it isn't a maturity model table to stress its flexibility. I look to maturity tables like COBIT 4.1 Matur...
Edgar063 | 2/9/2016 8:11:43 AM | COMMENTS(0)
In a survey by Dell, “Of those who are using the framework, 74 percent say it's used as a foundation for their cybersecurity roadmap, helping to improve organizational security.” read more and look up the Survey:
M.Lambert | 1/30/2016 12:36:14 AM | COMMENTS(5)
Google wants to keep the Islamic State (Isis) off the internet so the terrorist organization does not have a means for recruiting. The director of Google Ideas, Jared Cohen, seeks to “recapture digital territory” from extremist groups such as Isis. Rea...
M.Lambert | 1/28/2016 7:00:33 PM | COMMENTS(2)

Documents & Publications: 81 total

Must be a Topic member to contribute
View All »
Posted by ISACA 27 days ago
Posted by ISACA 59 days ago
Posted by ISACA 80 days ago

Events & Online Learning: 5 total

Journal Articles: 75 total

Volume 1, 2016
by Mohammed J. Khan, CISA, CRISC, CIPM
Data protection and cybersecurity go hand-in-hand due to the nature of the risk involved. The underlying assumption is that all data, whether they are stationary or in motion, are threatened to be compromised.
Volume 1, 2016
by Steven J. Ross, CISA, CISSP, MBCP
Twice in the past year or so I have received replacement credit cards because the numbers and expiration dates had been disclosed by merchants that I frequented.
Volume 1, 2016
by Martin Coe, DBA, CISA, CISM, CPA
Information security risk has dramatically evolved; however, security strategies that are typically compliance-based and perimeter-oriented have not kept pace.
Volume 6, 2015
by Hari Mukundhan, CISA, CISSP
With the significant increase in the rate of cybersecurity incidents worldwide, the financial impacts due to these incidents have also soared.
Volume 6, 2015
by Steven J. Ross, CISA, CISSP, MBCP
A few issues back, I wrote about the US National Institute of Standards and Technology’s (NIST) Framework for Improving Critical Infrastructure Cybersecurity.
Volume 6, 2015
by Ivo Ivanovs and Sintija Deruma
Cyberspace is a virtual environment. Today, it does not matter which device is used for connecting to the Internet.

Wikis: 2 total

Blog Posts: 19 total

On my last post in the CCI Blog, I described how American Water Works Association Cyber Security Framework didn’t addressed the detection Cyber Security events measures for these control systems.Today I have seen a good tweet (as always) from our collea...
Posted By : Enrique229 | 0 comments
Water Management Cyber Security guide from the American Water Works Association is bypassing certain critical controls on ICS Networks. Are we still in time in Spain to avoid this mishap? I know I should be looking for the needle in the Haystack, but lo...
Posted By : Enrique229 | 0 comments
Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments
  Rob Stroud is the New York based Vice President of Strategy and Innovation at CA Technologies and is the current President for the 2014-15 administrative term.  I caught up with Rob in Australia when he visited Canberra in June 2014...
Posted By : Rob Hanson | 2 comments
I saw Garry at the Sydney Chapter’s successful Strategic Planning event in July 2014.  He was animated and gregarious during the evening’s cocktail event and it felt good to see him again and catch...
Posted By : Rob Hanson | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments