Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

CyberSecurity

Share knowledge about CyberSecurity with other ISACA members and idenfity and discuss issues that need more guidance from ISACA. Collaborate, make connections and learn how to keep your organization safe from Cyber risks.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
2943 Members
1 Online
22184 Visits

Community Leader

M.Lambert

M.Lambert

Title: CISO

Badge: Influential

Melody

Melody

Title: Service Area Manager / Senior Managing Consultant

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 348 total

Must be a Topic member to contribute
View All »
Check out - Reeling In Ransomware: Data Protection For You And Your Users - https://www.scmagazine.com/resource-library/resource/Code42/whitepaper/57a3a162ed344a186455fe39 Do let me know if you agree/disagree with the content.  Thanks
Shamik | 8/23/2016 2:09:01 PM | COMMENTS(1)
Doug Olenick from SC Magazine reports that 2 cybersecurity researchers “explained how they believe groups, possibly controlled by the Iranian government, are targeting dissidents in and outside of Iran.” The researchers, “Collin Anderson and Claudio Guar...
M.Lambert | 8/22/2016 2:39:02 PM | COMMENTS(0)
Jeremy Bergsman and Daria Kirilenko discuss “Why biometrics are less secure than passwords” Question: How often do you expect there will be a breach based on biometrics abuse? Read article and share your thoughts ... http://www.itproportal.com/2016/0...
M.Lambert | 8/22/2016 2:19:49 PM | COMMENTS(1)
Doug Olenick from SC Magazine writes that “a July 6 fire at the Bouali petrochemical plant that spewed toxic clouds over a nearby city, an explosion on July 8 at the Marun Oil and Gas Production Company and a fire on July 29 at the Bisotoon petrochemical ...
M.Lambert | 8/22/2016 2:19:46 PM | COMMENTS(0)
Here’s how SmartMetric’s biometric technology works in a credit or ATM card: A tiny scanner will be embedded inside the card. When you get your card there will be a little bit of plastic over the scanner. You peel off the plastic and swipe your finger — y...
Shamik | 8/19/2016 8:12:59 PM | COMMENTS(0)
cio.com.au reports on a speach made in Sydney by Adam Salter, a partner at law firm Jones Day’s cybersecurity, privacy and data protection practice ... Australian companies face ‘US levels’ of litigation if they fail to prepare for mandatory data breach ...
M.Lambert | 8/19/2016 9:16:33 AM | COMMENTS(0)

Documents & Publications: 82 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 26 days ago
Press release that summarizes the provisions in the new rules and implementation information
Posted by M.Lambert 130 days ago
Books
Posted by ISACA 221 days ago

Events & Online Learning: 6 total

Journal Articles: 86 total

Volume 4, 2016
by C. Warren Axelrod, Ph.D., CISM, CISSP
This article examines this rapid loss of privacy and describes current approaches to mitigating risk of exposure of personal data and images.
Volume 4, 2016
by Daniel Schatz, CISM, CCSK, CISSP, CSyP, CVSE, ISO 27001 LA/LI, MCITP-EA
The topic of information security has evolved to one of the top concerns among policymakers and corporations. Leaders demand answers from their support structures as to how such risk can be effectively managed.
Volume 4, 2016
by Steven J. Ross, CISA, CISSP, MBCP
I can hear the rejoinder now: There is no need for a chief cyber officer because the chief information security officer (CISO) performs that function.
Volume 3, 2016
by Steven J. Ross, CISA, CISSP, MBCP
Targeted attacks by powerful enemies are forcing us to reconsider almost everything we thought we knew about protecting information resources.
Volume 3, 2016
by Veronika Stolbikova
Many smart card, cell phone, Internet of Things (IoT) and Bitcoin businesses have already implemented elliptic curve cryptography (ECC), and for good reason.
Volume 3, 2016
by Davi Ottenheimer and Matthew Wallace | Reviewed by A. Krista Kivisild, CISA, CA, CPA
This book is aimed at anyone with an interest in security and compliance in virtualized and cloud environments—appealing to both technical and nontechnical readers.

Wikis: 2 total

Blog Posts: 22 total

Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments
For a long time, the main focus of most organization was to have a solid protected network perimeter, by installing the most powerful shiny firewall, IPS/IDS to avoid intruders to trespass inside their networks. The endpoint (host) protection was always c...
Posted By : Willian Guilherme | 0 comments
The PCI Council has announced some new information on the upcoming version of PCI - Version 3.2.  Find out the latest here: http:/www.lbmcinformationsecurity.com/blog
Posted By : Stewart141 | 0 comments
On my last post in the CCI Blog, I described how American Water Works Association Cyber Security Framework didn’t addressed the detection Cyber Security events measures for these control systems.Today I have seen a good tweet (as always) from our collea...
Posted By : Enrique229 | 0 comments
Water Management Cyber Security guide from the American Water Works Association is bypassing certain critical controls on ICS Networks. Are we still in time in Spain to avoid this mishap? I know I should be looking for the needle in the Haystack, but lo...
Posted By : Enrique229 | 0 comments
Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments