Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

CyberSecurity

Share knowledge about CyberSecurity with other ISACA members and idenfity and discuss issues that need more guidance from ISACA. Collaborate, make connections and learn how to keep your organization safe from Cyber risks.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
2117 Members
12 Online
15892 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 64 total

Must be a Topic member to contribute
View All »
Please see my latest article here: http://blog.norsecorp.com/2015/01/26/iot-ioe-if-it-has-an-ip-address-it-can-be-hacked/
Michael S. Oberlaender | 1/27/2015 12:19:53 PM | COMMENTS(1)
Many variables will definately influence the outcome of any CyberSecurity program. In my view, multi-agency approach and top leadership support will have greater impact on success of any cyberSecurity program. If you get it right with the two issues, the ...
Simiyu | 1/19/2015 8:22:52 AM | COMMENTS(0)
Hi All, Need suggestion and guidance. I have been working in IT from past 10+ years, out of which 4 years I worked as a Technical Support Rep and then moved to development of PDF documents and applications using Adobe LiveCycle tool. I think I have eno...
Ajay243 | 1/19/2015 6:04:48 AM | COMMENTS(15)
What are the technologies for threats we're facing on 2015? New risks?
MaximoPatino | 12/31/2014 9:36:48 AM | COMMENTS(4)
This is an interesting blog article summarizing the FBI findings that indicate North Korea was behind the hack and future implications for US corporations: http://krebsonsecurity.com/2014/12/fbi-north-korea-to-blame-for-sony-hack/
JasonY | 12/31/2014 8:04:45 AM | COMMENTS(16)
With the ever increasing adoption of information technology business today rely on software systems and applications more than ever. Many of these IT systems evolved and evolving with ever increasing vulnerabilities, leading to security issues/crimes in t...
Sri | 12/24/2014 9:52:45 AM | COMMENTS(4)

Documents & Publications: 57 total

Must be a Topic member to contribute
View All »
Posted by ISACA 6 days ago
Mapping IBM Security Solutions to NIST Cybersecurity Framework
Posted by JasonY 83 days ago
Research
Posted by ISACA 85 days ago
An organization will only survive if it can continue operations after disastrous events. Continuity planning is critical to keeping your organization working in the event of a medium to large scale disaster. Planning helps to ensure that your customers/clients will still have access to the functions, information, and resources you provide them. The presentation covers what can be done to ensure survival and recovery after these types of events. Topics include continuity planning components, the processes, as well as testing and exercising the plan(s). The course is intended for continuity planners, IT security managers and professionals, contractors, and anyone interested in continuity planning.
Posted by Larry Wlosinski 91 days ago

Events & Online Learning: 4 total

Journal Articles: 61 total

Volume 1, 2015
by Steven J. Ross, CISA, CISSP, MBCP
The jumble of systems, new and antiquated, well and poorly controlled, leads me to conclude that: Cyberthreats are not a security problem. They are a systems problem.
Volume 1, 2015
by Tieu Luu
In November 2013, the US Office of Management and Budget (OMB) issued memorandum M-14-03 requiring all federal departments and agencies to establish an information security continuous monitoring (ISCM) program.
Volume 1, 2015
by P. W. Singer and Allan Friedman | Reviewed by Larry Marks, CISA
This book defines cybersecurity, discusses the basic issues of cybersecurity about which everyone should be aware and supplies the reader with tools to address these threats.
Volume 1, 2015
by Seemant Sehgal, CISA, CISM, BS7799 LI, CCNA, CEH, CIW Security Analyst, SABSA
Over the past few decades, cybersecurity has gained pivotal importance in the way businesses operate and survive in their value systems.
Volume 1, 2015
by Tyson Macaulay and Bryan Singer | Reviewed by A. Krista Kivisild, CISA, CA
ICSs are not new, but more and more they are being exposed to new threats as they become Internet-facing and their critical services are exposed to attack.
Volume 6, 2014
by Steven J. Ross, CISA, CISSP, MBCP
Cyberattacks are a known threat to the information systems of organizations around the world.

Wikis: 2 total

Blog Posts: 15 total

 Rob Stroudis the New York based Vice President of Strategy and Innovation at CATechnologies and is the current President for the 2014-15 administrativeterm.  I caught up with Rob in Australiawhen he visited Canberra in June 2014 and again about a wee...
Posted By : Rob Hanson | 2 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
Having been associated with the BS 7799 from its introduction as a Security Standard, and as a Contributor to the ISO 27001, and the last and final Chair of the ISO 27001 at the Department of Trade and Industry (DTI) I have been a long term supporter, and...
Posted By : John379 | 0 comments
and Become More Secure As a penetration tester I find it TOO EASY to fully compromise an internal network – without finding a single “vulnerability”! I spend most of my time on two types of engagements — PCI projects and penetration tests. The pen test...
Posted By : Stewart141 | 0 comments
13 Nov 2014
Posted By : masarker | 4 comments
Slowly are organization have started using web as a service delivery platform.   Various study reveals that the web as the most economical platform and branches / office being the most expensive platform for the delivery of service to customer. Further w...
Posted By : Parthasarathy | 0 comments