Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.


Share knowledge about CyberSecurity with other ISACA members and idenfity and discuss issues that need more guidance from ISACA. Collaborate, make connections and learn how to keep your organization safe from Cyber risks.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
2624 Members
2 Online
19661 Visits

Community Leader



Badge: Energizer



Title: Service Area Manager / Senior Managing Consultant

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 170 total

Must be a Topic member to contribute
View All »
Read article from Ciara Long of the BUSINESS REPORTER at:
M.Lambert | 11/30/2015 12:43:47 PM | COMMENTS(0)
Here's something easy and nice to share: Top 5 Cyber Monday security threats and what to do about them. Go to:
M.Lambert | 11/29/2015 7:16:58 PM | COMMENTS(0)
Do you agree with this article suggesting these top 6: 1. 2016 will reshape perceptions of security in the EU 2. As Apple Pay and Google Pay and touchless mobile payments take off, cybercrime will shift to the smartphone 3. Boundaries of attacks blu...
M.Lambert | 11/27/2015 7:30:20 AM | COMMENTS(0)
Study rated the top cybersecurity certs by salary. A short list of the 12 most statisticallly relevant certs was drawn from over 162 cybersecurity certifications. ISACA's CISM came on top ! READ MORE :
M.Lambert | 11/25/2015 6:51:33 AM | COMMENTS(0)
Mike Lennon discusses the report in “Security Week” Youy can also get the 20 page report at
M.Lambert | 11/19/2015 7:05:54 AM | COMMENTS(0) Increasingly, cybersecurity is becoming a top-of-mind issue for most CEOs and boards, and they are becoming more preemptive in evaluating cybersecurity risk exposure as...
Dr. Paulo Pagliusi | 11/16/2015 1:42:03 PM | COMMENTS(1)

Documents & Publications: 79 total

Must be a Topic member to contribute
View All »
Posted by ISACA 7 days ago
ISACA conducted a global survey of more than 900 member cybersecurity experts to look at the biggest security risks of and best security measures for mobile payment. Among the findings: •Only 23% believe that mobile payments are secure in keeping personal information safe. •Nearly half (47%) say mobile payments are not secure and 30% are unsure. •87% expect to see an increase in mobile payment data breaches over the next 12 months, yet 42% of respondents have used this payment method in 2015.
Posted by M.Lambert 53 days ago

Events & Online Learning: 6 total

Journal Articles: 90 total

Volume 6, 2015
by Hari Mukundhan, CISA, CISSP
With the significant increase in the rate of cybersecurity incidents worldwide, the financial impacts due to these incidents have also soared.
Volume 6, 2015
by Steven J. Ross, CISA, CISSP, MBCP
A few issues back, I wrote about the US National Institute of Standards and Technology’s (NIST) Framework for Improving Critical Infrastructure Cybersecurity.
Volume 6, 2015
by Ivo Ivanovs and Sintija Deruma
Cyberspace is a virtual environment. Today, it does not matter which device is used for connecting to the Internet.
Volume 6, 2015
by Nickson Choo, CISA, CRISC, CFE
Get to know your network.
Volume 6, 2015
by Wanbil W. Lee, DBA
Of all the human inventions since the dawn of civilization, the computer is the only one that extends our intellectual power.
Volume 6, 2015
For the past several years, a lot of research, writing and speaking has been focused on the Internet of Things (IoT) and the smart devices that are used within it.

Wikis: 2 total

Blog Posts: 19 total

On my last post in the CCI Blog, I described how American Water Works Association Cyber Security Framework didn’t addressed the detection Cyber Security events measures for these control systems.Today I have seen a good tweet (as always) from our collea...
Posted By : Enrique229 | 0 comments
Water Management Cyber Security guide from the American Water Works Association is bypassing certain critical controls on ICS Networks. Are we still in time in Spain to avoid this mishap? I know I should be looking for the needle in the Haystack, but lo...
Posted By : Enrique229 | 0 comments
Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments
  Rob Stroud is the New York based Vice President of Strategy and Innovation at CA Technologies and is the current President for the 2014-15 administrative term.  I caught up with Rob in Australia when he visited Canberra in June 2014...
Posted By : Rob Hanson | 2 comments
I saw Garry at the Sydney Chapter’s successful Strategic Planning event in July 2014.  He was animated and gregarious during the evening’s cocktail event and it felt good to see him again and catch...
Posted By : Rob Hanson | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments