Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Controls Monitoring

Welcome to the Controls Monitoring topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
201 Members
0 Online
5824 Visits

Community Leader

Ejaz024

Ejaz024

Title: IT Auditor

Points: 630

Badge: Lively

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 9 total

Must be a Topic member to contribute
View All »
When was the last time we took our controls inventory? Do we know what controls are in place, when those were designed and if still working as intended? Share with us what steps your organization have taken to maintain an updated controls documentation.
Ejaz024 | 6/1/2016 11:06:22 AM | COMMENTS(2)
There is an argument that if changes to a critical production application require development work then some assurance is needed on availability (and even continuity) of the IT development environment used to develop that application. Has anyone come acro...
Phil Green | 6/1/2016 11:03:52 AM | COMMENTS(1)
Exceptions to our defined IT controls are managed in what we call an 'exception library'.  This library lists the specific exceptions associated with specific work requests that have been requested, their status in the approval process and the effect...
Scott7931 | 1/1/2016 12:37:33 PM | COMMENTS(2)
Hope you don't mind me posting in this groupabout this year's ISACA Ireland conference, which is focusing on placingbusiness first. Wewould like this conference to be as successful as last year's, which was trulyinternational with 24 speakers from 12 coun...
Neil_Curran | 6/23/2015 4:33:07 PM | COMMENTS(1)
Hello there and welcome to the community. Here's a little about me. I was born in Abu Dhabi, UAE, grew up in Lahore, Pakistan; and after spending first 6 years of professional life in UAE, I choose to make US my adopted home. So, if there is something c...
Ejaz024 | 5/15/2015 7:05:20 AM | COMMENTS(0)
Hi Everyone, I'm the chapter president of ISACA Ireland and would like to let members of this topic know that we are seeking innovative, practical and / or thought provoking session proposals for our conference on 3rd Oct 2014.  For knowledge center membe...
Neil_Curran | 8/2/2014 12:49:06 PM | COMMENTS(0)

Documents & Publications: 40 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 73 days ago
Books
Posted by ISACA 962 days ago
Research
Posted by ISACA 982 days ago
Downloads
Posted by ISACA 1172 days ago

Events & Online Learning: 4 total

21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.

Journal Articles: 57 total

Volume 4, 2107
by Larry G. Wlosinski, CISA, CRISC, CISM, CAP, CBCP, CCSP, CDP, CIPM, CISSP, ITIL v3, PMP
The root causes of privacy incidents include the outsourcing of data, malicious insiders, system glitches, cyberattacks, and the failure to shred or dispose of privacy data properly.
Volume 4, 2017
by Tolga Mataracioglu, CISA, CISM, COBIT Foundation, BS 25999 LA, CCNA, CEH, ISO 27001 LA, MCP, MCTS, VCP
In this article, the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) ISO/IEC 27001:2013 standard is introduced briefly and compared to ISO/IEC 27001:2005.
Volume 4, 2017
by Sri Mallur
Industrial control systems (ICSs) are changing by relying more on off-the-shelf information technology (IT), thereby exposing these systems to more IT risk.
Volume 3, 2017
by Kurt Kincaid, CISA, Lean Six Sigma Green Belt
What follows is a discussion of the nature of HTTPS, how it should be configured, and how to remotely assess that configuration for oneself, rather than relying on verbal or written attestation from server or application administrators.
Volume 3, 2017
by ISACA | Reviewed by Diana M. Hamono, CISA, CGEIT, COBIT 5 Foundation
This book is a useful resource for those involved in establishing a secure cloud computing environment in their organization.
Volume 1, 2017
by Reviewed by Larry Marks, CISA, CRISC, CISM, CGEIT, CFE, CISSP, CRVPM, CSTE, ITIL, PMP
This short reference book walks through a firm’s governance structure and identifies high-level strategies that have to be considered in the context of the enterprise environment to gain value for application

Wikis: 2 total

Blog Posts: 93 total

With the advancement of technology, many people are engaged on Internet to perform their day to day online activities. One out ofthree people are now planning to conduct and promote their business throughonline, so it has become as a fastest way of commun...
Posted By : Chiranjibi492 | 0 comments
In todays emerging technology the protection of Information is critical. Protection of information means not only the confidential data that the business is stand on but each user who use, modify and share within is keenly important. The definition of con...
Posted By : SHAMU2015 | 0 comments
ProposalI will come straight to the point, every country is now connected to the Internet Of The Thing available to public to access to their personal data, order stuffs, book tickets, book hotel, open bank account, view personal account and play around o...
Posted By : SHAMU2015 | 0 comments
24 Aug 2017
The Mobile Maritime Hub 2009-2050 is an strategic plan that started in 2009, in Vilanova i La Geltrú, a coastal town, to promote maritime, nautical, fishing and scientific activities in a seaside region, by a properly use of the technological tools exist...
Posted By : ramoncod | 0 comments
Recently while reading through various cyber security threat feeds, I ran across a very interesting article describing ways to protect your identity and personal data.  In the article the author discussed "Understanding your data-protection and privacy ri...
Posted By : James948 | 0 comments
22 Jul 2017
Hasta hace pocos años contar con una aplicación de inteligencia de negocios era caro, complejo y necesitabas el apoyo constante del personal de informática para obtener la información precisa. Hoy ya existen herramientas como Power BI Desktop que permiten...
Posted By : Alejandro906 | 0 comments