Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Application Controls

Welcome to the Application Controls topic!

Collaborate, contribute, consume and create knowledge around the design, implementation, and testing of application controls used within or between various IT systems.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
513 Members
1 Online
9665 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 26 total

Must be a Topic member to contribute
View All »
Wanted some other opinions on this. I'm still fairly new to the security field and wanted to gauge this question. Scenario: We purchased some software through a vendor.  My DBA is working with the vendor and the supplier of the actual product. Software/ a...
Steven512 | 5/18/2018 6:39:07 AM | COMMENTS(1)
Hi Do assist on how to perform data analysis on Trial Balance and Journal as substantive tests on application controls. Specific areas to check
Junior.S | 4/16/2018 3:51:55 PM | COMMENTS(2)
Why do we need to officially document application controls in our controls library? I ask as I've heard a case they should be known but not included in any official controls library as the effectivness of ITGCs are enough to ensure the application fu...
mkonon001 | 3/20/2018 11:20:19 AM | COMMENTS(2)
A comprehensive evaluation of “the six (SCA) providers that matter most and how they stack up,” the The Forrester Wave™: Software Composition Analysis, Q1 2017 assesses the current state of the software composition analysis market and provides in-depth an...
Dragan Pleskonjic | 11/29/2017 7:08:03 AM | COMMENTS(0)
Almost every time I try to log in MyISACA web site, on first attempt I receive this error:  "There was an error trying to authenticate the user." Second attempt is always successful (same username and password both times). Browser is Mozilla Firefox.  Doe...
Dragan Pleskonjic | 11/9/2017 4:25:12 PM | COMMENTS(0)
Hi!Could anyone send me the App Control document? the page is not available. I would really apreciate that
Itzell720 | 10/9/2017 12:23:24 PM | COMMENTS(1)

Documents & Publications: 6 total

Must be a Topic member to contribute
A very good overview published in ISACA's Journal back in 2002, and still relevent today.
Posted by Richard Fowler 2408 days ago
Implement a systematic approach to security in mobile application development with help from this practical guide that also features case studies, code examples and best practices.
Posted by ISACA 2542 days ago
The IIA has a series of documents called Global Technology Audit Guides ("GTAG"). Although ISACA and the IIA are related organizations, some documents are still for members only. I hope I can still share this overview, however.
Posted by Richard Fowler 2667 days ago

Events & Online Learning: 0 total

No Results Found

Journal Articles: 8 total

Volume 5, 2015
by Jason Woods, William Brown, Harry Howe | Reviewed by A. Krista Kivisild, CISA, CA, CPA
How can security professionals evaluate the magnitude of risk and communicate it appropriately to businesses so that they can factor this into their decision making?
Volume 3, 2015
by Andrew Evers
Cloud services deliver many kinds of automation to companies every day. The use of process automation as a cloud-based service is an important next step for IT innovation
Volume 5, 2014
by Biswajit Mohapatra, Vinay Parisa and Joydipto Banerjee
The convergence of social, mobile, analytics and cloud (SMAC) has created a significant change in the value that enterprise applications can provide to business.
Volume 3, 2013
by Dan Bogdanov, Ph.D., and Aivo Kalu, Ph.D., CISA
A cloud is a remote-access platform; thus, technical controls that remotely enforce a particular security policy are especially efficient.
Volume 3, 2013
by Tommie Singleton, CISA, CGEIT, CPA
Every time an IT auditor engages in an IT audit/assurance project, at least one person reviews the work.
Volume 1, 2013
by Pascal A. Bizarro, Ph.D., CISA, Andy Garcia, Ph.D., CPA and Jacob Nix
Risk exists with the implementation of personal mobile devices in business, but with risk comes reward.

Wikis: 2 total

Blog Posts: 11 total

Have you experienced ransomware attack so far and, if yes, what did you do to resolve? I set up Twitter poll here: It lasts for seven days. Thank you for taking part in the poll.
Posted By : Dragan Pleskonjic | 5 comments
Information Security and Privacy is hot issue at present time. Number of security breaches is rapidly increasing.  In case of late detection, costs of breaches are skyrocketing. In the same time Artificial Intelligence (AI), Machine Learning (ML) are fast...
Posted By : Dragan Pleskonjic | 0 comments
My previous blog under name "Dragan on Security" was at location: It was active from August 28, 2005 to October 3, 2012. By beginning of 2017 it is moved to new location With possibility to...
Posted By : Dragan Pleskonjic | 0 comments
Let us have positive inspirational slogans for every situation. Last week I started the project meeting like this: I don't know you are all so good at tuning the website. The performance is now is wonderful. I could witness reduction of stress, anxiety an...
Posted By : Jayakumar Sundaram | 1 comments
The perception of time passing is a funny thing. It only seems like yesterday that I was still a child and the summer holiday seemed to last a lifetime. And now, here I am somewhat surprised that my complement of fingers and toes are no longer enough to c...
Posted By : martin.oneal | 0 comments
A recent publication in a local newspaper, indicated that an employee was charged with fraud with regards to claims of insurance payments that were lodged with the company were paid out to people who were not entitled to receive such payments. What potent...
Posted By : Paulina.PNI | 2 comments