Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Big Data

Welcome to the Big Data topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
590 Members
0 Online
7343 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 43 total

Must be a Topic member to contribute
View All »
Is it possible to use crowd-sourced security intelligence to predict future events? For this exercise, experimental web site Security Predictions http://securitypredictions.xyz/ has been built to harness the ‘wisdom of crowds’.  As first experiment, let's...
Dragan Pleskonjic | 11/25/2017 3:12:49 AM | COMMENTS(0)
Any recent success stories ?
M.Lambert | 11/9/2017 1:24:09 PM | COMMENTS(2)
Can anyone recommend some good sources of annotated (labeled) datasets for security tests and ML?
Dragan Pleskonjic | 11/9/2017 1:16:21 PM | COMMENTS(0)
Hi everyone, I'm a new guy to Big Data Community - would kindly ask if where can I find good materials regarding Data Management & Governance, including DAMA standards? Tried searching here in ISACA and other community, but to no avail. Will appreciate...
Sameer848 | 4/4/2017 9:43:39 AM | COMMENTS(0)
Data has been collected by organisation doing so on purpose or others performing such process without realising it. I would like thoughts on what currently organisations are doing with Big Data and how the future is going to look like. How about privac...
DK19 | 1/26/2017 8:54:16 PM | COMMENTS(0)
This is the title of an article in 'The Register'. It looks like the IS industry needs to look back some 30 years and start repeating things. At the time when relational databases were just starting to get accepted the situation was the same, lots of defa...
MarioGB | 12/16/2016 4:59:21 PM | COMMENTS(1)

Documents & Publications: 14 total

Must be a Topic member to contribute
View All »
Posted by ISACA 972 days ago
Posted by ISACA 977 days ago
Posted by ISACA 1161 days ago
building a strong foundation requires more than technology
Posted by JasonY 1196 days ago
An IBM Institute for Business Value Study on the Chief Data Officer.
Posted by Melody 1250 days ago

Events & Online Learning: 1 total

Journal Articles: 24 total

Volume 1, 2018
by Steven J. Ross, CISA, CISSP, MBCP
Managing availability in a multi-modal environment requires a great deal of attention to details, which are being defined by the multi-modal pioneers of our day.
Volume 1, 2018
by Mohammed J. Khan, CISA, CRISC, CIPM
To facilitate and administer the implementation of controls around the subject of big data, one must truly understand the concepts of deidentification, reidentification and anonymization.
Volume 1, 2018
by Adeniyi Akanni, Ph. D., CISA, CRISC, ITIL
This article describes a six-stage cycle of implementing big data in commercial banks, points out the major challenges in implementation and provides a suggested solution.
Volume 6, 2017
by Abdullah Al-Mansour, Security+
The amount of data reviewed has changed the scope of an information security professional from an auditor to a data mining and analytics expert.
Volume 6, 2017
by Guy Pearce
The modern GRC landscape has a significant impact on how an enterprise-scale big data project would be undertaken today.
Volume 6, 2017
by Ravikumar Ramachandran, CISA, CRISC, CISM, CGEIT, COBIT Assessor and Implementer, CAP, CEH, CFA, CFE, CHFI, CIA, CISSP-ISSAP, CRMA, ECSA, FCMA, ITIL Expert and Practitioner, PMP, SSCP
The word “big” in big data should not be confused with sheer size. It is a term given to large data sets containing a variety of data types.

Wikis: 2 total

Blog Posts: 16 total

My personal thoughts after listening to C-level executives at the CxO Roundtable Series sponsored by Intel, IBM, HyTrust & ReedSmith. For an invite, please reach out to me. Data Protection under the GDPR For past few months, I’ve been helping to org...
Posted By : Thomas152 | 1 comments
Information Security and Privacy is hot issue at present time. Number of security breaches is rapidly increasing.  In case of late detection, costs of breaches are skyrocketing. In the same time Artificial Intelligence (AI), Machine Learning (ML) are fast...
Posted By : Dragan Pleskonjic | 0 comments
My previous blog under name "Dragan on Security" was at location: http://conwex.info/blog/. It was active from August 28, 2005 to October 3, 2012. By beginning of 2017 it is moved to new location http://www.dragan-pleskonjic.com/blog/. With possibility to...
Posted By : Dragan Pleskonjic | 0 comments
Senior Manager           ultimate responsibility Information security Officer          functional responsibility Security Analyst           Strategic, develops policies and guidelines Owner         - Responsible for asset         - Determine level of clas...
Posted By : Muhammad554 | 0 comments
“Enterprise architecture is now a strategic componentof every forward-thinking organization around the world.”Source: http://feapo.org/press-release-ea-perspectives-white-paper/ Related Article: Common Perspective on Enterprise Architecture: http://feapo....
Posted By : SA | 1 comments
Let us have positive inspirational slogans for every situation. Last week I started the project meeting like this: I don't know you are all so good at tuning the website. The performance is now is wonderful. I could witness reduction of stress, anxiety an...
Posted By : Jayakumar Sundaram | 1 comments