Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Business Analytics/Intelligence

Welcome to the Business Analytics/Intelligence topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
291 Members
1 Online
7202 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 30 total

Must be a Topic member to contribute
View All »
Has someone faced with the problem that an accounting system does not correctly record/computes the accounting information? for example, balance sheet accounts do not match P&L accounts at year end?If so, can you please provide me some example of root cau...
Alexandra806 | 6/13/2018 5:25:04 AM | COMMENTS(1)
Does anyone have an audit program, know of a BI risk/control framework or have advise on how to audit a BI department?
Terri | 1/5/2018 1:22:34 PM | COMMENTS(4)
Nowadays we have different information sources of cybersecurity threats like: SOC, vulnerability scans, penetration testing, reports from SIEM, etc., and the different formats most of the time don't let us to have a view of everything. BI can help us to f...
Juan350 | 12/13/2017 3:04:14 PM | COMMENTS(1)
I'm starting with this great topic, does anyone suggest to me a BI book.
Juan350 | 11/2/2017 9:33:41 PM | COMMENTS(1)
I have been tasked with developing a sustainable global analytics strategy for a retail Internal Audit shop. Some of the biggest challenges that I have been tasked with overcoming include numerous legacy systems, lack of decentralized data (e.g. SAP or re...
Thomas857 | 5/16/2017 8:12:58 AM | COMMENTS(3)
I recently co-authored an article in the April 2017 issue of the Internal Auditor magazine, called "The Data Museum". In this article we describe how we have managed to maintain operationa...
Jasbir | 5/16/2017 8:03:00 AM | COMMENTS(0)

Documents & Publications: 8 total

Events & Online Learning: 0 total

No Results Found

Journal Articles: 23 total

Volume 4, 2018
by Rama Lingeswara Satyanarayana Tammineedi, CISA, CRISC, CBCP, CISSP, MBCI, PMP
Performance evaluation of an organization’s risk management system ensures the risk management process remains continually relevant to the organization’s business strategies and objectives.
Volume 2, 2018
by Vincent J. Schira, CISA, CIPT, CISSP, CPA, PCI-ISA
Over the last couple of decades, access control technologies and system advances have necessitated rethinking how access certifications are used as a control and at what frequency.
Volume 2, 2018
Until a few years ago, many organizations did not adopt new technologies unless they were proven, stabilized and in use.
Volume 2, 2017
by Mukul Pareek, CISA, ACA, ACMA, PRM
Most security metrics programs are typically based on two assumptions: There is a secure way to manage any system, and the task of security management is to maintain that state.
Volume 1, 2017
by Ed Moyle
Most practitioners are already very accustomed to using technical tools for specific tactical purposes when it comes to security or assurance within their environments.
Volume 1, 2017
Now that senior executives have begun to take a serious interest in cyber and technology risk, it is necessary to provide meaningful and useful answers to the questions they are beginning to ask.

Wikis: 2 total

Blog Posts: 3 total

Must be a Topic member to view blog posts
5 Jun 2018
Recently, I witnessed an interesting webcast by Scopism, an UK-based consulting and training company. They announced the publication of the SIAM(c) Foundation Body of Knowledge, available for free through their website Service Integration...
Posted By : Peter873 | 2 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
On March 1st,  I was invited to speak at the CampIT conference on Enterprise Risk/Security Management at Rosemont Convention Center. Before me there were two speakers. The first presenter spent an hour presenting the story from the trenches of technolog...
Posted By : appolloconsulting | 2 comments