Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Business Analytics/Intelligence

Welcome to the Business Analytics/Intelligence topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
269 Members
0 Online
6930 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 28 total

Must be a Topic member to contribute
View All »
I'm starting with this great topic, does anyone suggest to me a BI book.
Juan350 | 11/2/2017 9:33:41 PM | COMMENTS(1)
Nowadays we have different information sources of cybersecurity threats like: SOC, vulnerability scans, penetration testing, reports from SIEM, etc., and the different formats most of the time don't let us to have a view of everything. BI can help us to f...
Juan350 | 10/30/2017 2:42:52 PM | COMMENTS(0)
I have been tasked with developing a sustainable global analytics strategy for a retail Internal Audit shop. Some of the biggest challenges that I have been tasked with overcoming include numerous legacy systems, lack of decentralized data (e.g. SAP or re...
Thomas857 | 5/16/2017 8:12:58 AM | COMMENTS(3)
I recently co-authored an article in the April 2017 issue of the Internal Auditor magazine, called "The Data Museum". In this article we describe how we have managed to maintain operationa...
Jasbir | 5/16/2017 8:03:00 AM | COMMENTS(0)
I recently co-authored an article in the April 2017 issue of the Internal Auditor magazine, called "The Data Museum". In this article we describe how we have managed to maintain operation...
Jasbir | 5/16/2017 7:59:07 AM | COMMENTS(0)
We are planning to implement ACL in our Internal Audit department.Did any one already implemented the ACL analysis tools??
ELSHAFIE | 9/19/2015 6:22:51 PM | COMMENTS(2)

Documents & Publications: 8 total

Events & Online Learning: 0 total

No Results Found

Journal Articles: 20 total

Volume 2, 2017
by Mukul Pareek, CISA, ACA, ACMA, PRM
Most security metrics programs are typically based on two assumptions: There is a secure way to manage any system, and the task of security management is to maintain that state.
Volume 1, 2017
by Ed Moyle
Most practitioners are already very accustomed to using technical tools for specific tactical purposes when it comes to security or assurance within their environments.
Volume 1, 2017
Now that senior executives have begun to take a serious interest in cyber and technology risk, it is necessary to provide meaningful and useful answers to the questions they are beginning to ask.
Volume 6, 2016
During the past 30 years, enterprises have been embracing new methods to transform their operations to use IT and related technology to provide a higher level of customer service.
Volume 2, 2016
by Shubhamangala B. R. and Snehanshu Saha, Ph.D.
Why are breaches continuing despite deploying cutting-edge solutions supported by compliance to thwart the attacks?
Volume 1, 2016
by C. Warren Axelrod, Ph.D., CISM, CISSP
Information security professionals continue to struggle with acquiring and understanding the most relevant and useful data in order to anticipate threats, guard against attacks and determine forensically what happened after a hack occurs.

Wikis: 2 total

Blog Posts: 3 total

Must be a Topic member to view blog posts
28 Sep 2017
Recently, I witnessed an interesting webcast by Scopism, an UK-based consulting and training company. They announced the publication of the SIAM(c) Foundation Body of Knowledge, available for free through their website Service Integration...
Posted By : Peter873 | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
On March 1st,  I was invited to speak at the CampIT conference on Enterprise Risk/Security Management at Rosemont Convention Center. Before me there were two speakers. The first presenter spent an hour presenting the story from the trenches of technolog...
Posted By : appolloconsulting | 2 comments