Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Business Analytics/Intelligence

Welcome to the Business Analytics/Intelligence topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
265 Members
1 Online
6836 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 26 total

Must be a Topic member to contribute
View All »
I have been tasked with developing a sustainable global analytics strategy for a retail Internal Audit shop. Some of the biggest challenges that I have been tasked with overcoming include numerous legacy systems, lack of decentralized data (e.g. SAP or re...
Thomas857 | 5/16/2017 8:12:58 AM | COMMENTS(3)
I recently co-authored an article in the April 2017 issue of the Internal Auditor magazine, called "The Data Museum". https://iaonline.theiia.org/2017/Pages/The-Data-Museum.aspx In this article we describe how we have managed to maintain operationa...
Jasbir | 5/16/2017 8:03:00 AM | COMMENTS(0)
I recently co-authored an article in the April 2017 issue of the Internal Auditor magazine, called "The Data Museum". https://iaonline.theiia.org/2017/Pages/The-Data-Museum.aspx. In this article we describe how we have managed to maintain operation...
Jasbir | 5/16/2017 7:59:07 AM | COMMENTS(0)
We are planning to implement ACL in our Internal Audit department.Did any one already implemented the ACL analysis tools??
ELSHAFIE | 9/19/2015 6:22:51 PM | COMMENTS(2)
Hopeyou don't mind me posting in this group about this year's ISACA Irelandconference, which is focusing on placing business first. Wewould like this conference to be as successful as last year's, which was trulyinternational with 24 speakers from 12 coun...
Neil_Curran | 6/17/2015 4:03:08 AM | COMMENTS(1)
What skills are necessary for business analytics/intelligence?  How would you define these skills?
mpodemski | 5/25/2015 9:34:25 AM | COMMENTS(2)

Documents & Publications: 8 total

Events & Online Learning: 0 total

No Results Found

Journal Articles: 20 total

Volume 2, 2017
by Mukul Pareek, CISA, ACA, ACMA, PRM
Most security metrics programs are typically based on two assumptions: There is a secure way to manage any system, and the task of security management is to maintain that state.
Volume 1, 2017
by Jack Jones, CISA, CRISC, CISM, CISSP
Now that senior executives have begun to take a serious interest in cyber and technology risk, it is necessary to provide meaningful and useful answers to the questions they are beginning to ask.
Volume 1, 2017
by Ed Moyle
Most practitioners are already very accustomed to using technical tools for specific tactical purposes when it comes to security or assurance within their environments.
Volume 6, 2016
by Sunil Bakshi, CISA, CGEIT, CISM, CRISC, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP
During the past 30 years, enterprises have been embracing new methods to transform their operations to use IT and related technology to provide a higher level of customer service.
Volume 2, 2016
by Shubhamangala B. R. and Snehanshu Saha, Ph.D.
Why are breaches continuing despite deploying cutting-edge solutions supported by compliance to thwart the attacks?
Volume 1, 2016
by C. Warren Axelrod, Ph.D., CISM, CISSP
Information security professionals continue to struggle with acquiring and understanding the most relevant and useful data in order to anticipate threats, guard against attacks and determine forensically what happened after a hack occurs.

Wikis: 2 total

Blog Posts: 2 total

Must be a Topic member to view blog posts
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
On March 1st,  I was invited to speak at the CampIT conference on Enterprise Risk/Security Management at Rosemont Convention Center. Before me there were two speakers. The first presenter spent an hour presenting the story from the trenches of technolog...
Posted By : appolloconsulting | 2 comments