Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Cloud Computing

Welcome to the Cloud Computing!

Collaborate, contribute, consume and create knowledge around cloud computing topics such as data security, virtualization, authentication, and vendor selection.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
1387 Members
2 Online
14438 Visits

Community Leader

Marc Vael

Marc Vael

Title: Chief Audit Executive

Badge: Influential


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 88 total

Must be a Topic member to contribute
View All »
Am looking for a framework or methodology to conduct a cloud security risk assessment for a company. Not looking to assess the cloud vendor, but to assess how the company is using the cloud and make sure what they are doing is secure and risk aware. We wi...
Michael137 | 5/20/2016 2:21:51 AM | COMMENTS(9)
The most popular cloud service out there is SaaS. You can easily find information about it.   However, what about Network as a Service? where can I find more information, and what are the risk of such service? vs. IaaS or PaaS. 
ShanShan | 5/11/2016 10:09:50 AM | COMMENTS(2)
In a recent news article, Microsoft and IBM are increasing its prices for the cloud computing services after years of competitive price cutting. So, what will this mean for the cloud business case? Will you change because monthly prices increase?  What wi...
Marc Vael | 2/16/2016 10:36:54 AM | COMMENTS(4)
The European Commission and the United States have agreed on a new framework for transatlantic data flows: the EU-US Privacy Shield.Today, the College of Commissioners approved the political agreement reached and has mandated Vice-President Ansip and Comm...
Kresimir_Kristic | 2/10/2016 10:06:57 AM | COMMENTS(1)
European Commission Cloud Computing Strategy Key Action Nr. 1 "Cutting through the jungle of standards" results with ENISA documents and on-line toolsCCSL - Cloud Certification Scheme List andCCSM - Cloud Certification Schemes Metaframework.The main idea ...
Kresimir_Kristic | 2/5/2016 5:34:13 AM | COMMENTS(2)
What do you think about this move? Will more company adopt this idea? Better?
ShanShan | 1/4/2016 4:08:51 PM | COMMENTS(2)

Documents & Publications: 94 total

Must be a Topic member to contribute
View All »
Posted by ISACA 1026 days ago
Posted by ISACA 275 days ago
Posted by ISACA 354 days ago

Events & Online Learning: 7 total

21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.

Journal Articles: 51 total

Volume 3, 2016
by Davi Ottenheimer and Matthew Wallace | Reviewed by A. Krista Kivisild, CISA, CA, CPA
This book is aimed at anyone with an interest in security and compliance in virtualized and cloud environments—appealing to both technical and nontechnical readers.
Volume 2, 2016
by Ganapathi Subramaniam
My company uses a cloud-based email service provider for corporate email. The same vendor also provides storage space for all the employees to store data.
Volume 6, 2015
by Angelique Schouten
Cloud technology helps SMEs run and coordinate large external workforces, support operational management, and enable the building of new developments to ensure that they stay up to speed and futureproof within their markets.
Volume 5, 2015
by Ben Halpert | Reviewed by Larry Marks, CISA, CISM, CGEIT, CRISC, CFE, CISSP, CSTE, ITIL, PMP
The book provides an overview of cloud deployment models and other cloud concepts so that the reader has a proper foundation on cloud basics.
Volume 5, 2015
by Omar Y. Sharkasi, CBCP, CFE, CRP
IT leaders must increase cybersecurity public awareness and coordination across the subset of federal governments, all while having to do more with less.
Volume 4, 2015
by Siva Mandalam and Rohan Dighe
ViralMint is an onsite marketing platform that helps retailers harness social media marketing to boost their marketing return on investment (ROI): acquire new fans, increase sales, improve conversion and boost engagement.

Wikis: 5 total

Blog Posts: 12 total

Let us have positive inspirational slogans for every situation. Last week I started the project meeting like this: I don't know you are all so good at tuning the website. The performance is now is wonderful. I could witness reduction of stress, anxiety an...
Posted By : Jayakumar Sundaram | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
13 Nov 2014
Posted By : masarker | 4 comments
Do you consider moving into the cloud? Cloud customers need assurance that providers are following sound security practices. The importance of the governance and risk management issues related with the move of assets into the cloud computing should be cle...
Posted By : Patrick Soenen | 0 comments
Private, public, community or hybrid cloud computing enables an enterprises’ IT enabled investments to meet business stakeholder requirements, sustain and extend enterprise strategy, create sustainable competitive advantages (unique selling plusses), meas...
Just curious to know or have some insight for Cloud Computing and how does it align with ISACA stanadards.
Posted By : Phani Sastry | 0 comments