Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Cloud Computing

Welcome to the Cloud Computing!

Collaborate, contribute, consume and create knowledge around cloud computing topics such as data security, virtualization, authentication, and vendor selection.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
1600 Members
1 Online
15921 Visits

Community Leader

Marc Vael

Marc Vael

Title: Chief Information Security Officer

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 98 total

Must be a Topic member to contribute
View All »
Greetings to All, I wish to move into Cloud Computing eventually ending up in the Security/Architecture area. This is not work related at this stage. It is at my own pace,for my personal self - development. My question to you is what is the most concise...
MAnjay | 11/13/2017 6:13:12 AM | COMMENTS(7)
Traditional means of full packet capture using span ports is not possible on AWS.  My colleague found this paper on SANS Web site:  It says (citation): "Companies using AWS ...
Dragan Pleskonjic | 11/10/2017 5:25:55 AM | COMMENTS(0)
I would like to know thoughts from members using Barracuda Essentials for Office 365. Thanks in advance
DK19 | 11/2/2017 6:03:48 AM | COMMENTS(0)
Good day! I have some thoughts about the feasibility of Cloud Computing audit. Certain controls required auditor to review the SLAs So what if certain clause is not in their SLA. It's too late to change the SLA isn't it. Highlighting the issue is one thin...
Danny Soh | 5/24/2017 10:45:28 AM | COMMENTS(4)
what is the difference between Private, Public and Hybrid cloud? explain with examples.
Ramakrishna593 | 2/22/2017 9:29:52 PM | COMMENTS(5)
Good framework to manage Cloud data and thereby build security policies around it -
Shamik | 2/22/2017 5:38:03 AM | COMMENTS(3)

Documents & Publications: 78 total

Must be a Topic member to contribute
View All »
Posted by ISACA 1805 days ago
Posted by ISACA 1054 days ago
Posted by ISACA 1142 days ago
Posted by ISACA 1147 days ago
Posted by ISACA 1288 days ago

Events & Online Learning: 3 total

13 Aug 2018
ISACA International Event
Nashville, Tennessee, US
2018 GRC Conference - 13-15 August , Nashville, TN. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 65 total

Volume 3, 2018
by Steven J. Ross, CISA, CISSP, MBCP
For information security professionals, the trip from a proprietary data center to a combination of cloud computing, Software as a Service (SaaS), colocation (colo) facilities and managed services is not half the fun.
Volume 2, 2018
by Ray Cheung, CISA, CITP, CPA, Vikas Sharma, CISA and Bhupinder Singh, CISA, CISM, ITIL v3, PMP, QSA
It is no surprise that many enterprises, ranging from early start-ups to mature global enterprises, have considered or implemented a migration to Amazon Web Services’ (AWS) cloud computing services.
Volume 1, 2018
by Aditya K. Sood, Ph.D., and Rehan Jalil
With the robust requirements listed by upcoming regulations, such as GDPR, the importance of a cloud app security solution cannot be ignored.
Volume 5, 2017
by Steven J. Ross, CISA, CISSP, MBCP
This is the dawn of the multi-modal era; data center staff must adjust or be left behind. And so must security professionals.
Volume 5, 2017
by Vasant Raval, DBA, CISA, ACMA, and Don Lux, MSITM
Cloud services have grown dramatically in the recent past and continue to increase in popularity. Between 2015 and 2020, cloud computing is predicted to achieve an annual growth rate of 19 percent.
Volume 3, 2017
by Steven J. Ross, CISA, CISSP, MBCP
At each stage in the evolution of information security, there has been a problem—access control, viruses, hackers, data leakage, to name a few—that has seemed insuperable.

Wikis: 5 total

Blog Posts: 13 total

Information Security and Privacy is hot issue at present time. Number of security breaches is rapidly increasing.  In case of late detection, costs of breaches are skyrocketing. In the same time Artificial Intelligence (AI), Machine Learning (ML) are fast...
Posted By : Dragan Pleskonjic | 0 comments
Let us have positive inspirational slogans for every situation. Last week I started the project meeting like this: I don't know you are all so good at tuning the website. The performance is now is wonderful. I could witness reduction of stress, anxiety an...
Posted By : Jayakumar Sundaram | 1 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
13 Nov 2014
Posted By : masarker | 4 comments
Do you consider moving into the cloud? Cloud customers need assurance that providers are following sound security practices. The importance of the governance and risk management issues related with the move of assets into the cloud computing should be cle...
Posted By : Patrick Soenen | 0 comments
Private, public, community or hybrid cloud computing enables an enterprises’ IT enabled investments to meet business stakeholder requirements, sustain and extend enterprise strategy, create sustainable competitive advantages (unique selling plusses), meas...