Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Cloud Computing

Welcome to the Cloud Computing!

Collaborate, contribute, consume and create knowledge around cloud computing topics such as data security, virtualization, authentication, and vendor selection.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1223 Members
1 Online
13151 Visits

 Recent Discussions

Community Leader

Marc Vael

Marc Vael

Title: Director Internal Audit & Risk Management

Badge: Influential

ShanShan

ShanShan

Badge: Observer


 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 73 total

Must be a Topic member to contribute
View All »
Hello All, Please share your thoughts, documents, checklists,references on developing an Internal Audit Scope and work program for Cloud from an Cloud service provider view and Auditing services assured to clients of cloud. RegardsDeepak
DeepakChiniwal | 5/19/2015 12:40:29 PM | COMMENTS(3)
should companies that use cloud computing be using cobit 5.0 to build their control framework?
Nathan951 | 5/14/2015 7:37:20 AM | COMMENTS(8)
ISACA members will have the opportunity to vote on approval of the new bylaws beginning 27 April at 9AM CDT (UTC -5 hours) until 6 June at 1AM CDT (UTC -5 hours). Votes can be cast by electronic ballot or by voting in person at the ISACA annual membersh...
Kim091 | 5/4/2015 12:21:07 PM | COMMENTS(1)
Here is an article about Cloud Computing in the latest Journal: http://www.isaca.org/Journal/Past-Issues/2014/Volume-6/Pages/Data-Owners-Responsibilities-When-Migrating-to-the-Cloud.aspx?post=2
JasonY | 2/27/2015 1:18:33 PM | COMMENTS(10)
One of the more controversial questions about the Internet is should it be regulated, and if so, by whom and how. The answers depend on whether a government wants loose or tight control of their citizens since the Internet gives citizens access to the out...
Mahbub Ul585 | 2/5/2015 7:26:12 PM | COMMENTS(5)
We want to move some of the the critical servers to the cloud. which cloud provider do you think is best for databases with clustering.?
nooruddin | 12/15/2014 9:08:48 AM | COMMENTS(14)

Documents & Publications: 94 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 628 days ago
Books
Posted by ISACA 52 days ago
Books
Posted by ISACA 111 days ago
New technologies are pushing networks to the breaking point
Posted by JasonY 217 days ago

Events & Online Learning: 7 total

6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
6 Oct 2014
ISACA International Event
Panama City, Panama
La Conferencia Latinoamericana CACS/ISRM 2014
17 Aug 2015
ISACA International Event
Phoenix, Arizona, US
2015 GRC Conference - August 17-19, Phoenix, AZ. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 43 total

Volume 3, 2015
by Steve Woo
The adoption of cloud-based retail applications, as well as increasing demands for agility, for example, with pop-up retail, is changing the requirements for network access.
Volume 3, 2015
by Andrew Evers
Cloud services deliver many kinds of automation to companies every day. The use of process automation as a cloud-based service is an important next step for IT innovation
Volume 2, 2015
by Larry G. Wlosinski, CISA, CISM, CRISC, CAP, CBCP, CDP, CISSP, ITIL V3
Information security events that affect cloud systems are occurring with no end in sight, so it should be no surprise that the cloud should be treated as a nonsecure environment with numerous threats and concerns.
Volume 1, 2015
by Michael P. Cangemi, CISA (retired), CPA, CGMA
The growth of big data has added to the interest in and need for more continuous monitoring to advance business processes.
Volume 1, 2015
by John Nye, CISA, CISM, CRISC, CISSP
For some organizations, the decision to move to the cloud is both obvious and instant. For others, cloud solutions represent intolerable risk.
Volume 6, 2014
by Ed Gelbstein, Ph.D., and Viktor Polic, CISA, CRISC, CISSP
Understanding who owns data is not as simple as it appears at first. It is easy to say that all data belong to the organization.

Wikis: 5 total

Blog Posts: 11 total

Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
13 Nov 2014
Posted By : masarker | 4 comments
Do you consider moving into the cloud? Cloud customers need assurance that providers are following sound security practices. The importance of the governance and risk management issues related with the move of assets into the cloud computing should be cle...
Posted By : Patrick Soenen | 0 comments
Private, public, community or hybrid cloud computing enables an enterprises’ IT enabled investments to meet business stakeholder requirements, sustain and extend enterprise strategy, create sustainable competitive advantages (unique selling plusses), meas...
Just curious to know or have some insight for Cloud Computing and how does it align with ISACA stanadards.
Posted By : Phani Sastry | 0 comments
Hola, por ahi les comentaré un artículo que encontré de "Garvin W.Burris" que habla HPC basada en la nube. StartCluster es un proyecto del Massachusetts Institute of Technology (MIT) elaborado por Software Tools for Academics and Researchers (STAR), el Ki...
Posted By : ArthurHuamani | 0 comments