Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Cloud Computing

Welcome to the Cloud Computing!

Collaborate, contribute, consume and create knowledge around cloud computing topics such as data security, virtualization, authentication, and vendor selection.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
1497 Members
0 Online
15096 Visits

Community Leader

Marc Vael

Marc Vael

Title: Chief Audit Executive

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 95 total

Must be a Topic member to contribute
View All »
Good day! I have some thoughts about the feasibility of Cloud Computing audit. Certain controls required auditor to review the SLAs So what if certain clause is not in their SLA. It's too late to change the SLA isn't it. Highlighting the issue is one thin...
Danny Soh | 4/7/2017 1:39:43 AM | COMMENTS(3)
what is the difference between Private, Public and Hybrid cloud? explain with examples.
Ramakrishna593 | 2/22/2017 9:29:52 PM | COMMENTS(5)
Good framework to manage Cloud data and thereby build security policies around it -
Shamik | 2/22/2017 5:38:03 AM | COMMENTS(3)
Pretty comprehensive database : Wish there were similar websites for IssS and SaaS.
Shamik | 1/25/2017 7:09:32 PM | COMMENTS(1)
To control cost, organization ( esp. small ones ) are actively considering hosting in Public Cloud.   Useful article on this topic -
Shamik | 12/8/2016 10:08:48 AM | COMMENTS(0)
Considering IoTs will increase by billions and thereby increase security risks, a good way to mitigate it is a Sound Cloud Architecture for IoTs.  Check out -
Shamik | 12/8/2016 10:05:33 AM | COMMENTS(0)

Documents & Publications: 79 total

Must be a Topic member to contribute
View All »
Posted by ISACA 1331 days ago
Posted by ISACA 580 days ago
Posted by ISACA 668 days ago
Posted by ISACA 673 days ago

Events & Online Learning: 6 total

21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.
16 Aug 2017
ISACA International Event
Grapevine, Texas, US
2017 GRC Conference - 16-18 August , Grapevine, TX. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 56 total

Volume 2, 2017
by Awais Ahmed, CISA, CIA
In addition to broadband services, developing countries are also embracing innovations such as cloud computing to improve business and service deliveries in different areas.
Volume 1, 2017
by Cheryl Ritts, MSIS
Many enterprises are quick to leap into cloud relationships. Very often, they do so without any analysis—formal or informal—of the value they expect to get in return.
Volume 6, 2016
by Reviewed by Sunil Bakshi, CISA, CGEIT, CISM, CRISC, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP
The increased use of outsourcing arrangements and the acceptance of cloud computing models has benefits and associated risk.
Volume 4, 2016
by Aditya K. Sood, Ph.D., and Michael Rinehart, Ph.D.
There is no doubt that data science can be used as a core technology to secure and strengthen cloud applications by implementing algorithms that can detect threats through large-scale data mining.
Volume 4, 2016
by Phil Zongo
This article provides some practical recommendations to address three key areas of risk associated with cloud adoption.
Volume 3, 2016
by Davi Ottenheimer and Matthew Wallace | Reviewed by A. Krista Kivisild, CISA, CA, CPA
This book is aimed at anyone with an interest in security and compliance in virtualized and cloud environments—appealing to both technical and nontechnical readers.

Wikis: 5 total

Blog Posts: 12 total

Let us have positive inspirational slogans for every situation. Last week I started the project meeting like this: I don't know you are all so good at tuning the website. The performance is now is wonderful. I could witness reduction of stress, anxiety an...
Posted By : Jayakumar Sundaram | 1 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
13 Nov 2014
Posted By : masarker | 4 comments
Do you consider moving into the cloud? Cloud customers need assurance that providers are following sound security practices. The importance of the governance and risk management issues related with the move of assets into the cloud computing should be cle...
Posted By : Patrick Soenen | 0 comments
Private, public, community or hybrid cloud computing enables an enterprises’ IT enabled investments to meet business stakeholder requirements, sustain and extend enterprise strategy, create sustainable competitive advantages (unique selling plusses), meas...
Just curious to know or have some insight for Cloud Computing and how does it align with ISACA stanadards.
Posted By : Phani Sastry | 0 comments