Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Cloud Computing

Welcome to the Cloud Computing!

Collaborate, contribute, consume and create knowledge around cloud computing topics such as data security, virtualization, authentication, and vendor selection.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1504 Members
0 Online
15157 Visits

Community Leader

Marc Vael

Marc Vael

Title: Chief Audit Executive

Badge: Energizer


 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 95 total

Must be a Topic member to contribute
View All »
Good day! I have some thoughts about the feasibility of Cloud Computing audit. Certain controls required auditor to review the SLAs So what if certain clause is not in their SLA. It's too late to change the SLA isn't it. Highlighting the issue is one thin...
Danny Soh | 5/24/2017 10:45:28 AM | COMMENTS(4)
what is the difference between Private, Public and Hybrid cloud? explain with examples.
Ramakrishna593 | 2/22/2017 9:29:52 PM | COMMENTS(5)
Good framework to manage Cloud data and thereby build security policies around it - https://www.securosis.com/blog/data-security-lifecycle-2.0
Shamik | 2/22/2017 5:38:03 AM | COMMENTS(3)
Pretty comprehensive database : https://paasfinder.org/filter Wish there were similar websites for IssS and SaaS.
Shamik | 1/25/2017 7:09:32 PM | COMMENTS(1)
To control cost, organization ( esp. small ones ) are actively considering hosting in Public Cloud.   Useful article on this topic - http://www.cloud-council.org/deliverables/migrating-applications-to-public-cloud-services-roadmap-for-success.htm
Shamik | 12/8/2016 10:08:48 AM | COMMENTS(0)
Considering IoTs will increase by billions and thereby increase security risks, a good way to mitigate it is a Sound Cloud Architecture for IoTs.  Check out - http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-iot.htm
Shamik | 12/8/2016 10:05:33 AM | COMMENTS(0)

Documents & Publications: 79 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 1361 days ago
Posted by ISACA 610 days ago
Posted by ISACA 698 days ago
Posted by ISACA 703 days ago

Events & Online Learning: 7 total

21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.

Journal Articles: 59 total

Volume 3, 2017
by Sunil Bakshi, CISA, CRISC, CISM, CGEIT, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP
What are threats associated with the use of the Internet of Things (IoT) and what approach should one have in implementing security for IoT?
Volume 3, 2017
by Steven J. Ross, CISA, CISSP, MBCP
At each stage in the evolution of information security, there has been a problem—access control, viruses, hackers, data leakage, to name a few—that has seemed insuperable.
Volume 3, 2017
by ISACA | Reviewed by Diana Hamono
The book is a useful resource for managers in all parts of an organization that is considering transitioning some, or all, of its current IT services onto cloud-based services and who want to understand the security implications of doing so.
Volume 2, 2017
by Awais Ahmed, CISA, CIA
In addition to broadband services, developing countries are also embracing innovations such as cloud computing to improve business and service deliveries in different areas.
Volume 1, 2017
by Cheryl Ritts, MSIS
Many enterprises are quick to leap into cloud relationships. Very often, they do so without any analysis—formal or informal—of the value they expect to get in return.
Volume 6, 2016
by Reviewed by Sunil Bakshi, CISA, CGEIT, CISM, CRISC, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP
The increased use of outsourcing arrangements and the acceptance of cloud computing models has benefits and associated risk.

Wikis: 5 total

Blog Posts: 12 total

Let us have positive inspirational slogans for every situation. Last week I started the project meeting like this: I don't know you are all so good at tuning the website. The performance is now is wonderful. I could witness reduction of stress, anxiety an...
Posted By : Jayakumar Sundaram | 1 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
13 Nov 2014
Posted By : masarker | 4 comments
Do you consider moving into the cloud? Cloud customers need assurance that providers are following sound security practices. The importance of the governance and risk management issues related with the move of assets into the cloud computing should be cle...
Posted By : Patrick Soenen | 0 comments
Private, public, community or hybrid cloud computing enables an enterprises’ IT enabled investments to meet business stakeholder requirements, sustain and extend enterprise strategy, create sustainable competitive advantages (unique selling plusses), meas...
Just curious to know or have some insight for Cloud Computing and how does it align with ISACA stanadards.
Posted By : Phani Sastry | 0 comments