Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

CyberSecurity

Share knowledge about CyberSecurity with other ISACA members and idenfity and discuss issues that need more guidance from ISACA. Collaborate, make connections and learn how to keep your organization safe from Cyber risks.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1753 Members
3 Online
13629 Visits

 Recent Discussions

Insiders attack in Cyber Security. Posted by Pulkit786.
Cyber Security Books. Posted by Shamik.
Complex passwords V/S Multi-step Authentication. Posted by Pulkit786.

Community Leader

Eder L. Marques

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 50 total

Must be a Topic member to contribute
View All »
Hi all, So, we are hearing this serious issue of an internal threat to organisations that are being executed by their own employees, deliberately or unintentionally. Companies, specially SMEs, are still not taking this issue seriously and with so many APT...
Pulkit786 | 8/30/2014 12:00:27 PM | COMMENTS(53)
Came across this Book -- Business Professionals - lawyers, accountants and others - all have to respond to cyber risk.http://www.itsmfusa-online-store.com/p-141-cyber-risks-for-business-professionals-a-management-guide.aspx Anyone reviewed this book ? Tha...
Shamik | 8/27/2014 10:21:21 AM | COMMENTS(10)
So, I read this article on secuityweekly.com. According to a study by Trustwave, complex passwords, such as the combination of symbols and characters can be cracked without any hassle. They did a pratical research on millions of passwords and were able to...
Pulkit786 | 8/26/2014 10:36:12 AM | COMMENTS(28)
Dear all, I would like to welcome our 10 new members: Howard013 Uthmansa Martyp001 OMAR389 Joke Fong Lilia483 Russ757 jhstockman Nuwan Karsten Speckmann To better know each other, would you guys feel confortable to write a short introduction about yours...
Eder L. Marques | 8/25/2014 8:12:20 AM | COMMENTS(18)
As the new Cybersecurity exam is coming up, testing area's will be: 1) cybersecurity architecture principles, 2) cybersecurity of networks, systems, applications and data, 3) incident responsed 4) the cybersecurity implications of the adoption of...
Patric Versteeg | 8/15/2014 12:04:35 PM | COMMENTS(19)
Hi Everyone, I'm the chapter president of ISACA Ireland and would like to let members of this topic know that we are seeking innovative, practical and / or thought provoking session proposals for our conference on 3rd Oct 2014.  For knowledge center membe...
Neil_Curran | 8/7/2014 4:37:59 PM | COMMENTS(2)

Documents & Publications: 52 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 8 days ago
Downloads
Posted by ISACA 8 days ago
Downloads
Posted by ISACA 8 days ago
Downloads
Posted by ISACA 8 days ago
Downloads
Posted by ISACA 12 days ago

Events & Online Learning: 2 total

Journal Articles: 49 total

Volume 4, 2014
by Steven J. Ross, CISA, CISSP, MBCP
The time has come to accept that cyberattacks are a global reality—malicious forces in the world have gone beyond vandalism toward institutionalized espionage, sabotage and crime.
Volume 3, 2014
by Nikos Virvilis, CISA, CISSP, GPEN, Oscar Serrano, CISA, CISM, CISSP, and Luc Dandurand
The major players in today’s cyberconflicts are well organized and heavily funded teams with specific goals and objectives, some of which are working under a state umbrella.
Volume 3, 2014
by Steven J. Ross, CISA, CISSP, MBCP
The issue is no longer whether cyberattacks occur, but what to do about them.
Volume 2, 2014
by Jide Olakunle, CISA, CISM, CISSP
Cyberattacks and the resulting security breaches are part of the rapidly expanding security threats organizations face.
Volume 2, 2014
by Tommie Singleton, CISA, CGEIT, CPA
Entities that maintain large databases of individuals and their PII should be prepared for a data breach by doing due diligence, as defined by cybersecurity professionals.
Volume 1, 2014
by Steven J. Ross, CISA, CISSP, MBCP
Sadly, cyberthreats are a part of business life in the 21st century.

Wikis: 2 total

Blog Posts: 10 total

  Rob Stroud is the New York based Vice President of Strategy and Innovation at CA Technologies and is the current President for the 2014-15 administrative term.  I caught up with Rob in Australia when he...
Posted By : Rob Hanson | 1 comments
19 Jun 2014
Posted By : masarker | 2 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
(By: William Darío Ávila Díaz, PhD)A new tool to combat Internet crime is now a reality thanks to an agreement signed by thirty countries, where they commit to the creation of international legislation attached to the local laws of each of the nations. Th...
Posted By : William733 | 2 comments
(By: William Darío Ávila Díaz, PhD) Colombia is the first Latin American country to adopt cyberspace strategy to prevent and tackle crime and minimize the risk level of citizens from threats or incidents of cyber nature. This is why they were created th...
Posted By : William733 | 0 comments
(By: William Darío Ávila Díaz, PhD) Situation: [1]On September 21, 2011, the website of the House of Representatives of the Republic of Colombia, was attacked by the "Colectivo Nacional Anonymous", who kept for several hours off duty. The engineers of ...
Posted By : William733 | 0 comments