Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

CyberSecurity

Share knowledge about CyberSecurity with other ISACA members and idenfity and discuss issues that need more guidance from ISACA. Collaborate, make connections and learn how to keep your organization safe from Cyber risks.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
2479 Members
8 Online
18453 Visits

Community Leader

M.Lambert

M.Lambert

Badge: Energizer

Melody

Melody

Title: Service Area Manager / Senior Managing Consultant

Badge: Observer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 141 total

Must be a Topic member to contribute
View All »
These hackers have taken it to another level http://money.cnn.com/2015/07/21/technology/chrysler-hack/index.html?iid=SF_LN
CAROLYN892 | 7/31/2015 12:49:40 AM | COMMENTS(3)
As the Internet of Things (IoT) promulgates throughout the healthcare industry, one thing is abundantly clear: many providers are not prepared to securely manage the data. Fifty-six percent of acute care providers have adopted, or will adopt in the next 1...
David Scott | 7/30/2015 11:32:03 AM | COMMENTS(0)
Full article is titled: Protectingyourself against cyber attacks How vulnerable is your data? http://www.thecommunityvoice.com/article.php?id=10258What are your thoughts ?
M.Lambert | 7/28/2015 10:18:29 AM | COMMENTS(0)
Good info : HP Security Research: Cyber Risk Report - http://www.databreachtoday.com/whitepapers/hp-security-research-cyber-risk-report-w-1408 Cisco Annual Security Report (CASR) - http://www.databreachtoday.com/whitepapers/cisco-annual-security-report-ca...
Shamik | 7/22/2015 5:12:59 PM | COMMENTS(1)
Worth reviewing :- http://www.msn.com/en-us/news/connectedworld/the-biggest-hacks-in-digital-history/ss-AAdhI2f Thanks
Shamik | 7/21/2015 3:33:08 PM | COMMENTS(1)
While I have little sympathy for the folks involved because of the purpose of this "cheating" dating website, it still shows how personal information/reputation can be held for Ransom ! - http://money.cnn.com/2015/07/20/technology/ashley-madison-hack/inde...
Shamik | 7/20/2015 9:25:08 AM | COMMENTS(0)

Documents & Publications: 73 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 22 days ago
Posted by ISACA 31 days ago
Posted by ISACA 36 days ago
Posted by ISACA 36 days ago

Events & Online Learning: 4 total

Journal Articles: 70 total

Volume 4, 2015
by Steve Schroeder | Reviewed by A. Krista Kivisild, CISA, CA, CPA
The Lure is an interesting jaunt through computer crime and hacking history in the US. This book entertains as well as educates the reader.
Volume 4, 2015
by Dipti Patel, CISA, CISM, ISO 27001 LA, ITIL V3
Vendor risk management is the next step to elevate information security from a technical control process to an effective management process.
Volume 3, 2015
by Roberto Puricelli, CISM
In recent years, numerous cases of advanced persistent threats (APTs) and data breaches have been seen, with those involving the largest, most high-profile enterprises garnering the most media attention.
Volume 3, 2015
by Steven J. Ross, CISA, CISSP, MBCP
Every now and again, I like to take a poke at standards, just to see what makes them work. Under consideration here is the cybersecurity framework published by the US National Institute of Standards and Technology early in 2014.
Volume 3, 2015
by MacDonnell Ulsch | Reviewed by Maria Patricia Prandini, CISA, CRISC
Cyberthreats are changing the way business, government, health, diplomatic, military, economic and even private issues are managed.
Volume 2, 2015
by Steven J. Ross, CISA, CISSP, MBCP
I did a Google search on the word cyber and was told there are 467 million references to that term.

Wikis: 2 total

Blog Posts: 17 total

Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments
  Rob Stroud is the New York based Vice President of Strategy and Innovation at CA Technologies and is the current President for the 2014-15 administrative term.  I caught up with Rob in Australia when he visited Canberra in June 2014...
Posted By : Rob Hanson | 2 comments
I saw Garry at the Sydney Chapter’s successful Strategic Planning event in July 2014.  He was animated and gregarious during the evening’s cocktail event and it felt good to see him again and catch...
Posted By : Rob Hanson | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
Having been associated with the BS 7799 from its introduction as a Security Standard, and as a Contributor to the ISO 27001, and the last and final Chair of the ISO 27001 at the Department of Trade and Industry (DTI) I have been a long term supporter, and...
Posted By : John379 | 0 comments
and Become More Secure As a penetration tester I find it TOO EASY to fully compromise an internal network – without finding a single “vulnerability”! I spend most of my time on two types of engagements — PCI projects and penetration tests. The pen test...
Posted By : Stewart141 | 0 comments