Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.


Share knowledge about CyberSecurity with other ISACA members and idenfity and discuss issues that need more guidance from ISACA. Collaborate, make connections and learn how to keep your organization safe from Cyber risks.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
2519 Members
3 Online
18795 Visits

Community Leader



Badge: Energizer



Title: Service Area Manager / Senior Managing Consultant

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 150 total

Must be a Topic member to contribute
View All »
This article suggest that you not only need to align with best practices bus must be in a position to prove it. What are your thoughts? Read more:
M.Lambert | 9/2/2015 8:01:08 PM | COMMENTS(2)
Question: is this the way to go? Read article "JPMorgan hires former Army chief of staff as part of cyber push" at: And shar...
M.Lambert | 8/28/2015 11:39:04 AM | COMMENTS(9)
Obtain your copy at: Share your comments here
M.Lambert | 8/21/2015 1:42:25 PM | COMMENTS(2)
1- A $32 device that unlocks cars, opens garage doors; 2- Hackers can manipulate death records fairly easily; 3- Hacker uses digital tech to destroy chemical barrel; 4- Breaking into a Brink’s safe takes 60 seconds; 5- Hackers can break out of house a...
M.Lambert | 8/20/2015 2:24:49 PM | COMMENTS(4)
Hi Everyone, First of all I would like to WELCOME any new members just joining the Cybersecurity Group for the first time. This is intended to be a discussion area for new folks just joining the Cybersecurity Group for the first time. Please feel free to ...
Melody | 8/17/2015 1:34:24 PM | COMMENTS(24)
OVERVIEW: As more organizations adopt cloud applications, how will today’s adversaries target corporate data in the cloud? What are the tools, techniques and tactics that are being used to achieve their objectives? How are they different from traditional...
M.Lambert | 8/17/2015 9:55:26 AM | COMMENTS(0)

Documents & Publications: 73 total

Must be a Topic member to contribute
View All »
Comprehensive study published by GovLoop on IoT usage in the Public Sector
Posted by Melody 6 days ago
Posted by ISACA 56 days ago
Posted by ISACA 66 days ago

Events & Online Learning: 5 total

Journal Articles: 78 total

Volume 5, 2015
by Jeimy J. Cano, Ph.D., COBIT Foundation, CFE
Cyberinsurance is a way to account for cyberrisk and considers the new possible business responsibilities arising from operating in an international context.
Volume 5, 2015
by Fredric Greene, CISSP
Detective controls are a key component of a cybersecurity program in providing visibility into malicious activity, breaches and attacks on an organization’s IT environment.
Volume 5, 2015
by Gary Lieberman, Ph.D., CISSP
With 2014 being known as The Year of the Mega Breach, cyberattacks have quickly become a key focus in almost every BC/DR program.
Volume 5, 2015
by Michele Mosca, Ph.D.
In the Information Age, many of one’s most valuable belongings—finances, medical histories and, to a large extent, identities—are kept safe behind digital deadbolts.
Volume 5, 2015
by Steven J. Ross, CISA, CISSP, MBCP
If you think of cyberattacks as war, which it is in both the figurative and literal senses, make yourself ready to win it.
Volume 5, 2015
by Ganapathi Subramaniam
How do I ensure that my organization has controls to protect itself from cyberrisk?

Wikis: 2 total

Blog Posts: 19 total

On my last post in the CCI Blog, I described how American Water Works Association Cyber Security Framework didn’t addressed the detection Cyber Security events measures for these control systems.Today I have seen a good tweet (as always) from our collea...
Posted By : Enrique229 | 0 comments
Water Management Cyber Security guide from the American Water Works Association is bypassing certain critical controls on ICS Networks. Are we still in time in Spain to avoid this mishap? I know I should be looking for the needle in the Haystack, but lo...
Posted By : Enrique229 | 0 comments
Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments
  Rob Stroud is the New York based Vice President of Strategy and Innovation at CA Technologies and is the current President for the 2014-15 administrative term.  I caught up with Rob in Australia when he visited Canberra in June 2014...
Posted By : Rob Hanson | 2 comments
I saw Garry at the Sydney Chapter’s successful Strategic Planning event in July 2014.  He was animated and gregarious during the evening’s cocktail event and it felt good to see him again and catch...
Posted By : Rob Hanson | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments