Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.


Share knowledge about CyberSecurity with other ISACA members and idenfity and discuss issues that need more guidance from ISACA. Collaborate, make connections and learn how to keep your organization safe from Cyber risks.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
2911 Members
2 Online
21963 Visits

Community Leader



Title: CISO

Badge: Influential



Title: Service Area Manager / Senior Managing Consultant

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 331 total

Must be a Topic member to contribute
View All »
Calon Alpar reports that " Pokemon Go has taken the mobile world by storm with its release only a week ago. The nostalgia has taken off as it is already the biggest US mobile game ever. Unfortunately, with immense popularity, the one thing people...
M.Lambert | 7/20/2016 9:30:03 PM | COMMENTS(0)
QUESTION TO THE GROUP:  Do you feel these stats reflect your organization or industry? Some of the findings show that: One in five organizations (20 percent) have never changed their default passwords on privileged accounts Three out of 10 organ...
M.Lambert | 7/20/2016 9:21:45 PM | COMMENTS(0)
Take the survey today to help the SANS Institute determine strengths and weaknesses in financial and processing information systems to help improve best practices. Take the Survey HERE: Survey results...
M.Lambert | 7/20/2016 9:09:35 PM | COMMENTS(0)
Catalin Cimpanu from reports that " The US Congress has just recovered after a three-day DDoS attack that has crippled its online portal, along with adjacent sites such as the US Library of Congress ( and the US Copyri...
M.Lambert | 7/20/2016 9:01:07 PM | COMMENTS(0)
Dan Goodin writes that " a newly disclosed vulnerability could allow attackers to seize control of mobile phones and key parts of the world's telecommunications infrastructure and make it possible to eavesdrop or disrupt entire networks, security exper...
M.Lambert | 7/20/2016 8:52:33 PM | COMMENTS(0)
Part 2 of 2 by Scott Scheferman. In this part he discusses predictions that "just waiting": • Distraction • Targeted Espionage • Political Outcomes • Market Manipulation • Action by Individual Read article:
M.Lambert | 7/12/2016 3:47:36 PM | COMMENTS(0)

Documents & Publications: 82 total

Must be a Topic member to contribute
View All »
Posted by ISACA 68 days ago
Press release that summarizes the provisions in the new rules and implementation information
Posted by M.Lambert 99 days ago
Posted by ISACA 190 days ago

Events & Online Learning: 6 total

Journal Articles: 85 total

Volume 4, 2016
by C. Warren Axelrod, Ph.D., CISM, CISSP
This article examines this rapid loss of privacy and describes current approaches to mitigating risk of exposure of personal data and images.
Volume 4, 2016
by Steven J. Ross, CISA, CISSP, MBCP
I can hear the rejoinder now: There is no need for a chief cyber officer because the chief information security officer (CISO) performs that function.
Volume 3, 2016
by Steven J. Ross, CISA, CISSP, MBCP
Targeted attacks by powerful enemies are forcing us to reconsider almost everything we thought we knew about protecting information resources.
Volume 3, 2016
by Veronika Stolbikova
Many smart card, cell phone, Internet of Things (IoT) and Bitcoin businesses have already implemented elliptic curve cryptography (ECC), and for good reason.
Volume 3, 2016
by Davi Ottenheimer and Matthew Wallace | Reviewed by A. Krista Kivisild, CISA, CA, CPA
This book is aimed at anyone with an interest in security and compliance in virtualized and cloud environments—appealing to both technical and nontechnical readers.
Volume 3, 2016
by Mustafa S. Poonawala, CISA, ITIL
Every organization, big or small, faces its own black swan and there is little one can do to avoid it. What can be done is taking steps to ensure that its impact is minimal.

Wikis: 2 total

Blog Posts: 22 total

Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments
For a long time, the main focus of most organization was to have a solid protected network perimeter, by installing the most powerful shiny firewall, IPS/IDS to avoid intruders to trespass inside their networks. The endpoint (host) protection was always c...
Posted By : Willian Guilherme | 0 comments
The PCI Council has announced some new information on the upcoming version of PCI - Version 3.2.  Find out the latest here: http:/
Posted By : Stewart141 | 0 comments
On my last post in the CCI Blog, I described how American Water Works Association Cyber Security Framework didn’t addressed the detection Cyber Security events measures for these control systems.Today I have seen a good tweet (as always) from our collea...
Posted By : Enrique229 | 0 comments
Water Management Cyber Security guide from the American Water Works Association is bypassing certain critical controls on ICS Networks. Are we still in time in Spain to avoid this mishap? I know I should be looking for the needle in the Haystack, but lo...
Posted By : Enrique229 | 0 comments
Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments