Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.


Share knowledge about CyberSecurity with other ISACA members and idenfity and discuss issues that need more guidance from ISACA. Collaborate, make connections and learn how to keep your organization safe from Cyber risks.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
2720 Members
2 Online
20392 Visits

Community Leader



Badge: Energizer



Title: Service Area Manager / Senior Managing Consultant

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 201 total

Must be a Topic member to contribute
View All »
In a survey by Dell, “Of those who are using the framework, 74 percent say it's used as a foundation for their cybersecurity roadmap, helping to improve organizational security.” read more and look up the Survey:
M.Lambert | 1/30/2016 12:36:14 AM | COMMENTS(5)
Google wants to keep the Islamic State (Isis) off the internet so the terrorist organization does not have a means for recruiting. The director of Google Ideas, Jared Cohen, seeks to “recapture digital territory” from extremist groups such as Isis. Rea...
M.Lambert | 1/28/2016 7:00:33 PM | COMMENTS(2)
In the 2015 volume 6 article it mentions the ability to be able to check if a version of the program is free from flaws and an audit trail of known changes. A technical check is to generate a hash total using a program as data and then to apply the ch...
Chris Wingard | 1/28/2016 3:58:20 PM | COMMENTS(0)
Security Magazine just published an article : " Is Cybercrime Just a Cost of Doing Business?” They conclude that " No, it’s not acceptable to have to build a few hundred ransom payments and bi-annual security breaches into your bottom line. And it does...
M.Lambert | 1/28/2016 6:50:20 AM | COMMENTS(4)
article points out that : " The National Lottery website and ticket machines were brought down on Wednesday by a cyber attack " and that " The issues were resolved by the National Lottery’s DDOS protection systems, limiting disruption and restoring a...
M.Lambert | 1/27/2016 7:51:05 PM | COMMENTS(1)
If you wish to participate in the study, you may fill one of the two surveys: If you want to learn more about this, go to:
M.Lambert | 1/22/2016 8:10:48 AM | COMMENTS(0)

Documents & Publications: 81 total

Must be a Topic member to contribute
View All »
Posted by ISACA 23 days ago
Posted by ISACA 55 days ago
Posted by ISACA 76 days ago

Events & Online Learning: 5 total

Journal Articles: 89 total

Volume 1, 2016
by Mohammed J. Khan, CISA, CRISC, CIPM
Data protection and cybersecurity go hand-in-hand due to the nature of the risk involved. The underlying assumption is that all data, whether they are stationary or in motion, are threatened to be compromised.
Volume 1, 2016
by Steven J. Ross, CISA, CISSP, MBCP
Twice in the past year or so I have received replacement credit cards because the numbers and expiration dates had been disclosed by merchants that I frequented.
Volume 1, 2016
by Martin Coe, DBA, CISA, CISM, CPA
Information security risk has dramatically evolved; however, security strategies that are typically compliance-based and perimeter-oriented have not kept pace.
Volume 6, 2015
by Hari Mukundhan, CISA, CISSP
With the significant increase in the rate of cybersecurity incidents worldwide, the financial impacts due to these incidents have also soared.
Volume 6, 2015
by Steven J. Ross, CISA, CISSP, MBCP
A few issues back, I wrote about the US National Institute of Standards and Technology’s (NIST) Framework for Improving Critical Infrastructure Cybersecurity.
Volume 6, 2015
by Ivo Ivanovs and Sintija Deruma
Cyberspace is a virtual environment. Today, it does not matter which device is used for connecting to the Internet.

Wikis: 2 total

Blog Posts: 19 total

On my last post in the CCI Blog, I described how American Water Works Association Cyber Security Framework didn’t addressed the detection Cyber Security events measures for these control systems.Today I have seen a good tweet (as always) from our collea...
Posted By : Enrique229 | 0 comments
Water Management Cyber Security guide from the American Water Works Association is bypassing certain critical controls on ICS Networks. Are we still in time in Spain to avoid this mishap? I know I should be looking for the needle in the Haystack, but lo...
Posted By : Enrique229 | 0 comments
Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments
  Rob Stroud is the New York based Vice President of Strategy and Innovation at CA Technologies and is the current President for the 2014-15 administrative term.  I caught up with Rob in Australia when he visited Canberra in June 2014...
Posted By : Rob Hanson | 2 comments
I saw Garry at the Sydney Chapter’s successful Strategic Planning event in July 2014.  He was animated and gregarious during the evening’s cocktail event and it felt good to see him again and catch...
Posted By : Rob Hanson | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments