Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

CyberSecurity

Share knowledge about CyberSecurity with other ISACA members and idenfity and discuss issues that need more guidance from ISACA. Collaborate, make connections and learn how to keep your organization safe from Cyber risks.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1336 Members
3 Online
11294 Visits

 Recent Discussions

External pentester/web assesment provider. Posted by MaximoPatino.
Auditing sporting events. Posted by Mahmoud303.
CyberSecurity Framework Overview Panel Discuss... Posted by Alex.

Community Leader

Eberechi
Eder L. Marques
NEW! Participate in Discussions Via Email. 

You can now respond to discussions by simply replying to the email alert. Just enable this feature in discussions on this topic. Learn more

Discussions: 37 total

Must be a Topic member to contribute
View All »
Hi, im looking for some documentation/framework for recommendations on pentest by external provider... any thoughs?
MaximoPatino | 4/15/2014 8:17:49 AM | COMMENTS(1)
How to IT-Audit a major sporting evenrt, such as a Tennis-grandslam US-Open or the ITTF table tennis world championship, for example?
Mahmoud303 | 4/10/2014 7:20:25 AM | COMMENTS(1)
If you will be in the NYC area March 10 or 11  register to attend one of 6 FREE sessions for an overview of the Cybersecurity Framework and a panel discussion with many distinguished guests.  Each session will be focused on a different industry.  Register...
Alex | 3/4/2014 9:27:55 PM | COMMENTS(1)
Worth a read...remove admin from your clients now! Removing Admin Rights Mitigates 92% Of Critical Microsoft Vulnerabilities http://www.darkreading.com/attacks-breaches/removing-admin-rights-mitigates-92-of-cr/240166264
Ian Cooke | 2/24/2014 5:03:13 AM | COMMENTS(1)
Hi, I am looking for InfoSec tools. I've heard about InCase, but I can not find it on the Internet. Could some one send me the link for it, so I can look for more information about it? Thanks,Oscar Moreno
Oscar | 2/5/2014 6:48:18 PM | COMMENTS(9)
Recently, the president of of Nigeria Goodluck Ebele Jonathan proposes a death penalty for cyber crimes. The proposal is for "who hack into the Critical National Information Infrastructure or computer networks resulting in the loss of lives". The b...
Eder L. Marques | 2/3/2014 12:48:21 AM | COMMENTS(2)

Documents & Publications: 34 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 7 days ago
Research
Posted by ISACA 16 days ago
Books
Posted by ISACA 29 days ago

Events & Online Learning: 3 total

Journal Articles: 46 total

Volume 2, 2014
by Jide Olakunle, CISA, CISM, CISSP
Cyberattacks and the resulting security breaches are part of the rapidly expanding security threats organizations face.
Volume 2, 2014
by Tommie Singleton, CISA, CGEIT, CPA
Entities that maintain large databases of individuals and their PII should be prepared for a data breach by doing due diligence, as defined by cybersecurity professionals.
Volume 1, 2014
by Steven J. Ross, CISA, CISSP, MBCP
Sadly, cyberthreats are a part of business life in the 21st century.
Volume 1, 2014
by Ganapathi Subramaniam, CISA, CISM
How does one audit the cyberresilience of any organization?
Volume 1, 2014
by Samir Malaviya, CISA, CGEIT, CSSA
This article proposes a comprehensive model for establishing a framework for securing SCADA systems.
Volume 1, 2014
by Tommie Singleton, CISA, CGEIT, CPA
The fact is that cybercrime has superseded much of organized crime in the past few decades.

Wikis: 2 total

Blog Posts: 17 total

Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
15 Jan 2014
Posted By : masarker | 1 comments
Resumen El imparable crecimiento de internet en el mundo, y la integración de los diversos sistemas informáticos conectados a la red de Internet han hecho que la Seguridad de la Información alcance un papel de suma importancia actualmente. Desde el moment...
Posted By : ArthurHuamani | 0 comments
(By: William Darío Ávila Díaz, PhD)A new tool to combat Internet crime is now a reality thanks to an agreement signed by thirty countries, where they commit to the creation of international legislation attached to the local laws of each of the nations. Th...
Posted By : William733 | 2 comments
(By: William Darío Ávila Díaz, PhD) Colombia is the first Latin American country to adopt cyberspace strategy to prevent and tackle crime and minimize the risk level of citizens from threats or incidents of cyber nature. This is why they were created th...
Posted By : William733 | 0 comments
(By: William Darío Ávila Díaz, PhD) Situation: [1]On September 21, 2011, the website of the House of Representatives of the Republic of Colombia, was attacked by the "Colectivo Nacional Anonymous", who kept for several hours off duty. The engineers of ...
Posted By : William733 | 0 comments