Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

CyberSecurity

Share knowledge about CyberSecurity with other ISACA members and idenfity and discuss issues that need more guidance from ISACA. Collaborate, make connections and learn how to keep your organization safe from Cyber risks.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
3084 Members
16 Online
23152 Visits

Community Leader

M.Lambert

M.Lambert

Title: CISO

Badge: Influential

Melody

Melody

Title: Service Area Manager / Senior Managing Consultant

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 457 total

Must be a Topic member to contribute
View All »
IMPORTANT CYBERSECURITY MESSAGE!! (repost from my professional blog at www.gerrianneredmond.blogspot.com and my ISACA blog. I am not sure if you all read it. I thought you all may enjoy playing with this topic) As you know I have partnered with the D...
Gerri Anne Redmond | 12/4/2016 5:12:49 PM | COMMENTS(0)
Rafia Shaikh from wccftech.com reports: "It is not a new discovery that speakers in the headphones that turn electromagnetic signals into sound waves can work in reverse too. What security researchers have done with this new malware is to take the ide...
M.Lambert | 11/30/2016 7:47:25 AM | COMMENTS(0)
Cartoon Hacker Quits - TeachPrivacy Security Awareness Training view the image on https://www.teachprivacy.com/hacking-cartoon-all-too-easy/
M.Lambert | 11/30/2016 7:19:26 AM | COMMENTS(0)
Rebecca Campbell from hacked.com writes : “After scanning a person’s computer files and social media to find potentially incriminating evidence, it then sends a penalty notice, threatening victims with court action if the amount isn’t paid. As it doe...
M.Lambert | 11/30/2016 7:08:34 AM | COMMENTS(0)
Adrian Sanabria from 451 Research writes : “ Bottom line: yes, it is feasible, but limited opportunities to charge this much mean that it's unlikely you or I will ever land a pentesting gig that nets us anywhere near $1m annually” Read more: https://...
M.Lambert | 11/29/2016 2:24:34 PM | COMMENTS(0)
Kevin Townsend from Security Week reports: “A ransomware attack that began on November 25 forced the San Francisco Municipal Transport Authority (SFMTA, or 'Muni') to progressively close ticketing machines and open the gates to its railway system.” “A...
M.Lambert | 11/29/2016 1:40:53 PM | COMMENTS(0)

Documents & Publications: 82 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 58 days ago
Books
Posted by ISACA 129 days ago
Press release that summarizes the provisions in the new rules and implementation information
Posted by M.Lambert 233 days ago

Events & Online Learning: 7 total

Journal Articles: 101 total

Volume 6, 2106
by Venkatasubramanian Ramakrishnan, CISM, CRISC, CHFI
Bayesian networks can capture the complex interdependencies among risk factors and can effectively combine data with expert judgment.
Volume 6, 2016
by Vasant Raval, DBA, CISA, ACMA
It is important to examine the possible connection between the arrival of cyberspace and an increased level of interest in ethics of information.
Volume 6, 2016
by Steven J. Ross, CISA, CISSP, MBCP
In May 2016, the G7 leaders met in Ise-Shima, Japan, and produced a document that has real meaning for all of us who care about cyber security.
Volume 6, 2016
by Marcus Chambers, CISM, CGEIT, CEng
Get to know your network.
Volume 5, 2016
by Furkan Caliskan, CISA
With today’s fast-growing cybersecurity needs, building an effective cyberdefense infrastructure is a big challenge for many organizations.
Volume 5, 2016
by Daksha Bhasker, CISM, CISSP
When women are in leadership positions in significant numbers, “the bottom line improves—from financial success to the quality and scope of decision making.”

Wikis: 2 total

Blog Posts: 22 total

Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments
For a long time, the main focus of most organization was to have a solid protected network perimeter, by installing the most powerful shiny firewall, IPS/IDS to avoid intruders to trespass inside their networks. The endpoint (host) protection was always c...
Posted By : Willian Guilherme | 0 comments
The PCI Council has announced some new information on the upcoming version of PCI - Version 3.2.  Find out the latest here: http:/www.lbmcinformationsecurity.com/blog
Posted By : Stewart141 | 0 comments
On my last post in the CCI Blog, I described how American Water Works Association Cyber Security Framework didn’t addressed the detection Cyber Security events measures for these control systems.Today I have seen a good tweet (as always) from our collea...
Posted By : Enrique229 | 0 comments
Water Management Cyber Security guide from the American Water Works Association is bypassing certain critical controls on ICS Networks. Are we still in time in Spain to avoid this mishap? I know I should be looking for the needle in the Haystack, but lo...
Posted By : Enrique229 | 0 comments
Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments