Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.


Share knowledge about CyberSecurity with other ISACA members and idenfity and discuss issues that need more guidance from ISACA. Collaborate, make connections and learn how to keep your organization safe from Cyber risks.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
3046 Members
0 Online
22812 Visits

Community Leader



Title: CISO

Badge: Influential



Title: Service Area Manager / Senior Managing Consultant

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 420 total

Must be a Topic member to contribute
View All »
Another example of vulnerability of IoTs as DDOS attack agents -
Shamik | 10/24/2016 9:58:50 AM | COMMENTS(0)
One of the ways in which IOTs could become attack agents for a DDOS attack - Massive cyberattack turned ordinary devices into weapons - Thanks
Shamik | 10/23/2016 10:13:18 AM | COMMENTS(0)
While some of them are "elementary", it is still a good refresher list - Thanks
Shamik | 10/23/2016 10:09:40 AM | COMMENTS(0)
This video shows:- Financial incentives- Importance of social media and e-mail- Ransom by Bitcoin,- Impacts on data and organization
SergeDrolet | 10/16/2016 4:11:06 PM | COMMENTS(0)
Bob Violino from ZDnet reports on his interview with James Ryan, digital leadership fellow at Minnesota Innovation Lab. “"If the data that drives a robot is tampered with or the robot is controlled by a hacker, we could see these robots respond in un...
M.Lambert | 10/14/2016 8:36:34 AM | COMMENTS(0)
Big Opportunity for Skilled Candidates, Big Challenge for Organizations Seeking to Hire Rolling Meadows, IL, USA (13 October 2016) What: ISACA’s Cybersecurity Jobs Index is a new at-a-glance summary of key statistics and insights on the state of cyber...
M.Lambert | 10/14/2016 6:37:24 AM | COMMENTS(0)

Documents & Publications: 82 total

Must be a Topic member to contribute
View All »
Posted by ISACA 18 days ago
Posted by ISACA 89 days ago
Press release that summarizes the provisions in the new rules and implementation information
Posted by M.Lambert 193 days ago

Events & Online Learning: 6 total

Journal Articles: 94 total

Volume 5, 2016
by Furkan Caliskan, CISA
With today’s fast-growing cybersecurity needs, building an effective cyberdefense infrastructure is a big challenge for many organizations.
Volume 5, 2016
by Daksha Bhasker, CISM, CISSP
When women are in leadership positions in significant numbers, “the bottom line improves—from financial success to the quality and scope of decision making.”
Volume 5, 2016
by Syed K. Ishaq, CISA, CRISC, CCISO
Although the short-term impact from a cyberattack can be overwhelming, the long-term implications can be quite burdensome
Volume 5, 2016
by Tom Pendergast, Ph.D.
Despite a wealth of preventive measures, employees remain one of the costliest vectors in a number of data breaches and security incidents, which are increasing at an alarming rate.
Volume 5, 2016
by Craig R. Hollingsworth, CISA
Within the last two years, the author’s research-oriented company installed a commercial, off-the-shelf (COTS) tool within its Moderate network to use for survey work.
Volume 5, 2016
by Jeimy J. Cano, Ph.D., CFE
In a world of accelerating change that is moving toward more digital tendencies, security and control practices have become an ongoing exercise in reinvention.

Wikis: 2 total

Blog Posts: 22 total

Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments
For a long time, the main focus of most organization was to have a solid protected network perimeter, by installing the most powerful shiny firewall, IPS/IDS to avoid intruders to trespass inside their networks. The endpoint (host) protection was always c...
Posted By : Willian Guilherme | 0 comments
The PCI Council has announced some new information on the upcoming version of PCI - Version 3.2.  Find out the latest here: http:/
Posted By : Stewart141 | 0 comments
On my last post in the CCI Blog, I described how American Water Works Association Cyber Security Framework didn’t addressed the detection Cyber Security events measures for these control systems.Today I have seen a good tweet (as always) from our collea...
Posted By : Enrique229 | 0 comments
Water Management Cyber Security guide from the American Water Works Association is bypassing certain critical controls on ICS Networks. Are we still in time in Spain to avoid this mishap? I know I should be looking for the needle in the Haystack, but lo...
Posted By : Enrique229 | 0 comments
Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments