Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

CyberSecurity

Share knowledge about CyberSecurity with other ISACA members and idenfity and discuss issues that need more guidance from ISACA. Collaborate, make connections and learn how to keep your organization safe from Cyber risks.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1917 Members
7 Online
14674 Visits

 Recent Discussions

Catalog of National Cyber Security Strategies in the world. Posted by yves_le_roux.
Implementing the NIST CyberSecurity Framework. Posted by LJB.
Internet of Things (IoT). Posted by Melody.

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 57 total

Must be a Topic member to contribute
View All »
ENISA has listed all the documents of National Cyber Security Strategies in the EU but also in the world. This information is based on publicly available material. Some of these documents are still under consultation so no official translations in Englis...
yves_le_roux | 10/29/2014 4:09:22 AM | COMMENTS(0)
Has anyone evaluated their cyber security posture or planned their strategy using ISACA's "Implementing the NIST CyberSecurity Framework" guide and toolkit? I'm interested in hearing how effective it has been in your environment and any lessons learned.
LJB | 10/28/2014 2:57:47 PM | COMMENTS(0)
I would like to start a long-term discussion on the Internet of Things (IoT). This is coming faster than we imagine and a day when everyone is wearing a Google Glass like device or Samsung Galaxy Gear is around the corner. I would like this to be an ...
Melody | 10/28/2014 5:45:36 AM | COMMENTS(47)
Hi all, Just some knowledge sharing.... Please kindly be aware that there is serious vulnerability has been discovered and published online.  SSL3.0 is vulnerability to disclosure of plain-text over network sniffing.  Please refer tothe link below for mor...
Chris Sivaprakash Kumanan | 10/23/2014 1:54:18 AM | COMMENTS(2)
A
Yolanda Baker | 10/18/2014 12:29:44 AM | COMMENTS(3)
As the new Cybersecurity exam is coming up, testing area's will be: 1) cybersecurity architecture principles, 2) cybersecurity of networks, systems, applications and data, 3) incident responsed 4) the cybersecurity implications of the adoption of...
Patric Versteeg | 10/15/2014 12:40:17 PM | COMMENTS(64)

Documents & Publications: 55 total

Must be a Topic member to contribute
View All »
An organization will only survive if it can continue operations after disastrous events. Continuity planning is critical to keeping your organization working in the event of a medium to large scale disaster. Planning helps to ensure that your customers/clients will still have access to the functions, information, and resources you provide them. The presentation covers what can be done to ensure survival and recovery after these types of events. Topics include continuity planning components, the processes, as well as testing and exercising the plan(s). The course is intended for continuity planners, IT security managers and professionals, contractors, and anyone interested in continuity planning.
Posted by Larry Wlosinski Yesterday
Gartner Report for CISOs about securing IoT.
Posted by Melody 3 days ago
Books
Posted by ISACA 34 days ago
Books
Posted by ISACA 48 days ago

Events & Online Learning: 4 total

Journal Articles: 51 total

Volume 5, 2014
by Steven J. Ross, CISA, CISSP, MBCP
“CERT,” in the context of information security, is a term with a long and noble pedigree.
Volume 5, 2014
by Ed Gelbstein, Ph.D.
There are three domains that impact information security.
Volume 4, 2014
by Steven J. Ross, CISA, CISSP, MBCP
The time has come to accept that cyberattacks are a global reality—malicious forces in the world have gone beyond vandalism toward institutionalized espionage, sabotage and crime.
Volume 3, 2014
by Nikos Virvilis, CISA, CISSP, GPEN, Oscar Serrano, CISA, CISM, CISSP, and Luc Dandurand
The major players in today’s cyberconflicts are well organized and heavily funded teams with specific goals and objectives, some of which are working under a state umbrella.
Volume 3, 2014
by Steven J. Ross, CISA, CISSP, MBCP
The issue is no longer whether cyberattacks occur, but what to do about them.
Volume 2, 2014
by Jide Olakunle, CISA, CISM, CISSP
Cyberattacks and the resulting security breaches are part of the rapidly expanding security threats organizations face.

Wikis: 2 total

Blog Posts: 12 total

27 Oct 2014
Now a days, you don’t need to be a IT guru or best software programmer to access /control other personal/organization data. If you follow below techniques, you can easily get confidential information. 1. Masquerading 2. Tailgeting (Piggy back) 3. Dum...
Posted By : Shaklain | 1 comments
23 Oct 2014
Posted By : masarker | 4 comments
and Become More Secure As a penetration tester I find it TOO EASY to fully compromise an internal network – without finding a single “vulnerability”! I spend most of my time on two types of engagements — PCI projects and penetration tests. The pe...
Posted By : Stewart141 | 0 comments
  Rob Stroud is the New York based Vice President of Strategy and Innovation at CA Technologies and is the current President for the 2014-15 administrative term.  I caught up with Rob in Australia when he...
Posted By : Rob Hanson | 1 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
(By: William Darío Ávila Díaz, PhD)A new tool to combat Internet crime is now a reality thanks to an agreement signed by thirty countries, where they commit to the creation of international legislation attached to the local laws of each of the nations. Th...
Posted By : William733 | 2 comments