Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

CyberSecurity

Share knowledge about CyberSecurity with other ISACA members and idenfity and discuss issues that need more guidance from ISACA. Collaborate, make connections and learn how to keep your organization safe from Cyber risks.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
2840 Members
5 Online
21352 Visits

Community Leader

M.Lambert

M.Lambert

Title: CISO

Badge: Influential

Melody

Melody

Title: Service Area Manager / Senior Managing Consultant

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 276 total

Must be a Topic member to contribute
View All »
Dotan Bar Noy writes that Content Disarm and Reconstruct technology, or CDR is at the heart of his company's solution. Read more: https://www.linkedin.com/pulse/cdr-cybersecurity-term-enterprises-need-know-dotan-bar-noy QUESTION: how likely are we  to re...
M.Lambert | 5/2/2016 7:54:48 AM | COMMENTS(0)
QUESTION:  does this call for restricting BYOD ?  Matt Smith from Business Reporter discusses research by OnePulse and RiskIQ has showing that "59 per cent of those who use personal devices for work use the same device to stream or download pirated conte...
M.Lambert | 4/28/2016 11:58:29 AM | COMMENTS(2)
QUESTION TO THE GROUP:  Do you expect this to become a global trend ? The U.S. House of Representatives unanimously passed H.R. 699, the Email Privacy Act, requiring warrants for obtaining emails.  This still requires to be passed by the Senate and signe...
M.Lambert | 4/28/2016 11:22:09 AM | COMMENTS(1)
David Bisson from Tripwirw reports that “Researchers have developed a utility that allows victims affected by CryptXXX ransomware to decrypt their files for free” Read more: http://www.tripwire.com/state-of-security/latest-security-news/decryption-tool-...
M.Lambert | 4/28/2016 7:11:11 AM | COMMENTS(1)
Check below for the 4 ISACA events. Also a vendor webinar: "Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6" read more:   https://engage.vevent.com/index.jsp?eid=4929&seid=1489&language-code=en&country-code=US&page=10000&code=em...
M.Lambert | 4/28/2016 6:45:21 AM | COMMENTS(1)
Bonjour,Cette discussion est pour faire suivre vos questions aux conférenciers de la Journée CSX sur la cybersécurité du 31 mai à Québec. http://isaca-quebec.ca/?q=node/523 Inscrire vos questions dans cette discussion.  Pour les non-membres vous pouvez me...
MorkfromOrk | 4/27/2016 7:58:47 PM | COMMENTS(0)

Documents & Publications: 82 total

Must be a Topic member to contribute
View All »
Press release that summarizes the provisions in the new rules and implementation information
Posted by M.Lambert 17 days ago
Books
Posted by ISACA 108 days ago
Books
Posted by ISACA 140 days ago

Events & Online Learning: 4 total

Journal Articles: 82 total

Volume 3, 2016
by Steven J. Ross, CISA, CISSP, MBCP
Targeted attacks by powerful enemies are forcing us to reconsider almost everything we thought we knew about protecting information resources.
Volume 3, 2016
by Veronika Stolbikova
Many smart card, cell phone, Internet of Things (IoT) and Bitcoin businesses have already implemented elliptic curve cryptography (ECC), and for good reason.
Volume 3, 2016
by Davi Ottenheimer and Matthew Wallace | Reviewed by A. Krista Kivisild, CISA, CA, CPA
This book is aimed at anyone with an interest in security and compliance in virtualized and cloud environments—appealing to both technical and nontechnical readers.
Volume 2, 2016
by Jeroen van Lewe, CISA, CEH, CIA, ECSA
In the Netherlands, large-scale cyberattacks on government web sites began in 2011. In 2012, the Dutch government decided to use IT audits as one of the remedies for this issue.
Volume 2, 2016
by Sanjiv Agarwala, CISA, CISM, CGEIT, BS 25999/ISO 22301 LA, CISSP, ISO 27001:2013 LA, MBCI
Cybersecurity threats are on the rise. Every organization is connected to one another, and any organization can become the victim of cyberattacks.
Volume 2, 2016
by Robert Putrus, CISM, CFE, CMC, PE, PMP
Investments in cybersecurity tend to be fairly significant, so organizations continually seek ways to determine whether the investments were appropriate based on return.

Wikis: 2 total

Blog Posts: 20 total

The PCI Council has announced some new information on the upcoming version of PCI - Version 3.2.  Find out the latest here: http:/www.lbmcinformationsecurity.com/blog
Posted By : Stewart141 | 0 comments
On my last post in the CCI Blog, I described how American Water Works Association Cyber Security Framework didn’t addressed the detection Cyber Security events measures for these control systems.Today I have seen a good tweet (as always) from our collea...
Posted By : Enrique229 | 0 comments
Water Management Cyber Security guide from the American Water Works Association is bypassing certain critical controls on ICS Networks. Are we still in time in Spain to avoid this mishap? I know I should be looking for the needle in the Haystack, but lo...
Posted By : Enrique229 | 0 comments
Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments
  Rob Stroud is the New York based Vice President of Strategy and Innovation at CA Technologies and is the current President for the 2014-15 administrative term.  I caught up with Rob in Australia when he visited Canberra in June 2014...
Posted By : Rob Hanson | 2 comments
I saw Garry at the Sydney Chapter’s successful Strategic Planning event in July 2014.  He was animated and gregarious during the evening’s cocktail event and it felt good to see him again and catch...
Posted By : Rob Hanson | 0 comments