Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.


Share knowledge about CyberSecurity with other ISACA members and idenfity and discuss issues that need more guidance from ISACA. Collaborate, make connections and learn how to keep your organization safe from Cyber risks.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
3233 Members
6 Online
24576 Visits

Community Leader

Claudio Cilli

Claudio Cilli

Badge: Lively



Title: CISO

Badge: Influential


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 500 total

Must be a Topic member to contribute
View All »
Slack Alice from Infosecurity Magazine quotes Dr. Sandro Gaycken, director of the Digital Society Institute at the ESMT Berlin business school and director of NATO’s SPS Cyberdefence project: “A cyberattack could, for instance, lead to computers crashin...
M.Lambert | 5/23/2017 1:31:08 PM | COMMENTS(0)
Suparna Goswami, Principal Correspondent, Information Security Media Group writes: “online restaurant guide and food ordering service Zomato says 17 million users' email addresses and hashed passwords were stolen from its database. The company has 120 mil...
M.Lambert | 5/23/2017 12:55:06 PM | COMMENTS(0)
Charlie Campbell, Beijing Correspondent for TIME writes: “The regime of “Supreme Leader” Kim Jong Un remains a penniless Stalinist fossil, but in terms of hacking prowess it’s on an even keel with the U.S., China, Russia and Israel.” (…) “Today, an elite ...
M.Lambert | 5/23/2017 12:37:05 PM | COMMENTS(0)
Cyberattacks rated number 12 on WEF’s Global Risks of Highest Concern for Doing Business - - - - - see infographic and more:
M.Lambert | 5/23/2017 9:58:46 AM | COMMENTS(0)
Dave Mosher from Business Insider writes: “Wi-Fi can pass through walls. (…)Now, German scientists have found a way to exploit this property to take holograms, or 3D photographs, of objects inside a room — from outside it. (…) Holl says the technology is...
M.Lambert | 5/23/2017 9:19:41 AM | COMMENTS(0)
Rick Orloff, VP, Chief Security Officer, and Chief Privacy Officer at Code42 writes: “Together, the C-suite and security team should be asking how their security program can determine if someone made it through their security defenses. Breaches are usua...
M.Lambert | 5/23/2017 8:24:19 AM | COMMENTS(0)

Documents & Publications: 58 total

Must be a Topic member to contribute
View All »
Technical Guidance to prevent WannaCry Ransomware on Windows 10 end client. Document written in dual language Indonesia - English with the aim of facilitating it's application in Indonesia.
Posted by Harun Al Rasyid 14 days ago
Posted by ISACA 114 days ago
Press release that summarizes the provisions in the new rules and implementation information
Posted by M.Lambert 408 days ago
Posted by ISACA 499 days ago

Events & Online Learning: 8 total

Journal Articles: 107 total

Volume 6, 2106
by Venkatasubramanian Ramakrishnan, CISM, CRISC, CHFI
Bayesian networks can capture the complex interdependencies among risk factors and can effectively combine data with expert judgment.
Volume 3, 2017
The resolve to address IoT device security at various levels—hardware and software, government and enterprise, consumers and services—is widespread.
Volume 3, 2017
by Hemant Patel, CISM, ITIL, PMP, TOGAF
Security needs to be addressed at all stages of the IoT system life cycle, including the design, installation, configuration and operational stages.
Volume 3, 2017
by Steven J. Ross, CISA, CISSP, MBCP
At each stage in the evolution of information security, there has been a problem—access control, viruses, hackers, data leakage, to name a few—that has seemed insuperable.
Volume 3, 2017
by ISACA | Reviewed by Sunil Bakshi, CISA, CRISC, CISM, CGEIT, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP
This book is useful for security professionals, consultants and students pursuing cyber security as it provides guidance for identifying/detecting, responding and eradicating targeted cyberattacks.
Volume 2, 2017
by Farewell Ron Hale
ISACA is grateful to Ron Hale for his years of knowledge, leadership and dedication.

Wikis: 2 total

Blog Posts: 23 total

La demanda de servicios bancarios a través de Internet, producto del surgimiento de nuevas necesidades en los consumidores atraídos por el auge tecnológico, mantiene a las entidades financieras inmersas en una encrucijada en la cual deben equilibrar el ni...
Posted By : Gerardo Zuñiga | 0 comments
For a long time, the main focus of most organization was to have a solid protected network perimeter, by installing the most powerful shiny firewall, IPS/IDS to avoid intruders to trespass inside their networks. The endpoint (host) protection was always c...
Posted By : Willian Guilherme | 1 comments
Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments
The PCI Council has announced some new information on the upcoming version of PCI - Version 3.2.  Find out the latest here: http:/
Posted By : Stewart141 | 0 comments
On my last post in the CCI Blog, I described how American Water Works Association Cyber Security Framework didn’t addressed the detection Cyber Security events measures for these control systems.Today I have seen a good tweet (as always) from our collea...
Posted By : Enrique229 | 0 comments
Water Management Cyber Security guide from the American Water Works Association is bypassing certain critical controls on ICS Networks. Are we still in time in Spain to avoid this mishap? I know I should be looking for the needle in the Haystack, but lo...
Posted By : Enrique229 | 0 comments