Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.


Share knowledge about CyberSecurity with other ISACA members and idenfity and discuss issues that need more guidance from ISACA. Collaborate, make connections and learn how to keep your organization safe from Cyber risks.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
2556 Members
3 Online
19109 Visits

Community Leader



Badge: Energizer



Title: Service Area Manager / Senior Managing Consultant

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 155 total

Must be a Topic member to contribute
View All »
Did anyone already take the CSX-P exam? Is there any information about the exam that your are able to disclose?What to expect? Level of expertise? How did you prepare? Did you pass? Kind regards, Patric
Patric Versteeg | 10/3/2015 7:17:07 AM | COMMENTS(9)
Hello! Do you know any reliable and secure phishing simulation tool to use within a company? It can be free or not. Thanks!  
Melanie168 | 9/29/2015 1:27:06 AM | COMMENTS(14)
Read more at: And share your thoughts.
M.Lambert | 9/15/2015 8:15:07 AM | COMMENTS(2)
Take a moment and read this PCmag article : «How Cybersecurity Has Changed Since 9/11»,2817,2392642,00.asp And share your thoughts
M.Lambert | 9/11/2015 10:34:09 AM | COMMENTS(1)
Has anyone started implementing NIST Cyber Security Framework in critical infrastructures such as Government, Banking & Financial Services, Healthcare, Energy Sector, Utilities, Telecommunications,  Transport, IT using COBIT 5.0?
Joseph Ponnoly | 9/7/2015 3:18:09 AM | COMMENTS(3)
This article suggest that you not only need to align with best practices bus must be in a position to prove it. What are your thoughts? Read more:
M.Lambert | 9/2/2015 8:01:08 PM | COMMENTS(2)

Documents & Publications: 76 total

Events & Online Learning: 4 total

Journal Articles: 78 total

Volume 5, 2015
by Jeimy J. Cano, Ph.D., COBIT Foundation, CFE
Cyberinsurance is a way to account for cyberrisk and considers the new possible business responsibilities arising from operating in an international context.
Volume 5, 2015
by Fredric Greene, CISSP
Detective controls are a key component of a cybersecurity program in providing visibility into malicious activity, breaches and attacks on an organization’s IT environment.
Volume 5, 2015
by Gary Lieberman, Ph.D., CISSP
With 2014 being known as The Year of the Mega Breach, cyberattacks have quickly become a key focus in almost every BC/DR program.
Volume 5, 2015
by Michele Mosca, Ph.D.
In the Information Age, many of one’s most valuable belongings—finances, medical histories and, to a large extent, identities—are kept safe behind digital deadbolts.
Volume 5, 2015
by Steven J. Ross, CISA, CISSP, MBCP
If you think of cyberattacks as war, which it is in both the figurative and literal senses, make yourself ready to win it.
Volume 5, 2015
by Ganapathi Subramaniam
How do I ensure that my organization has controls to protect itself from cyberrisk?

Wikis: 2 total

Blog Posts: 19 total

On my last post in the CCI Blog, I described how American Water Works Association Cyber Security Framework didn’t addressed the detection Cyber Security events measures for these control systems.Today I have seen a good tweet (as always) from our collea...
Posted By : Enrique229 | 0 comments
Water Management Cyber Security guide from the American Water Works Association is bypassing certain critical controls on ICS Networks. Are we still in time in Spain to avoid this mishap? I know I should be looking for the needle in the Haystack, but lo...
Posted By : Enrique229 | 0 comments
Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments
  Rob Stroud is the New York based Vice President of Strategy and Innovation at CA Technologies and is the current President for the 2014-15 administrative term.  I caught up with Rob in Australia when he visited Canberra in June 2014...
Posted By : Rob Hanson | 2 comments
I saw Garry at the Sydney Chapter’s successful Strategic Planning event in July 2014.  He was animated and gregarious during the evening’s cocktail event and it felt good to see him again and catch...
Posted By : Rob Hanson | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments