Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

CyberSecurity

Share knowledge about CyberSecurity with other ISACA members and idenfity and discuss issues that need more guidance from ISACA. Collaborate, make connections and learn how to keep your organization safe from Cyber risks.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
3131 Members
9 Online
23604 Visits

Community Leader

M.Lambert

M.Lambert

Title: CISO

Badge: Influential

Melody

Melody

Title: Service Area Manager / Senior Managing Consultant

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 500 total

Must be a Topic member to contribute
View All »
Hi All I'm wondering whether there is a tool that will detect, monitor and alert when large amount of data is leaving the organisation without any personnel noticing such movement. Thanks in advance
DK19 | 1/19/2017 10:43:35 PM | COMMENTS(1)
2 QUESTIONS FOR THE GROUP: - - - - - 1- Have you performed phishing campaigns in your own organization? - - - - - 2- Do you think it is something everyone should try ? - - - - - Ryan Barrett, VP of Security and Privacy at Intermedia writes:...
M.Lambert | 1/19/2017 12:02:18 PM | COMMENTS(0)
Esther Han from The Sydney Morning Herald reports: “It's easy to think you can spot a scam email, with all the talk about spelling mistakes, "too good to be true" offers, and strange web addresses. But scammers have come a very long way.” - - - - - S...
M.Lambert | 1/16/2017 7:08:53 AM | COMMENTS(0)
Russian cybercriminals have built a new high-tech fraud enterprise: Showing real ads to fake people. The fraud has siphoned more than $180 million from the online ad industry, according to researchers. http://money.cnn.com/2016/12/20/technology/ad-fraud-o...
Shamik | 1/13/2017 5:07:41 PM | COMMENTS(2)
Worth reviewing : http://www.msn.com/en-us/money/technology/the-secrets-hackers-know-to-steal-your-money/ss-BByaviu?fullscreen=true#image=1 Good suggestions.
Shamik | 1/13/2017 5:00:24 PM | COMMENTS(4)
Kevin Townsend from security Week reports: “E-Sports Entertainment Association (ESEA) Becomes the Latest Data Breach Victim With Data of 1.5 Million Users Stolen” - - - - - “As it is, the ESEA decided that a public leak of their customer database wasn't...
M.Lambert | 1/11/2017 2:22:24 PM | COMMENTS(0)

Documents & Publications: 60 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 104 days ago
Books
Posted by ISACA 175 days ago
Press release that summarizes the provisions in the new rules and implementation information
Posted by M.Lambert 279 days ago
Books
Posted by ISACA 370 days ago
Books
Posted by ISACA 423 days ago

Events & Online Learning: 3 total

1 Aug 2016
ISACA International Event
Chicago, IL, USA
17 Oct 2016
ISACA International Event
Las Vegas, NV, US

Journal Articles: 102 total

Volume 6, 2106
by Venkatasubramanian Ramakrishnan, CISM, CRISC, CHFI
Bayesian networks can capture the complex interdependencies among risk factors and can effectively combine data with expert judgment.
Volume 1, 2017
by Jack Jones, CISA, CRISC, CISM, CISSP
Now that senior executives have begun to take a serious interest in cyber and technology risk, it is necessary to provide meaningful and useful answers to the questions they are beginning to ask.
Volume 1, 2017
by Steven J. Ross, CISA, CISSP, MBCP
In the second quarter of 2016, a colleague shared with me an article and a database titled “The Dynamics of Cyber Conflict Between Rival Antagonists, 2001–11,” ...
Volume 1, 2017
by Gail Coury, CISA, CISM, CISSP
Get to know your network.
Volume 1, 2017
by Phillimon Zongo
Artificial intelligence (AI) systems, riding on the exponential increases in computing power and the availability of big data, are outperforming humans in numerous domains.
Volume 6, 2016
by Marcus Chambers, CISM, CGEIT, CEng
Get to know your network.

Wikis: 2 total

Blog Posts: 22 total

Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments
For a long time, the main focus of most organization was to have a solid protected network perimeter, by installing the most powerful shiny firewall, IPS/IDS to avoid intruders to trespass inside their networks. The endpoint (host) protection was always c...
Posted By : Willian Guilherme | 0 comments
The PCI Council has announced some new information on the upcoming version of PCI - Version 3.2.  Find out the latest here: http:/www.lbmcinformationsecurity.com/blog
Posted By : Stewart141 | 0 comments
On my last post in the CCI Blog, I described how American Water Works Association Cyber Security Framework didn’t addressed the detection Cyber Security events measures for these control systems.Today I have seen a good tweet (as always) from our collea...
Posted By : Enrique229 | 0 comments
Water Management Cyber Security guide from the American Water Works Association is bypassing certain critical controls on ICS Networks. Are we still in time in Spain to avoid this mishap? I know I should be looking for the needle in the Haystack, but lo...
Posted By : Enrique229 | 0 comments
Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments