Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Enterprise Data Management

Welcome to the Enterprise Data Managementl topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
284 Members
0 Online
7800 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 9 total

Must be a Topic member to contribute
View All »
Any one can help me with audit program for EDMs. Thanks and best regards
Turki347 | 3/20/2018 9:40:43 AM | COMMENTS(4)
I need advice on how to bridge the gap between following global standards to design an enterprise architecture and political policies or processes that do not agree with the global standards. We are developing a system for a government linked agency an...
K Muronga | 5/30/2016 3:24:58 AM | COMMENTS(0)
What are your experiences in data classification processess... i.e. to determine which is the sensitive info
sandropsaila | 3/30/2016 1:55:08 PM | COMMENTS(8)
Enterprise Data Models (EDMs) are used extensively in organizations that develop applications. However, most projects I’ve seen tend to be large major undertakings where there already is an existing data governance function.   For where there is no existi...
Gcookz | 9/18/2015 1:48:33 PM | COMMENTS(1)
Brooke Miller and I plan to present at NACACS in May on Embedding Data Analytics into Continuous/Fraud Auditing.  This will be somewhat of a case study, as we will discuss the tactical side of continuous auditing, including successes and pitfalls of data ...
SeanS | 5/22/2015 11:00:42 AM | COMMENTS(2)
In 2012 the Cloud Security Alliance and ISACA conducted a Cloud Computing Market Maturity study that identified that organizations were looking to cloud service providers to provide innovative solutions that would benefit user organizations.  A year has p...
Ron Hale Ph.D. CISM | 8/12/2013 10:55:27 AM | COMMENTS(0)

Documents & Publications: 10 total

Must be a Topic member to contribute
View All »
Posted by ISACA 1436 days ago
Posted by ISACA 1468 days ago
Posted by ISACA 1566 days ago
Posted by ISACA 1725 days ago
Experienced business and IT professionals know that optimizing their use of big data as a resource will deliver real business value to the enterprise stakeholders.
Posted by ISACA 1725 days ago

Events & Online Learning: 6 total

13 Aug 2018
ISACA International Event
Nashville, Tennessee, US
2018 GRC Conference - 13-15 August , Nashville, TN. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 71 total

Volume 3, 2018
by Giuliano Pozza, CGEIT, e-CF Plus (CIO), ITIL v3
The world of information and data management is changing faster than anyone could have predicted a few years ago, and attention to sensitive data protection is growing, as the new GDPR is clearly proving.
Volume 3, 2018
by Chip Jarnagin, CISSP, CSM, PMP, and Sonja Hammond, CISSP, ITIL Foundation, PCI-ISA
The exposure of data for up to 14 million of Verizon’s customers in July 2017 was an enormous embarrassment, particularly for an organization that presents itself as a premium cybersecurity consultancy.
Volume 3, 2018
by T. Sean Kelly
Proactive IG requires collaboration among legal, compliance, security and IT teams to take an incremental, measurable approach to deal with today’s enterprise data challenges.
Volume 2, 2018
by Joshua McDermott, CISA, CEH, CISSP, PMP
Over the past several years, big data has emerged as one of the top strategic technology priorities for organizations.
Volume 2, 2018
by Ray Cheung, CISA, CITP, CPA, Vikas Sharma, CISA and Bhupinder Singh, CISA, CISM, ITIL v3, PMP, QSA
It is no surprise that many enterprises, ranging from early start-ups to mature global enterprises, have considered or implemented a migration to Amazon Web Services’ (AWS) cloud computing services.
Volume 1, 2018
by Paolo Gasperi, CISM, CSIRT Transits First-I, ISO 27001, Luigi Sbriz, CISM, CRISC, ISO 27001, ITILv3 and Marco Tomazzoni, CSIRT Transits First-I
This article describes a solution for how to identify in the enormous breadth of the unstructured world of big data just that information of potential enterprise interest.

Wikis: 2 total

Blog Posts: 8 total

My personal thoughts after listening to C-level executives at the CxO Roundtable Series sponsored by Intel, IBM, HyTrust & ReedSmith. For an invite, please reach out to me. Data Protection under the GDPR For past few months, I’ve been helping to org...
Posted By : Thomas152 | 1 comments
Senior Manager           ultimate responsibility Information security Officer          functional responsibility Security Analyst           Strategic, develops policies and guidelines Owner         - Responsible for asset         - Determine level of clas...
Posted By : Muhammad554 | 0 comments
“Enterprise architecture is now a strategic componentof every forward-thinking organization around the world.”Source: Related Article: Common Perspective on Enterprise Architecture: http://feapo....
Posted By : SA | 1 comments
Let us have positive inspirational slogans for every situation. Last week I started the project meeting like this: I don't know you are all so good at tuning the website. The performance is now is wonderful. I could witness reduction of stress, anxiety an...
Posted By : Jayakumar Sundaram | 1 comments
13 Nov 2014
The increased complexity and diversity in the information systems and the inability to rebuild the information systems from scratch is forcing enterprises to look at EAI as an alternative solution that will help extend the life of the existing application...
Posted By : Kannan | 1 comments
13 Nov 2014
Posted By : masarker | 4 comments