Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.


Welcome to the Forensics topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
495 Members
0 Online
7386 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 11 total

Must be a Topic member to contribute
View All »
Looking for an overview of available datasets, preferably labeled (annotated) that can be used by researchers (machine learning - ML) and where to find them. There are various sources on Internet, but more sources, especially credible ones, are welcome. T...
Dragan Pleskonjic | 11/14/2017 7:24:07 AM | COMMENTS(0)
How should providers and clients of cloud computing services be ready for data forensics? The quality of the results of data examination depends on the quality of the raw material available (and on the skills of the forensic examiner of course). ...
StephaneV | 12/16/2016 5:14:09 PM | COMMENTS(13)
HI Folks,I am looking to learn malware reversing.Does anyone have any samples and tutorials for this area please ? I found this tutorial, but wondered if anyone had anything more uptodate
JayMIET927 | 10/23/2016 3:42:26 AM | COMMENTS(2)
Dear Friends,I realised the importance of forensics when I wrote the below mentioned books. I mentioned about it in the first book, as it is a mandatory aspect of evidence gathering. The relevance of the second book for Forensics is from the perspective o...
rskannan | 8/10/2016 5:15:06 AM | COMMENTS(0)
Hope you don't mind me posting in this groupabout this year's ISACA Ireland conference, which is focusing on placingbusiness first. Wewould like this conference to be as successful as last year's, which was trulyinternational with 24 speakers from 12 coun...
Neil_Curran | 6/17/2015 4:05:56 AM | COMMENTS(0)
By 2016, FBI could be allowed to perform remote searches all over the globe; no longer bound by physical (country) jurisdictions. Question remains: Knowing that performing these actions may strain international relationships or break local laws;...
M.Lambert | 3/29/2015 12:49:09 PM | COMMENTS(0)

Documents & Publications: 7 total

Must be a Topic member to contribute
View All »
Posted by ISACA 1146 days ago
White Papers
Posted by ISACA 1164 days ago
Posted by ISACA 1468 days ago

Events & Online Learning: 0 total

No Results Found

Journal Articles: 6 total

Volume 2, 2016
by Leighton R. Johnson III | Reviewed by A. Krista Kivisild, CISA, CA, CPA
The book addresses how to prosecute malicious insiders or external hackers and describes all of the incident response stages that should be followed and completed.
Volume 4, 2015
by Matthew Pepe, Jason Luttgens and Kevin Mandia | Reviewed by Dino Ippoliti, CISA, CISM
This book is useful to anyone who is concerned about dealing with the inevitable security incident, from IT professionals to senior managers.
Volume 1, 2014
by Dauda Sule, CISA
Almost all organizations are now dependent, one way or another, on information technology. This has led to a great deal of development as well as associated risk.
Volume 3, 2011
by Tommie W. Singleton and Aaron J. Singleton | Reviewed by Horst Karin, Ph.D., CISA, CISP, ITIL
The mission of this book is to provide a comprehensive textbook filled with knowledge, experience and methodologies for the financial auditor, fraud auditor and forensic accountant.
Volume 5, 2010
by Robert Schperberg, CISM, EnCEP
Schperberg is Chevron’s global IT forensics investigations lead.
Volume 2, 2010
by Yin Pan, Ph.D., Bill Stackpole and Luther Troell, Ph.D.

Wikis: 2 total

Blog Posts: 3 total

Must be a Topic member to view blog posts
For a long time, the main focus of most organization was to have a solid protected network perimeter, by installing the most powerful shiny firewall, IPS/IDS to avoid intruders to trespass inside their networks. The endpoint (host) protection was always c...
Posted By : Willian Guilherme | 1 comments
13 Nov 2014
Now a days, you don’t need to be a IT guru or best software programmer to access /control other personal/organization data. If you follow below techniques, you can easily get confidential information.1. Masquerading2. Tailgeting (Piggy back)3. Dumpster di...
Posted By : Shaklain | 1 comments
Source: DEFT (acronym for Digital Evidence & Forensics Toolkit) is a distribution made for Computer Forensics, with the purpose of running live on systems without tampering or corrupting devices (hard disks, pendrives, ...
Posted By : Rungga767 | 0 comments