Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Governance of Enterprise IT

Welcome to the Governance of Enterprise IT topic!

Collaborate, contribute, consume and create knowledge around IT governance in topics such as implementations, acquisitions, IT transformation and portfolio management.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1203 Members
1 Online
12480 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 104 total

Must be a Topic member to contribute
View All »
Hi all, Our organization has recently taken on formalizing a 3rd party risk program. This includes in scope Vendor Management/Supplier Governance. Currently, the organization makes purchases for technology, partnerships, etc. and our concern are around...
Chris860 | 4/6/2017 12:42:14 PM | COMMENTS(3)
With so much interest in Cyber Security, organizations are focused on perimeter security such as strong firewalls and educating staff about phishing emails. But I continue to read and hear about internal threats. There is also a lot of interest in Big Dat...
david ho | 3/27/2017 12:53:17 PM | COMMENTS(0)
I'm in the process of helping an organization select an IT governance framework. What would you say the one thing that makes COBIT better than other governance frameworks?
david ho | 2/22/2017 9:43:31 AM | COMMENTS(5)
How communication between IT AND Business will minimize failed initiatives and control raising of IT COST
Feroz349 | 2/18/2017 5:30:59 AM | COMMENTS(0)
What are the components GEIT framework
Feroz349 | 2/17/2017 3:39:36 AM | COMMENTS(0)
Before IT GOVERNANCE is implemented, is it must to have enterprise governance
Feroz349 | 2/16/2017 2:29:29 AM | COMMENTS(2)

Documents & Publications: 153 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 1142 days ago
Downloads
Posted by ISACA 2227 days ago
Books
Posted by ISACA 445 days ago
Books
Posted by ISACA 497 days ago
Books
Posted by ISACA 560 days ago

Events & Online Learning: 10 total

16 Mar 2015
ISACA International Event
Orlando, FL, USA
21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.
1 Aug 2016
ISACA International Event
Chicago, IL, USA

Journal Articles: 90 total

Volume 2, 2017
by Trevor J. Dildy, CCNA
Today’s enterprises have solutions in place to help with the detection and management of their information systems vulnerabilities, especially as it relates to system software and firmware.
Volume 2, 2017
by Ed Gelbstein, Ph.D., 1940-2015
This column presents the questions that would provide enough information to get started and the subsequent steps to come up with a realistic audit plan that adds value to the organization.
Volume 1, 2017
by Graciela Braga, CGEIT, COBIT Foundation, CPA
When discussing the impact of IT on cities, some questions arise: How have cities been transformed by IT? Can this transformation be measured? What are the benefits and risk factors of the transformation?
Volume 1, 2017
by Reviewed by Larry Marks, CISA, CRISC, CISM, CGEIT, CFE, CISSP, CRVPM, CSTE, ITIL, PMP
This short reference book walks through a firm’s governance structure and identifies high-level strategies that have to be considered in the context of the enterprise environment to gain value for application
Volume 1, 2017
by Richard Hoesl, CISSP, SCF, Martin Metz, CISA, Joachim Dold and Stefan Hartung
The average total cost of a data breach is about US $4 million, whereas the average cost for a stolen record increased slightly from US $154 in 2015 to US $158 in 2016.
Volume 1, 2017
by Ed Moyle
Most practitioners are already very accustomed to using technical tools for specific tactical purposes when it comes to security or assurance within their environments.

Wikis: 3 total

Blog Posts: 102 total

Seguro que todos hemos oído en los últimos meses noticiassobre ataques cibernéticos y el impacto que los mismos han tenido en diferentesindustrias y empresas. El último de ellos denominado “WannaCry” ha sidoconsiderado como uno de los mayores ataques info...
Posted By : Rene372 | 0 comments
Lately I have received a number of questions and concerns around NIST 800-171 so I wanted to write a quick brief on what you need to know.What is NIST 800-171?This is a special publication released by the National Institute of Standards and Technology (NI...
Posted By : Justin238 | 1 comments
Ransomware is a form of malware and is engineered to infect your personal computer and restrict access in some way, while demanding payment or ransom  to remove the restriction. First identified in 1989  under the name of PC Cyborg, today there are over 2...
Posted By : Robert658 | 1 comments
30 Mar 2017
When you think about your company information security, a greatest image come into your mind: * if my storage device crashed;* if my flashcopy in other storage device crashed too;* if my backup tape was in flame;* if my archive data was missed;* if my sec...
Posted By : MGPlay | 0 comments
Manejo de TI interno. El tener toda la estructura de TI internamente, sin subcontrataciones, puede dar una acumulación de problemas difíciles de manejar para una sola organización.Asociaciones con contrapartes. Al trabajar en un proyecto conjunto con una...
Posted By : Gladys789 | 0 comments
La razón de que varias páginas y servicios soportados por la nube de Amazon Web Services –entre ellos Netflix y Spotify- presentarán fallas el martes pasado se debió a un error humano, aseguró la compañía. El reporte de Amazon apuntaba que servidores S3 e...
Posted By : Rene372 | 0 comments