Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Incident Management

Welcome to the Incident Management topic!

Collaborate, contribute, consume and create knowledge around topics such as incident response policy, team structure, handling and preventing incidents, detection and analysis, containment, recovery and post activities.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
306 Members
0 Online
6057 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 9 total

Must be a Topic member to contribute
View All »
Hi All, I am new in this community.  I am wondering if anybody within the group has a work program for Problem Management, mainly the IT Helpdesk / Operations area.  cheers, YS
Yee San | 11/10/2014 8:21:35 PM | COMMENTS(3)
Has your organization created and implemented an Incident Management (or Response) Team? If so, who makes up your team in terms of position within the organization? I'm just looking to spur some discussion on the matter ;). I would say that most of the ...
Evan@FRSecure | 11/10/2014 7:59:08 PM | COMMENTS(7)
Welcome to the Incident Management Community! Please take a moment to introduce yourself to the group and tell us a little about yourself.  Is there anything in particular that led you to join the group? I look forward to some good discussion here, and ...
Evan@FRSecure | 8/7/2014 4:10:47 AM | COMMENTS(10)
Hi Everyone, I'm the chapter president of ISACA Ireland and would like to let members of this topic know that we are seeking innovative, practical and / or thought provoking session proposals for our conference on 3rd Oct 2014.  For knowledge center membe...
Neil_Curran | 8/2/2014 1:16:21 PM | COMMENTS(1)
Hi, All I'm Vera. I'm an IT auditor. I'm new in incident management, since before this I just see whether the problems or incidents coming were fixed and also the root cause. I wanna develop my audit program and also give deeper analysis about incid...
Vera525 | 7/22/2014 7:55:52 PM | COMMENTS(2)
Which is the efficient method or framework to use to get feedback from service requester to determine that their request was well handled either by 1st level or 2nd level support and should actually be closed without over stressing the Help Desk.
EVA956 | 3/11/2014 4:58:08 AM | COMMENTS(0)

Documents & Publications: 12 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 87 days ago
White Papers
Posted by ISACA 258 days ago
Research
Posted by ISACA 314 days ago
Books
Posted by ISACA 411 days ago

Events & Online Learning: 2 total

6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
29 Sep 2014
ISACA International Event
Barcelona, Spain
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM 2014—the leading European conference for IT audit, assurance, security and risk professionals.

Journal Articles: 19 total

Volume 6, 2014
by Flint Brenton
While there is no one-size-fits-all solution to securing every network, the following seven mistakes of current SIEM systems must be solved to effectively secure data in the modern enterprise.
Volume 5, 2013
by Samuel P. Kuntz, CGEIT, ITIL V3F
Too many times daily operations and projects are impacted in some way by a vendor not being prepared for some easily foreseen event that could happen—both major and minor.
Volume 4, 2012
by Debasis Bandyopadhyay, CISA, CISM, CGEIT, PMP, TOGAF9, ITIL v3 (F)
This article shares some of the practical challenges in IT service management (ITSM) and how the ITIL framework can be used to overcome those challenges.
Volume 2, 2012
by Steven J. Ross, CISA, CISSP, MBCP
The Conference Board study addresses the resilience of companies “to bounce back from a disruption” caused by security events, which are defined rather loosely as environmental disasters, terrorism and cyberattacks.
Volume 2, 2012
by Gan Subramaniam, CISA, CISM, CCNA, CCSA, CIA, CISSP, ISO 27001 LA, SSCP
What should be the recovery strategy that I must impose on the vendor to ensure an effective recovery of the services, if a crisis were to ever occur?
Volume 2, 2012
by Steve Markey
This article discusses the genesis for CSIR testing, several testing methodologies and/or exercises with which an organization can assess the maturity of its CSIR plan/program.

Wikis: 2 total

Blog Posts: 1 total

Must be a Topic member to view blog posts
The UK’s Bribery Act 2010 (the Act) which will come into force on 1 July 2011 represents a strengthening of the UK position on bribery and corruption and an important development in global anti-bribery legislation. But what exactly is considered to a brib...
Posted By : Guido2005 | 0 comments