Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Incident Management

Welcome to the Incident Management topic!

Collaborate, contribute, consume and create knowledge around topics such as incident response policy, team structure, handling and preventing incidents, detection and analysis, containment, recovery and post activities.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
268 Members
1 Online
5731 Visits

 Recent Discussions

Feedback from service requestors in incident management. Posted by EVA956.
Introduce Yourself!. Posted by Evan@FRSecure.
Risk Analysis and Asset Prioriitization. Posted by Vera525.

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

NEW! Participate in Discussions Via Email. 

You can now respond to discussions by simply replying to the email alert. Just enable this feature in discussions on this topic. Learn more

Discussions: 8 total

Must be a Topic member to contribute
View All »
Which is the efficient method or framework to use to get feedback from service requester to determine that their request was well handled either by 1st level or 2nd level support and should actually be closed without over stressing the Help Desk.
EVA956 | 3/11/2014 4:58:08 AM | COMMENTS(0)
Welcome to the Incident Management Community! Please take a moment to introduce yourself to the group and tell us a little about yourself.  Is there anything in particular that led you to join the group? I look forward to some good discussion here, and ...
Evan@FRSecure | 1/13/2014 4:37:25 AM | COMMENTS(9)
Hi, All I'm Vera. I'm an IT auditor. I'm new in incident management, since before this I just see whether the problems or incidents coming were fixed and also the root cause. I wanna develop my audit program and also give deeper analysis about incid...
Vera525 | 9/11/2013 11:08:16 PM | COMMENTS(1)
Hi All, I am new in this community.  I am wondering if anybody within the group has a work program for Problem Management, mainly the IT Helpdesk / Operations area.  cheers, YS
Yee San | 1/31/2013 12:24:56 AM | COMMENTS(2)
Has your organization created and implemented an Incident Management (or Response) Team? If so, who makes up your team in terms of position within the organization? I'm just looking to spur some discussion on the matter ;). I would say that most of the ...
Evan@FRSecure | 2/20/2012 5:50:58 AM | COMMENTS(6)
A volunteer group under the leadership of Salomon Rico as project chair has developed a whitepaper on incident response. We are looking for additional volunteers to act as subject matter expert (SME) reviewers as soon as possible. Reviewers will have to e...
eleighninger | 1/3/2012 2:26:44 PM | COMMENTS(0)

Documents & Publications: 11 total

Must be a Topic member to contribute
View All »
White Papers
Posted by ISACA 94 days ago
Research
Posted by ISACA 150 days ago
Books
Posted by ISACA 248 days ago
Books
Posted by ISACA 248 days ago

Events & Online Learning: 2 total

6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
29 Sep 2014
ISACA International Event
Barcelona, Spain
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM 2014—the leading European conference for IT audit, assurance, security and risk professionals.

Journal Articles: 18 total

Volume 5, 2013
by Samuel P. Kuntz, CGEIT, ITIL V3F
Too many times daily operations and projects are impacted in some way by a vendor not being prepared for some easily foreseen event that could happen—both major and minor.
Volume 4, 2012
by Debasis Bandyopadhyay, CISA, CISM, CGEIT, PMP, TOGAF9, ITIL v3 (F)
This article shares some of the practical challenges in IT service management (ITSM) and how the ITIL framework can be used to overcome those challenges.
Volume 2, 2012
by Steven J. Ross, CISA, CISSP, MBCP
The Conference Board study addresses the resilience of companies “to bounce back from a disruption” caused by security events, which are defined rather loosely as environmental disasters, terrorism and cyberattacks.
Volume 2, 2012
by Gan Subramaniam, CISA, CISM, CCNA, CCSA, CIA, CISSP, ISO 27001 LA, SSCP
What should be the recovery strategy that I must impose on the vendor to ensure an effective recovery of the services, if a crisis were to ever occur?
Volume 2, 2012
by Steve Markey
This article discusses the genesis for CSIR testing, several testing methodologies and/or exercises with which an organization can assess the maturity of its CSIR plan/program.
Volume 1, 2012
by Prakhar Srivastava and Tarun Verma
Log management can play a pivotal role in addressing PCI DSS requirements, be a success factor and enabler for safeguarding cardholder transaction data, and provide a secure and vulnerability-free environment for cardholders.

Wikis: 2 total

Blog Posts: 1 total

Must be a Topic member to view blog posts
The UK’s Bribery Act 2010 (the Act) which will come into force on 1 July 2011 represents a strengthening of the UK position on bribery and corruption and an important development in global anti-bribery legislation. But what exactly is considered to a brib...
Posted By : Guido2005 | 0 comments