Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Incident Management

Welcome to the Incident Management topic!

Collaborate, contribute, consume and create knowledge around topics such as incident response policy, team structure, handling and preventing incidents, detection and analysis, containment, recovery and post activities.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
429 Members
2 Online
7381 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 16 total

Must be a Topic member to contribute
View All »
A good discussion is in progress here about: Incident Management vs Problem Managementhttp://www.isaca.org/Groups/Professional-English/cism-exam-study-community-2013/Pages/ViewDiscussion.aspx?PostID=743
-adnan- | 6/23/2016 3:18:44 AM | COMMENTS(3)
Does anyone have (or can point me to) a list of generic security incident use cases? Clearly many will focus on breach of specific security policy statements, acceptable usage, data leakage, etc. as well as more serious breaches etc. A generic list might ...
Phil Green | 2/25/2016 5:23:22 AM | COMMENTS(3)
Just wondering if anyone has every audited an outsourced SIEM service provider and are willing to share experience and audit program. Will soon be auditing Dell's SecureWorks which is the outsourced SIEM service provider. SecureWorks receives Events of ...
James12765 | 2/4/2016 9:18:08 AM | COMMENTS(1)
Hello, does any one have a link to a solid example of an Incident Response Audit Program? I found an ISACA one that's pretty detailed (http://www.isaca.org/knowledge-center/research/researchdeliverables/pages/security-incident-management-audit-assuran...
Jeff Murfin | 1/28/2016 7:45:42 AM | COMMENTS(3)
Within my current assignment I faced with a question: What metrics and KPIs could be established to measure performance of the company's CERT? or may be there could be some kind of SLA which is structured by incidents significance? (e.g. service level...
Maksym Pomerko | 12/23/2015 4:49:35 AM | COMMENTS(2)
I am wondering if anyone out there has implemented or tried to implement security incident management aligned to either ISO 27001 or ISO 27035. I am wondering if you can share your experiences on the following: 1. challenges in adopting the Standard d...
Terry421 | 12/23/2015 4:16:15 AM | COMMENTS(4)

Documents & Publications: 13 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 259 days ago
Books
Posted by ISACA 590 days ago
Books
Posted by ISACA 673 days ago

Events & Online Learning: 1 total

9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.

Journal Articles: 24 total

Volume 3, 2016
by Teju Oyewole, CISA, CISM, CRISC, COBIT Assessor, CISSP, CSOE, ISO 27001 LA, ITIL, MBCS, PMP
To establish a mature and effective IR process, organizations should focus not only on the technical aspect, but also on human behavior through the situation awareness (SA) theory.
Volume 3, 2016
by Aleksandr Kuznetcov, CISM
This article addresses an existing imbalance between technical issues and process aspects related to SIEM.
Volume 2, 2016
by George Quinlan
Get to know your network.
Volume 2, 2016
by Shubhamangala B. R. and Snehanshu Saha, Ph.D.
Why are breaches continuing despite deploying cutting-edge solutions supported by compliance to thwart the attacks?
Volume 2, 2016
by Sanjiv Agarwala, CISA, CISM, CGEIT, BS 25999/ISO 22301 LA, CISSP, ISO 27001:2013 LA, MBCI
Cybersecurity threats are on the rise. Every organization is connected to one another, and any organization can become the victim of cyberattacks.
Volume 2, 2016
by Leighton R. Johnson III | Reviewed by A. Krista Kivisild, CISA, CA, CPA
The book addresses how to prosecute malicious insiders or external hackers and describes all of the incident response stages that should be followed and completed.

Wikis: 2 total

Blog Posts: 2 total

Must be a Topic member to view blog posts
Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments
The UK’s Bribery Act 2010 (the Act) which will come into force on 1 July 2011 represents a strengthening of the UK position on bribery and corruption and an important development in global anti-bribery legislation. But what exactly is considered to a brib...
Posted By : Guido2005 | 0 comments