Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Information Security Management

Welcome to the Information Security Management topic!

Collaborate, contribute, consume and create knowledge around topics such as cloud computing, application security, vulnerability management, PCI, and data protection.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1481 Members
1 Online
14477 Visits

Community Leader

Marc Vael

Marc Vael

Title: Chief Information Security Officer

Badge: Energizer

Ross Peachey

Ross Peachey

Badge: Energizer

ShanShan

ShanShan

Badge: Social

Simiyu

Simiyu

Badge: Influential

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 125 total

Must be a Topic member to contribute
View All »
Hi All, I'm going to start the first step as a head of information security, my current position in the information technology operations, but I have a little knowledge in the field of security, actually I am looking for your kind advices and recommendati...
Tarek EL-Sherif | 4/25/2018 5:12:55 PM | COMMENTS(10)
I am looking for people to review individual chapters of my forthcoming book: Practical Cybersecurity: Guide to Best Practices and Standards. The book covers all the categories in the ISO 27000 suite and the ISF Standard of Good Practice for Information S...
William598 | 3/22/2018 12:10:34 PM | COMMENTS(5)
Is it possible to use crowd-sourced security intelligence to predict future events? For this exercise, experimental web site Security Predictions http://securitypredictions.xyz/ has been built to harness the ‘wisdom of crowds’.  As first experiment, let's...
Dragan Pleskonjic | 1/15/2018 10:44:00 PM | COMMENTS(1)
does the ATM anti skimming devices are operational risk or information security ?
Tarek EL-Sherif | 1/4/2018 10:36:16 AM | COMMENTS(2)
Hi all, I am looking to separate the security function from IT and would love if you could point me towards resources that show an org chart (preferably in the financial services sector) that support that argument and shows Security outside of IT, reporti...
danic1979 | 10/26/2017 12:34:38 PM | COMMENTS(5)
Dear Colleagues, As you know, Ukraine is being severely hit by cyberattacks. I am currently helping to define Information Security Organization and roadmap for a large Ukrainian manufacturing company. I am looking for examples of Information Security Orga...
Alexey808 | 8/7/2017 1:31:56 PM | COMMENTS(0)

Documents & Publications: 128 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 178 days ago
In 2017, Attacks will follow your Data Cyberthreats : What's Coming Next and how to prepare for it.
Posted by Mohamad Javed 524 days ago
A turning point for eGovernment development in Europe?
Posted by Mohamad Javed 525 days ago
How to Protect Yourself and Your Family Worth Spending some time on this Release from Cisco on How to Protect yourself. How do websites collect information? Why do websites collect information about you? What information do websites collect from your computer? Google Analytics How can you give or deny permission to collect information about you?
Posted by Mohamad Javed 525 days ago
Books
Posted by ISACA 647 days ago

Events & Online Learning: 15 total

16 Mar 2015
ISACA International Event
Orlando, FL, USA
15 Jun 2015
ISACA International Event
Ciudad de México, Mexico
1 Aug 2016
ISACA International Event
Chicago, IL, USA

Journal Articles: 351 total

Volume 3, 2107
by Jayakumar Sundaram, CISA, ISO 27001 LA
The SoA is a continuously updated and controlled document that provides an overview of information security implementation.
Volume 4, 2018
by Steven J. Ross, CISA, CISSP, MBCP
I submit that changing the definition of work necessitates a corresponding redefinition of security over the information with which we work.
Volume 4, 2018
by Vimal Mani, CISA, CISM, Six Sigma Black Belt
Recent cyberattacks have shaken faith in the traditional security measures implemented at global organizations in and around the SWIFT infrastructure in place.
Volume 4, 2018
by Amelia Ho, CISA, CISM, CA, CFE, CIA, CISSP, FRM, PMP
Organizations aim to achieve their objectives while managing risk within their risk appetites. A good governance structure for managing risk is to establish three lines of defense.
Volume 4, 2018
by Rob Clyde, CISM
Building Tomorrow’s Leaders, Today
Volume 4, 2018
by Mehmet Zeki Önal, CISA, CRISC, CGEIT, CCSA, CRMA
From the risk management perspective, the need for data governance exists not only in the insurance sector, but also in all sectors affected by IFRS regulations.

Wikis: 2 total

Blog Posts: 221 total

Just like CISSP , I think ISACA should  provide an associate member to passing the examination.  Untill you don't gain 5 year practical experience , you cant write CISA.  I still want to add that verifiable experience should not restrict one passer to sho...
Posted By : MUHAMMAD WASEEM RAJA | 0 comments
Various ERP softwares are in use currently to manage the businesses processes of the organization.  SAP, Oracle eBiz suite, Microsoft Dynamics etc. are the main players in this field at present.Many organizations, no matter their size, often fails to cont...
Posted By : SUJITH057 | 0 comments
2 Jul 2018
GDPR https://www.eugdpr.org/
Posted By : Lev Batishchev | 0 comments
17 Jun 2018
We are happy to announce that  on Feb//2018  the ISACA awareness session  was held in Baghdad.This the first time to speak about ISACA Value in Iraq.Professional from government and private sector were excited to hear about ISACA value and they started to...
Posted By : Ali099 | 2 comments
As end users have increased their usage of mobile devices, the number and sophistication of attacks are also increasing.  While I will focus on protecting your smartphones, you should keep in mind that many of the items discussed apply to your iPa...
Posted By : Robert658 | 4 comments
Training is a lifelong pursuit of any professional. It is our toolbox to keep our skills sharp and tuned for the next challenge. I am often asked what resources are available or how to become more proficient in the identity management specialty. Consider ...
Posted By : Kenneth687 | 1 comments