Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Information Security Management

Welcome to the Information Security Management topic!

Collaborate, contribute, consume and create knowledge around topics such as cloud computing, application security, vulnerability management, PCI, and data protection.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1189 Members
1 Online
11975 Visits

Community Leader

Marc Vael

Marc Vael

Title: Chief Audit Executive

Badge: Influential

Ross Peachey

Ross Peachey

Badge: Energizer

ShanShan

ShanShan

Badge: Social

Simiyu

Simiyu

Badge: Influential

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 97 total

Must be a Topic member to contribute
View All »
ISACA recently awarded the 30,000th CISM certification. Since its introduction in 2002, the CISM credential has become recognized and adopted worldwide as a symbol of excellence for information security professionals. Why did you decide to pursue the CISM...
Marc Vael | 2/11/2016 12:40:19 AM | COMMENTS(2)
Hello, I am working on a Cyber Security Awareness program for my company and I was looking for some suggestions, guidance, templates, etc. that anyone could provide. I want this to be an all year program that reiterates the areas covered in the annual cyb...
uvesed | 2/5/2016 4:09:41 PM | COMMENTS(8)
Hi All, I'm going to start the first step as a head of information security, my current position in the information technology operations, but I have a little knowledge in the field of security, actually I am looking for your kind advices and recommendati...
Tarek EL-Sherif | 1/22/2016 5:52:21 PM | COMMENTS(7)
Hello, I am looking for documentation to support a recommendation that a user’s network account should be automatically disabled once a term date is input in the HR system. Are there any best practice or reference material that anyone can point me to? Lo...
Angela468 | 1/22/2016 3:43:19 AM | COMMENTS(5)
Does anyone have (or can point me to) a good set of generic use cases for security incident management? I appreciate there are some obvious examples (e.g., laptop theft, privileged access mis-use, confidential data leakage, etc.) and also that a number of...
Phil Green | 1/3/2016 5:06:50 AM | COMMENTS(0)
Hi All, I'm interested in what measures people are reporting upwards to demonstrate that the security program is on-track. That the expected business benefits are being delivered cost-effectively and that security risk is managed.Are you able to re-use ex...
Ross Peachey | 12/16/2015 10:04:49 AM | COMMENTS(2)

Documents & Publications: 206 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 20 days ago
Books
Posted by ISACA 27 days ago
Books
Posted by ISACA 27 days ago
Books
Posted by ISACA 59 days ago

Events & Online Learning: 15 total

Journal Articles: 226 total

Volume 1, 2016
by Kleuber Tormim, COBIT Foundation, Green IT, ISO 20000, ISO 27000, ITIL-Expert, Vitor Tormin Nishi, COBIT Foundation, ITIL-F, ISO 27002 and Mauricio Rocha Lyra, Ph.D., COBIT Foundation, CTFL, ISO 20000, ITIL, MCSO, OCUP, PMP, RUP
Information security is a primary concern that pervades all organizations and comprises confidentiality, integrity and availability.
Volume 1, 2016
by Mark Johnston
In July 2015, CVS became the latest company to fall victim to an apparent breach, this one involving credit card data obtained via its web site for ordering and processing photos.
Volume 1, 2016
by C. Warren Axelrod, Ph.D., CISM, CISSP
Information security professionals continue to struggle with acquiring and understanding the most relevant and useful data in order to anticipate threats, guard against attacks and determine forensically what happened after a hack occurs.
Volume 1, 2016
by Tolga Mataracioglu, CISA, CISM, COBIT Foundation, CCNA, CEH, ISO 27001 LA, BS 25999 LA, MCP, MCTS, VCP
The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle branded credit cards from the major card companies, including Visa, MasterCard, American Express, Discover and JCB.
Volume 1, 2016
by Martin Coe, DBA, CISA, CISM, CPA
Information security risk has dramatically evolved; however, security strategies that are typically compliance-based and perimeter-oriented have not kept pace.
Volume 6, 2015
by Jim Seaman, CISM, CRISC
The fantasy once associated with science fiction films is becoming increasingly similar to modern life.

Wikis: 2 total

Blog Posts: 124 total

Nigeria Internet Registration Association (NiRA) is the registry for .ng Internet Domain Names and maintains the database of names registered in the .ng country code Top Level Domain. NiRA is a self-regulating body and managers of the .ng national resou...
Posted By : Udeagu | 0 comments
jumping in with both feet, any advise or direction to prepare for June testing is welcome, thank you, Robert
Posted By : Robert125 | 1 comments
With the news that a new initiative into AI OpenAI has been created, I am eager to understand the effect on the Infosec community, if any. OpenAI is funded to the tune of $1 Billion with the statement :"Our goal is to advance digital intelligence in the w...
Posted By : Az_shah | 0 comments
The insider threat has been considered over the last years as the most serious security issue that organizations are actually facing. If scientific research has been focus so far on the way to protect company asse...
Posted By : Luckner739 | 0 comments
Yes! Here I like to share my story about how I start my journey to become CISA, that I heard firstly from my CEO Mr. Amien Sunaryadi CISA, He suggest that all the Internal Audit Staff and Manager in our company (SKK Migas) to get this certification. The...
Posted By : Fitra238 | 0 comments
Information Security Managers (ISMs) are task with providing security oversight in defending organisations data, systems and building Infrastructures it depends on for making profit, against threats, risks and vulnerabilities such as cyber attacks from th...
Posted By : Prince143 | 0 comments