Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Information Security Management

Welcome to the Information Security Management topic!

Collaborate, contribute, consume and create knowledge around topics such as cloud computing, application security, vulnerability management, PCI, and data protection.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1307 Members
0 Online
12981 Visits

Community Leader

Marc Vael

Marc Vael

Title: Chief Audit Executive

Badge: Influential

Ross Peachey

Ross Peachey

Badge: Energizer

ShanShan

ShanShan

Badge: Social

Simiyu

Simiyu

Badge: Observer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 114 total

Must be a Topic member to contribute
View All »
Hello all, I am searching information regarding topic of Cyber Security Capability Maturity Models. Currently analyzing:> Electricity Subsector Cybersecurity Capability Maturity MODEL (ES-C2M2) as main background document;> ISO/IEC 33071 DIS PAS Informati...
Tomas Martinkėnas | 11/28/2016 9:48:37 AM | COMMENTS(3)
It was brought to my attention the need to create information security charters for each department, although I really feel that it meant to say “create an information security program for each department” as part of the organization’s security charter. F...
Raul Dusa | 11/25/2016 5:49:08 AM | COMMENTS(6)
Hi everyone...please share anything on this topic "Formation of Security Operation Center"
Mir526 | 10/22/2016 3:01:18 PM | COMMENTS(1)
what is the ideal job description for Head of information security to setup a new infosec team in a bank, i need the job description to submit it to HR dept. to Determine the job weight and set a suitable corporate title for this position.
Tarek EL-Sherif | 9/19/2016 12:03:52 PM | COMMENTS(2)
Dear colleagues,  In my company we experience serious difficulties with assigning ownership of the business systems to the people from the business. According to ISO27001, the Asset Owner should be responsible for information classification, controlling t...
Lilia Georgieva | 9/19/2016 11:53:25 AM | COMMENTS(5)
ISACA recently awarded the 30,000th CISM certification. Since its introduction in 2002, the CISM credential has become recognized and adopted worldwide as a symbol of excellence for information security professionals. Why did you decide to pursue the CISM...
Marc Vael | 8/29/2016 4:57:13 AM | COMMENTS(5)

Documents & Publications: 206 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 57 days ago
Books
Posted by ISACA 57 days ago
Books
Posted by ISACA 201 days ago
Books
Posted by ISACA 271 days ago

Events & Online Learning: 20 total

Journal Articles: 267 total

Volume 6, 2016
by Craig Krivin, Sanjay Bhide, Sandeep Desai, Ravi Dhaval, Joe Norris, Amanthi D. Pendegraft, Susan E. Snow and Dan Wagner
The ISACA Phoenix (Arizona, USA) Chapter research committee set out to learn more about the wave of wearable devices and understand the ISACA community’s attitudes toward wearables’ potential risk and security impacts in the workplace.
Volume 6, 2016
by Shirali Vyas, CA, ICAI
The 2008 financial crisis and its cascading effects have made it necessary to redefine the supplier risk management norms.
Volume 6, 2016
by Steven J. Ross, CISA, CISSP, MBCP
In May 2016, the G7 leaders met in Ise-Shima, Japan, and produced a document that has real meaning for all of us who care about cyber security.
Volume 6, 2016
by Lance Dubsky, CISM, CISSP
CISOs and CSOs need to ensure that their enterprise risk management programs have a solid foundation—the enterprise risk management framework.
Volume 6, 2016
by Marcus Chambers, CISM, CGEIT, CEng
Get to know your network.
Volume 5, 2016
by Karina Korpela, CISA, CISM, CRISC, CISSP, PMP, and Paul Weatherhead, CISSP
Once approval to perform an information security audit and, most likely, a penetration test (pen-test) of an organization’s networks and systems has been obtained, then what?

Wikis: 2 total

Blog Posts: 153 total

Cyber security is like exercise.  It is not a destination.  It's a way of life.  In this blog, I want to exercise your cyber-security awareness and pinpoint ways to identify, protect, detect and respond to potential threats you face in your daily activiti...
Posted By : Robert658 | 0 comments
Have you ever taken a moment to think about what you would do should yourmobile phone become lost or stolen? What if your Personal Identifiable Information(PII) or Sensitive Personal Information (SPI) were sold and used along with yourmobile number? Would...
Posted By : Robert658 | 0 comments
This is an opinion piece written using Australian English spelling. Please read at your leisure. There is no denying the outright benefits of The Internet of Things (IoT). The IoT is a Life-Productivity-Enabler. Connecting smart objects with other sma...
Posted By : Philippe_Lopez_AU | 0 comments
CyberSecurity Month is recognized by the United States government. Homeland Security has a campaign that we will look at called Stop.Think.Connect. It is focused on CyberSecurity awareness. I have been looking at CyberSecurity since 2011 when I found...
Posted By : Gerri Anne Redmond | 0 comments
A customer walks into a grocery store to buy a cold yogurt, then walks toward the checkout stand to buy it. While waiting in line to buy the yogurt, there is a chance it will warm up. If the line is long, not only will the customer refuse to buy the yogu...
Posted By : Don Turnblade | 0 comments
Some exciting projects coming. I am working on reworking our managed health care system to include an all online process from doctor prescribed prescriptions to filled prescriptions. I have reaching out to technology companies and politicians to see if ...
Posted By : Gerri Anne Redmond | 0 comments