Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Information Security Management

Welcome to the Information Security Management topic!

Collaborate, contribute, consume and create knowledge around topics such as cloud computing, application security, vulnerability management, PCI, and data protection.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1412 Members
0 Online
13898 Visits

Community Leader

Marc Vael

Marc Vael

Title: Chief Information Security Officer

Badge: Energizer

Ross Peachey

Ross Peachey

Badge: Energizer

ShanShan

ShanShan

Badge: Social

Simiyu

Simiyu

Badge: Influential

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 123 total

Must be a Topic member to contribute
View All »
Is it possible to use crowd-sourced security intelligence to predict future events? For this exercise, experimental web site http://securitypredictions.xyz/ has been built to harness the ‘wisdom of crowds’. As first experiment, let's try if we can predict...
Dragan Pleskonjic | 11/9/2017 10:06:44 AM | COMMENTS(0)
Hi all, I am looking to separate the security function from IT and would love if you could point me towards resources that show an org chart (preferably in the financial services sector) that support that argument and shows Security outside of IT, reporti...
danic1979 | 10/26/2017 12:34:38 PM | COMMENTS(5)
Dear Colleagues, As you know, Ukraine is being severely hit by cyberattacks. I am currently helping to define Information Security Organization and roadmap for a large Ukrainian manufacturing company. I am looking for examples of Information Security Orga...
Alexey808 | 8/7/2017 1:31:56 PM | COMMENTS(0)
Hi All, I'm going to start the first step as a head of information security, my current position in the information technology operations, but I have a little knowledge in the field of security, actually I am looking for your kind advices and recommendati...
Tarek EL-Sherif | 7/13/2017 10:39:42 AM | COMMENTS(9)
Hi,Recently I am carrying out a research for my final year dissertation in Trinity College. The primary aim of my research is to explore the factors influencing the adoption of Information Security Management Systems (ISMS) standards and frameworks.I woul...
KAI720 | 6/13/2017 5:41:20 AM | COMMENTS(0)
Boards of Director are taking an increasingly active role in cybersecurity governance.  The question is: what are they looking for and how should you manage your security program to meet their needs? This topic has been addressed in the “Cyber-Risk Oversi...
Ramakrishna593 | 5/9/2017 10:14:14 AM | COMMENTS(1)

Documents & Publications: 134 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 130 days ago
In 2017, Attacks will follow your Data Cyberthreats : What's Coming Next and how to prepare for it.
Posted by Mohamad Javed 284 days ago
A turning point for eGovernment development in Europe?
Posted by Mohamad Javed 285 days ago
How to Protect Yourself and Your Family Worth Spending some time on this Release from Cisco on How to Protect yourself. How do websites collect information? Why do websites collect information about you? What information do websites collect from your computer? Google Analytics How can you give or deny permission to collect information about you?
Posted by Mohamad Javed 285 days ago
Books
Posted by ISACA 407 days ago

Events & Online Learning: 16 total

Journal Articles: 318 total

Volume 3, 2107
by Jayakumar Sundaram, CISA, ISO 27001 LA
The SoA is a continuously updated and controlled document that provides an overview of information security implementation.
Volume 6, 2017
by Vasant Raval, DBA, CISA, ACMA, and Saloni Verma, CISA, CEH
In the current state of information technology deployment, it is even more crucial to return the priority to security logging.
Volume 6, 2017
by Steven J. Ross, CISA, CISSP, MBCP
If security is portrayed as the One True Way, its proponents lose sight of the fact that others have different incentives, such as cost reduction, mission achievement and profit.
Volume 6, 2017
by Sarah Orton, CISA
Get to know your network.
Volume 6, 2017
by Abdullah Al-Mansour, Security+
The amount of data reviewed has changed the scope of an information security professional from an auditor to a data mining and analytics expert.
Volume 6, 2017
by Daniel Gnana, CISA, ISO/IEC 27001:2013 LA, PRINCE2
The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC)’s ISO/IEC 27001:2013 standard has defined the requirements for an information security management system (ISMS).

Wikis: 2 total

Blog Posts: 196 total

Globally, many organizations are spending millions of dollars protecting their businesses and its enabling infrastructure, but are they really secure? We shall discuss answer to this question in a little while. We need to understand core basics before we ...
Posted By : SudireddyRamreddy | 0 comments
12 Nov 2017
NCU-ISAO 2nd Annual Conference https://www.prlog.org/12675996-national-credit-union-isao-convenes-2nd-annual-cyber-security-conference-in-dallas-texas.html
Posted By : Robert658 | 0 comments
12 Nov 2017
Identifying types of unwanted email 1.    Malware Malware or “malicious software” is software designed to damage or execute unwanted actions on a computer system or device.  It can also infect and take over a person’s device, turning it into...
Posted By : Robert658 | 0 comments
12 Nov 2017
Even though computer users are getting smarter, and the anti-phishing tools we use here at Founders for protection are more accurate, hackers continue to manipulate the exploits.  Employees are lured with promises of financial monetary gain or thr...
Posted By : Robert658 | 0 comments
2 Nov 2017
Today, there are many ways criminals attack a company with phishing emails containing malware.  Below are the top approaches, hoping the employee will act and enable the malware to bypass all security controls the company has in place.  Common co...
Posted By : Robert658 | 0 comments
31 Oct 2017
Today, 91% of successful data breaches start with a spear-phishing attack.  Phishing is now the number 1 delivery vehicle for ransomware and other malware.  While you tend to think of a cyber-criminal as a mastermind hacker who is state sponsored ...
Posted By : Robert658 | 0 comments