Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Information Security Management

Welcome to the Information Security Management topic!

Collaborate, contribute, consume and create knowledge around topics such as cloud computing, application security, vulnerability management, PCI, and data protection.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1406 Members
1 Online
13839 Visits

Community Leader

Marc Vael

Marc Vael

Title: Chief Information Security Officer

Badge: Energizer

Ross Peachey

Ross Peachey

Badge: Energizer

ShanShan

ShanShan

Badge: Social

Simiyu

Simiyu

Badge: Influential

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 122 total

Must be a Topic member to contribute
View All »
Hi all, I am looking to separate the security function from IT and would love if you could point me towards resources that show an org chart (preferably in the financial services sector) that support that argument and shows Security outside of IT, reporti...
danic1979 | 10/18/2017 10:51:11 AM | COMMENTS(2)
Dear Colleagues, As you know, Ukraine is being severely hit by cyberattacks. I am currently helping to define Information Security Organization and roadmap for a large Ukrainian manufacturing company. I am looking for examples of Information Security Orga...
Alexey808 | 8/7/2017 1:31:56 PM | COMMENTS(0)
Hi All, I'm going to start the first step as a head of information security, my current position in the information technology operations, but I have a little knowledge in the field of security, actually I am looking for your kind advices and recommendati...
Tarek EL-Sherif | 7/13/2017 10:39:42 AM | COMMENTS(9)
Hi,Recently I am carrying out a research for my final year dissertation in Trinity College. The primary aim of my research is to explore the factors influencing the adoption of Information Security Management Systems (ISMS) standards and frameworks.I woul...
KAI720 | 6/13/2017 5:41:20 AM | COMMENTS(0)
Boards of Director are taking an increasingly active role in cybersecurity governance.  The question is: what are they looking for and how should you manage your security program to meet their needs? This topic has been addressed in the “Cyber-Risk Oversi...
Ramakrishna593 | 5/9/2017 10:14:14 AM | COMMENTS(1)
I'm currently reviewing the information security function within our organization. I have now the IS charter and the IS program. Upon checking the charter, it says that "the IS Program shall adopt a risk based approach." However, upon checking the IS Prog...
Edzern | 3/28/2017 3:00:31 AM | COMMENTS(2)

Documents & Publications: 135 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 100 days ago
In 2017, Attacks will follow your Data Cyberthreats : What's Coming Next and how to prepare for it.
Posted by Mohamad Javed 254 days ago
A turning point for eGovernment development in Europe?
Posted by Mohamad Javed 255 days ago
How to Protect Yourself and Your Family Worth Spending some time on this Release from Cisco on How to Protect yourself. How do websites collect information? Why do websites collect information about you? What information do websites collect from your computer? Google Analytics How can you give or deny permission to collect information about you?
Posted by Mohamad Javed 255 days ago
Books
Posted by ISACA 377 days ago

Events & Online Learning: 24 total

16 Mar 2015
ISACA International Event
Orlando, FL, USA
15 Jun 2015
ISACA International Event
Ciudad de México, Mexico
21 Sep 2015
ISACA International Event
Miami, FL, USA
21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM

Journal Articles: 309 total

Volume 3, 2107
by Jayakumar Sundaram, CISA, ISO 27001 LA
The SoA is a continuously updated and controlled document that provides an overview of information security implementation.
Volume 5, 2017
by Justine Bone
Get to know your network.
Volume 5, 2017
by T. Sean Kelly
Certain steps can be taken to build a strong respect for and practice of security into the cultural fabric of any organization, across all departments and areas of the business.
Volume 5, 2017
by Adeniyi Akanni, Ph. D., CISA, CRISC, ISO 27001 LA, ITIL
Using mobile devices to complete commercial transactions is a newer scientific advancement in the information and communication technology (ICT) sphere.
Volume 5, 2017
by Noman Sultan, Ph.D., CISM, CGEIT, CITP
It is extremely important that organizations invest in their leadership capabilities because leaders play an integral role in motivating, inspiring and influencing talent management.
Volume 5, 2017
by Steven J. Ross, CISA, CISSP, MBCP
This is the dawn of the multi-modal era; data center staff must adjust or be left behind. And so must security professionals.

Wikis: 2 total

Blog Posts: 189 total

In many ways you protect your information. But security which protect your information needs also to be protected in terms of disclosing to the outsiders .Once it disclosed , many a ways it can be break and thus your information is at stake.
Posted By : MUHAMMAD WASEEM RAJA | 0 comments
Posted By : DIPEN487 | 0 comments
What do you think by starting new chapter at Nepal: 1. What benifit will Nepal Get?2. What ICT sectrer will Get?3. What ISACA's current/future member will Get?4. What IS Auditor will get?
Posted By : Dr. Pawan K. Sharma | 0 comments
The real success story is adoption of technology, and adoption is possible if the team which is implementing the Tech solution have vision and purpose of that solution to be adoptable by larger users / stake holders. We always do not get green field proje...
Posted By : Gopal207 | 0 comments
With the advancement of technology, many people are engaged on Internet to perform their day to day online activities. One out ofthree people are now planning to conduct and promote their business throughonline, so it has become as a fastest way of commun...
Posted By : Chiranjibi492 | 0 comments
In todays emerging technology the protection of Information is critical. Protection of information means not only the confidential data that the business is stand on but each user who use, modify and share within is keenly important. The definition of con...
Posted By : SHAMU2015 | 0 comments