Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Information Security Management

Welcome to the Information Security Management topic!

Collaborate, contribute, consume and create knowledge around topics such as cloud computing, application security, vulnerability management, PCI, and data protection.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1295 Members
2 Online
12816 Visits

Community Leader

Marc Vael

Marc Vael

Title: Chief Audit Executive

Badge: Observer

Ross Peachey

Ross Peachey

Badge: Observer

ShanShan

ShanShan

Badge: Observer

Simiyu

Simiyu

Badge: Observer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 112 total

Must be a Topic member to contribute
View All »
Hi everyone...please share anything on this topic "Formation of Security Operation Center"
Mir526 | 9/20/2016 12:46:59 PM | COMMENTS(0)
what is the ideal job description for Head of information security to setup a new infosec team in a bank, i need the job description to submit it to HR dept. to Determine the job weight and set a suitable corporate title for this position.
Tarek EL-Sherif | 9/19/2016 12:03:52 PM | COMMENTS(2)
Dear colleagues,  In my company we experience serious difficulties with assigning ownership of the business systems to the people from the business. According to ISO27001, the Asset Owner should be responsible for information classification, controlling t...
Lilia Georgieva | 9/19/2016 11:53:25 AM | COMMENTS(5)
ISACA recently awarded the 30,000th CISM certification. Since its introduction in 2002, the CISM credential has become recognized and adopted worldwide as a symbol of excellence for information security professionals. Why did you decide to pursue the CISM...
Marc Vael | 8/29/2016 4:57:13 AM | COMMENTS(5)
Would anyone be kind to advise on how a Business Analyst can support a Cyber Security project mainly looking at Data Loss Prevention through Email and Web Services Security. The key is how to gather security requirements especially where an MSSP and SIEM ...
Abayomi786 | 7/23/2016 3:39:45 AM | COMMENTS(0)
What is best practice to trace Developers' Access to Production Environment for any given application? 
Jothirao | 7/21/2016 5:05:30 AM | COMMENTS(5)

Documents & Publications: 206 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 30 days ago
Books
Posted by ISACA 136 days ago
Books
Posted by ISACA 206 days ago
Books
Posted by ISACA 251 days ago

Events & Online Learning: 16 total

Journal Articles: 255 total

Volume 5, 2016
by Karina Korpela, CISA, CISM, CRISC, CISSP, PMP, and Paul Weatherhead, CISSP
Once approval to perform an information security audit and, most likely, a penetration test (pen-test) of an organization’s networks and systems has been obtained, then what?
Volume 5, 2016
by Steven J. Ross, CISA, CISSP, MBCP
Still having a base in IS/IT auditing, ISACA now encompasses consultants, educators, IS security professionals, risk professionals, chief information officers and internal auditors
Volume 5, 2016
by Leonard Ong, CISA, CISM, CRISC, CGEIT, COBIT 5 Implementation and Assessor, CFE, CIPM, CIPT, CISSP ISSMP-ISSAP, CPP, CSSLP, CITBCM, GCFA, GCIA, GCIH, GSNA, PMP
Get to know your network.
Volume 5, 2016
by Stefan Beissel, Ph.D., CISA, CISSP, PMP
As companies become more reliant on modern technology, they also have to face more vulnerabilities that must be handled efficiently.
Volume 5, 2016
by Tom Pendergast, Ph.D.
Despite a wealth of preventive measures, employees remain one of the costliest vectors in a number of data breaches and security incidents, which are increasing at an alarming rate.
Volume 5, 2016
by John W. Lainhart IV, CISA, CISM, CGEIT, CRISC, CIPP/G, CIPP/US, Zhiwei Fu, Ph.D., CISA, CGEIT, CRISC, CFE, CISSP, ITIL, PMP and Christopher M. Ballister, CISM, CGEIT, CRISC
Organizations need to move toward a more holistic and proactive approach to addressing security threats and managing compliance requirements in today’s information-driven economy.

Wikis: 2 total

Blog Posts: 149 total

A customer walks into a grocery store to buy a cold yogurt, then walks toward the checkout stand to buy it. While waiting in line to buy the yogurt, there is a chance it will warm up. If the line is long, not only will the customer refuse to buy the yogu...
Posted By : Don Turnblade | 0 comments
Some exciting projects coming. I am working on reworking our managed health care system to include an all online process from doctor prescribed prescriptions to filled prescriptions. I have reaching out to technology companies and politicians to see if ...
Posted By : Gerri Anne Redmond | 0 comments
National Cyber Security Awareness Month is approaching. It is October. I will be providing some fun things for you to research and learn. Check back often. Look at the Homeland Security site for additional tips. https://www.dhs.gov/national-cyber-se...
Posted By : Gerri Anne Redmond | 0 comments
6 Sep 2016
Hi everyone - I hope you can help me with my questions: I have passed my CISA exam last October, with my work experience combine with my educational background, I am able to save 3 years from the requirement to get my CISA designation, but I am lac...
Posted By : Lan234 | 1 comments
I believe the evolution of Social Media is the biggest game changer of the internet after email. Having a platform to connect with people thousands of miles apart or becoming a “contra personality” to what I really am, has given people a taste of what bor...
Posted By : Saibal Dasgupta | 0 comments
It is a boundary. Digital trend. Board is responsible for failures. The right board is necessary. Changing culture is via channel the energy  to do things differently. Stay connected to the people on the ground. Focus on looking forward. Do not demonise t...
Posted By : Swee908 | 0 comments