Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Information Security Management

Welcome to the Information Security Management topic!

Collaborate, contribute, consume and create knowledge around topics such as cloud computing, application security, vulnerability management, PCI, and data protection.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1090 Members
8 Online
11321 Visits

Community Leader

Marc Vael

Marc Vael

Title: Director Internal Audit & Risk Management

Badge: Influential

Ross Peachey

Ross Peachey

Badge: Energizer

ShanShan

ShanShan

Badge: Social

Simiyu

Simiyu

Badge: Influential

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 87 total

Must be a Topic member to contribute
View All »
Dear all Please find  link for FlipBoard Magazine, created for CISOs by CISO. http://flip.it/IAxca For best reading experience, use FlipBoard app regards Gupta
Gupta Boda | 9/2/2015 8:26:51 AM | COMMENTS(2)
FOr firms looking to integrate security controls into their product lifecycle, integration with the organization's quality control & assurance governance is key. What recommendation can our community SMEs provide to an organization to ensure security gove...
David Scott | 8/6/2015 9:17:26 AM | COMMENTS(2)
Hello guys, I've done a matrix example for SOC activities, i would share it with you and your advices/comments for improving it. For the moment, i use dropbox for sharing and contact information are in the document. Link: https://www.dropbox.com/...
Damien643 | 7/17/2015 8:27:48 AM | COMMENTS(8)
Last week, the popular password management software LastPass got hacked. (see link for news detail: http://bits.blogs.nytimes.com/2015/06/15/lastpass-password-manager-acknowledges-breach/?_r=0)It will get hacked, just like any systems out there these days...
ShanShan | 7/2/2015 3:32:06 AM | COMMENTS(5)
Hope you don't mind me posting in this groupabout this year's ISACA Ireland conference, which is focusing on placingbusiness first. Wewould like this conference to be as successful as last year's, which was trulyinternational with 24 speakers from 12 coun...
Neil_Curran | 6/17/2015 5:42:08 AM | COMMENTS(1)
IRS got hacked and 100,000 records were exposed. Not enough security control in place? What do you think about this case?http://www.nytimes.com/2015/05/27/business/breach-exposes-irs-tax-returns.html?hp&action=click&pgtype=Homepage&module=first-column-reg...
ShanShan | 6/3/2015 6:02:29 PM | COMMENTS(4)

Documents & Publications: 193 total

Events & Online Learning: 15 total

19 Aug 2013
ISACA International Event
San Francisco, CA, USA
14 Oct 2013
ISACA International Event
Boston, MA, USA
6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
11 Aug 2014
ISACA International Event
Seattle, WA, USA

Journal Articles: 500 total

Volume 5, 2015
by Jeimy J. Cano, Ph.D., COBIT Foundation, CFE
Cyberinsurance is a way to account for cyberrisk and considers the new possible business responsibilities arising from operating in an international context.
Volume 5, 2015
by Fredric Greene, CISSP
Detective controls are a key component of a cybersecurity program in providing visibility into malicious activity, breaches and attacks on an organization’s IT environment.
Volume 5, 2015
by Ganapathi Subramaniam
How do I ensure that my organization has controls to protect itself from cyberrisk?
Volume 5, 2015
by Omar Y. Sharkasi, CBCP, CFE, CRP
IT leaders must increase cybersecurity public awareness and coordination across the subset of federal governments, all while having to do more with less.
Volume 4, 2015
by Sivarama Subramanian, CISM, Varadarajan Vellore Gopal, CEH, and Marimuthu Muthusamy
The Internet of Things (IoT) is captivating organizations because of its potential to rapidly transform businesses and people’s lives.
Volume 4, 2015
by Dipti Patel, CISA, CISM, ISO 27001 LA, ITIL V3
Vendor risk management is the next step to elevate information security from a technical control process to an effective management process.

Wikis: 2 total

Blog Posts: 114 total

Throughout my career I have experienced various “philosophies” in planning and design of IT projects. Some choose the fire fighter philosophy, while others choose the “agile as an excuse for insufficient design”. On the other end of the scale I have found...
Posted By : John410 | 0 comments
On my last post in the CCI Blog, I described how American Water Works Association Cyber Security Framework didn’t addressed the detection Cyber Security events measures for these control systems.Today I have seen a good tweet (as always) from our collea...
Posted By : Enrique229 | 0 comments
Water Management Cyber Security guide from the American Water Works Association is bypassing certain critical controls on ICS Networks. Are we still in time in Spain to avoid this mishap? I know I should be looking for the needle in the Haystack, but lo...
Posted By : Enrique229 | 0 comments
Last weekend over dinner at one of my friend’s place, who isa Mergers & Acquisitions “M&A” Partner with a consulting firm; asked mehow would I assess the cyber security related risk of a target acquisition? Thequestion is very relevant in this day and age...
Posted By : Jitendra054 | 0 comments
Metodología hacker para obtener información rápida y precisa para Auditar más y Mejor Su jefe le ha entregado una orden de trabajo donde le solicita realizaruna Auditoría, a un proceso riesgoso, del nuevo Core que acaba de instalar elbanco ABC. Es probabl...
Posted By : dondeivis | 0 comments
17 Jul 2015
I'd like to find out what security tools and techniques are being used to secure big data and extrapolate intelligence from this data about our adversaries and who they are and what they are doing. There are many different tools and strategies to doing t...
Posted By : Carl676 | 0 comments