Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Information Security Management

Welcome to the Information Security Management topic!

Collaborate, contribute, consume and create knowledge around topics such as cloud computing, application security, vulnerability management, PCI, and data protection.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1427 Members
2 Online
14048 Visits

Community Leader

Marc Vael

Marc Vael

Title: Chief Information Security Officer

Badge: Energizer

Ross Peachey

Ross Peachey

Badge: Energizer

ShanShan

ShanShan

Badge: Social

Simiyu

Simiyu

Badge: Influential

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 124 total

Must be a Topic member to contribute
View All »
Is it possible to use crowd-sourced security intelligence to predict future events? For this exercise, experimental web site Security Predictions http://securitypredictions.xyz/ has been built to harness the ‘wisdom of crowds’.  As first experiment, let's...
Dragan Pleskonjic | 1/15/2018 10:44:00 PM | COMMENTS(1)
does the ATM anti skimming devices are operational risk or information security ?
Tarek EL-Sherif | 1/4/2018 10:36:16 AM | COMMENTS(2)
Hi all, I am looking to separate the security function from IT and would love if you could point me towards resources that show an org chart (preferably in the financial services sector) that support that argument and shows Security outside of IT, reporti...
danic1979 | 10/26/2017 12:34:38 PM | COMMENTS(5)
Dear Colleagues, As you know, Ukraine is being severely hit by cyberattacks. I am currently helping to define Information Security Organization and roadmap for a large Ukrainian manufacturing company. I am looking for examples of Information Security Orga...
Alexey808 | 8/7/2017 1:31:56 PM | COMMENTS(0)
Hi All, I'm going to start the first step as a head of information security, my current position in the information technology operations, but I have a little knowledge in the field of security, actually I am looking for your kind advices and recommendati...
Tarek EL-Sherif | 7/13/2017 10:39:42 AM | COMMENTS(9)
Hi,Recently I am carrying out a research for my final year dissertation in Trinity College. The primary aim of my research is to explore the factors influencing the adoption of Information Security Management Systems (ISMS) standards and frameworks.I woul...
KAI720 | 6/13/2017 5:41:20 AM | COMMENTS(0)

Documents & Publications: 134 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 3 days ago
In 2017, Attacks will follow your Data Cyberthreats : What's Coming Next and how to prepare for it.
Posted by Mohamad Javed 350 days ago
A turning point for eGovernment development in Europe?
Posted by Mohamad Javed 351 days ago
How to Protect Yourself and Your Family Worth Spending some time on this Release from Cisco on How to Protect yourself. How do websites collect information? Why do websites collect information about you? What information do websites collect from your computer? Google Analytics How can you give or deny permission to collect information about you?
Posted by Mohamad Javed 351 days ago
Books
Posted by ISACA 472 days ago

Events & Online Learning: 25 total

Journal Articles: 323 total

Volume 3, 2107
by Jayakumar Sundaram, CISA, ISO 27001 LA
The SoA is a continuously updated and controlled document that provides an overview of information security implementation.
Volume 1, 2018
by Sandy Fadale, CRISC, CISM, CGEIT
Get to know your network.
Volume 1, 2018
by Josh Joy
State-of-the-art cryptographic techniques and methods to protect data owners’ personal data have pros and cons and are continually evolving.
Volume 1, 2018
by William Emmanuel Yu, Ph.D., CRISC, CISM, CISSP, CSSLP
Large amounts of personal data can be exploited to initiate profiling and implement a surveillance economy, which also raises the risk of information leakage, cyberstalking and identify theft.
Volume 6, 2017
by Vasant Raval, DBA, CISA, ACMA, and Saloni Verma, CISA, CEH
In the current state of information technology deployment, it is even more crucial to return the priority to security logging.
Volume 6, 2017
by Steven J. Ross, CISA, CISSP, MBCP
If security is portrayed as the One True Way, its proponents lose sight of the fact that others have different incentives, such as cost reduction, mission achievement and profit.

Wikis: 2 total

Blog Posts: 207 total

Have you experienced ransomware attack so far and, if yes, what did you do to resolve? I set up Twitter poll here: https://twitter.com/DPleskonjic/status/953608717399941120 It lasts for seven days. Thank you for taking part in the poll.
Posted By : Dragan Pleskonjic | 0 comments
16 Jan 2018
Is it possible to use crowd-sourced security intelligence to predict future events? For this exercise, experimental web site Security Predictions http://securitypredictions.xyz/ has been built to harness the ‘wisdom of crowds’....
Posted By : Dragan Pleskonjic | 3 comments
What do you think: when artificial intelligence (AI) will be smarter than humans? Can you predict it and if yes, when it will approximately happen in your opinion? Vote in poll at link below, please: http://securitypredictions.xyz/when-artificial-intellig...
Posted By : Dragan Pleskonjic | 1 comments
Globally, many organizations are spending millions of dollars protecting their businesses and its enabling infrastructure, but are they really secure? We shall discuss answer to this question in a little while. We need to understand core basics before we ...
Posted By : SudireddyRamreddy | 2 comments
Buzzword - “Blockchain Technology”Introduction:The Internet has transformed the world. Of the several boons that Internet gave us, two of them deserve to be accentuated, namely “World Wide Web” and “Email”, which today are perhaps the most valued things o...
Posted By : rajeevj12 | 0 comments
Mi primer acercamiento real al Framework (o Marco de Referencia) de ISACA COBIT 5, fue a mediados del año pasado (2016) cuando decidí tomar un curso de examinación para la certificación de COBIT® 5 Foundation (Fundamentos de COBIT 5). La jerga técnica me ...
Posted By : MNUNEZA | 0 comments