Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Information Security Management

Welcome to the Information Security Management topic!

Collaborate, contribute, consume and create knowledge around topics such as cloud computing, application security, vulnerability management, PCI, and data protection.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1466 Members
4 Online
14352 Visits

Community Leader

Marc Vael

Marc Vael

Title: Chief Information Security Officer

Badge: Energizer

Ross Peachey

Ross Peachey

Badge: Energizer

ShanShan

ShanShan

Badge: Social

Simiyu

Simiyu

Badge: Influential

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 125 total

Must be a Topic member to contribute
View All »
Hi All, I'm going to start the first step as a head of information security, my current position in the information technology operations, but I have a little knowledge in the field of security, actually I am looking for your kind advices and recommendati...
Tarek EL-Sherif | 4/25/2018 5:12:55 PM | COMMENTS(10)
I am looking for people to review individual chapters of my forthcoming book: Practical Cybersecurity: Guide to Best Practices and Standards. The book covers all the categories in the ISO 27000 suite and the ISF Standard of Good Practice for Information S...
William598 | 3/22/2018 12:10:34 PM | COMMENTS(5)
Is it possible to use crowd-sourced security intelligence to predict future events? For this exercise, experimental web site Security Predictions http://securitypredictions.xyz/ has been built to harness the ‘wisdom of crowds’.  As first experiment, let's...
Dragan Pleskonjic | 1/15/2018 10:44:00 PM | COMMENTS(1)
does the ATM anti skimming devices are operational risk or information security ?
Tarek EL-Sherif | 1/4/2018 10:36:16 AM | COMMENTS(2)
Hi all, I am looking to separate the security function from IT and would love if you could point me towards resources that show an org chart (preferably in the financial services sector) that support that argument and shows Security outside of IT, reporti...
danic1979 | 10/26/2017 12:34:38 PM | COMMENTS(5)
Dear Colleagues, As you know, Ukraine is being severely hit by cyberattacks. I am currently helping to define Information Security Organization and roadmap for a large Ukrainian manufacturing company. I am looking for examples of Information Security Orga...
Alexey808 | 8/7/2017 1:31:56 PM | COMMENTS(0)

Documents & Publications: 129 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 123 days ago
In 2017, Attacks will follow your Data Cyberthreats : What's Coming Next and how to prepare for it.
Posted by Mohamad Javed 470 days ago
A turning point for eGovernment development in Europe?
Posted by Mohamad Javed 471 days ago
How to Protect Yourself and Your Family Worth Spending some time on this Release from Cisco on How to Protect yourself. How do websites collect information? Why do websites collect information about you? What information do websites collect from your computer? Google Analytics How can you give or deny permission to collect information about you?
Posted by Mohamad Javed 471 days ago
Books
Posted by ISACA 592 days ago

Events & Online Learning: 14 total

Journal Articles: 341 total

Volume 3, 2107
by Jayakumar Sundaram, CISA, ISO 27001 LA
The SoA is a continuously updated and controlled document that provides an overview of information security implementation.
Volume 3, 2018
by Giuliano Pozza, CGEIT, e-CF Plus (CIO), ITIL v3
The world of information and data management is changing faster than anyone could have predicted a few years ago, and attention to sensitive data protection is growing, as the new GDPR is clearly proving.
Volume 3, 2018
by Lucio Augusto Molina Focazzio, CISA, CRISC, CISM, COBIT Assessor and Trainer, ITIL
Building Tomorrow’s Leaders, Today
Volume 3, 2018
by Ed Moyle
When people hear the term “cyberwarfare,” there are a few things that come to mind. The things people visualize tend to be the high-impact, “scare the pants off you” scenarios such as...
Volume 3, 2018
by T. Sean Kelly
Proactive IG requires collaboration among legal, compliance, security and IT teams to take an incremental, measurable approach to deal with today’s enterprise data challenges.
Volume 3, 2018
by Ofir Eitan, CISM, CCSK, CTI
One of the major challenges chief information security officers (CISOs) face in almost any organization is prioritizing information security interests with regard to IT interests.

Wikis: 2 total

Blog Posts: 217 total

https://www.theguardian.com/technology/2018/may/17/cyberlaundering-funds-terror-internet-fake-transactions-cashless-society?CMP=Share_iOSApp_Other
Posted By : TafadzwaPadare | 0 comments
20 Apr 2018
Good day. I have an interesting situation that came about just this week.  New career opportunities are not all that they seem to be.  What I thought was going to be a great career change ended up in disaster.  With only one week and two day's, I was dism...
Posted By : Brian824 | 0 comments
2 Apr 2018
After privacy was silently lost in modern era, GDPR will try to put the ghost back in the bottle. Will it succeed?
Posted By : Dragan Pleskonjic | 0 comments
Training is a lifelong pursuit of any professional. It is our toolbox to keep our skills sharp and tuned for the next challenge. I am often asked what resources are available or how to become more proficient in the identity management specialty. Consider ...
Posted By : Kenneth687 | 0 comments
What do you think: when artificial intelligence (AI) will be smarter than humans? Can you predict it and if yes, when it will approximately happen in your opinion? Vote in poll at link below, please: http://securitypredictions.xyz/when-artificial-intellig...
Posted By : Dragan Pleskonjic | 3 comments
La Tecnología de la Información (TI), en todas sus áreas (base de datos, seguridad de la información, desarrollo de software, redes, etc.), debe tener como objetivo primario el apoyo a los Procesos del Negocio (PN) de la organización. Sin embargo, es comú...
Posted By : emorro | 0 comments