Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Information Security Management

Welcome to the Information Security Management topic!

Collaborate, contribute, consume and create knowledge around topics such as cloud computing, application security, vulnerability management, PCI, and data protection.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1316 Members
1 Online
13098 Visits

Community Leader

Marc Vael

Marc Vael

Title: Chief Audit Executive

Badge: Influential

Ross Peachey

Ross Peachey

Badge: Energizer

ShanShan

ShanShan

Badge: Social

Simiyu

Simiyu

Badge: Influential

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 116 total

Must be a Topic member to contribute
View All »
How do you ensure vulnerabilities in your organisation are identified and fixed efficiently? I work in a relatively large organisation (about 4500 employees/about 7000 devices by IP). When we perform vulnerability scans; they always come out with more tha...
Eliud433 | 1/17/2017 6:54:38 AM | COMMENTS(0)
What is the difference between IT Security and IT Risk ?
Tarek EL-Sherif | 1/17/2017 12:43:14 AM | COMMENTS(11)
Hello all, I am searching information regarding topic of Cyber Security Capability Maturity Models. Currently analyzing:> Electricity Subsector Cybersecurity Capability Maturity MODEL (ES-C2M2) as main background document;> ISO/IEC 33071 DIS PAS Informati...
Tomas Martinkėnas | 12/4/2016 6:20:13 AM | COMMENTS(4)
It was brought to my attention the need to create information security charters for each department, although I really feel that it meant to say “create an information security program for each department” as part of the organization’s security charter. F...
Raul Dusa | 11/25/2016 5:49:08 AM | COMMENTS(6)
Hi everyone...please share anything on this topic "Formation of Security Operation Center"
Mir526 | 10/22/2016 3:01:18 PM | COMMENTS(1)
what is the ideal job description for Head of information security to setup a new infosec team in a bank, i need the job description to submit it to HR dept. to Determine the job weight and set a suitable corporate title for this position.
Tarek EL-Sherif | 9/19/2016 12:03:52 PM | COMMENTS(2)

Documents & Publications: 141 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 104 days ago
Books
Posted by ISACA 104 days ago
Books
Posted by ISACA 318 days ago
Books
Posted by ISACA 370 days ago

Events & Online Learning: 16 total

16 Mar 2015
ISACA International Event
Orlando, FL, USA
15 Jun 2015
ISACA International Event
Ciudad de México, Mexico
21 Sep 2015
ISACA International Event
Miami, FL, USA
21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM

Journal Articles: 269 total

Volume 1, 2017
by Jack Jones, CISA, CRISC, CISM, CISSP
Now that senior executives have begun to take a serious interest in cyber and technology risk, it is necessary to provide meaningful and useful answers to the questions they are beginning to ask.
Volume 1, 2017
by David Eduardo Acosta R., CISA, CRISC, CISM, BS 25999 LA, CCNA Security, CEH, CHFI Trainer, CISSP Instructor, PCI QSA, OPST
Based on the information an organization manages, the security policy should set out the requirements and controls for the protection of the various assets according to their criticality
Volume 1, 2017
by Ravid Circus
Enterprises need to think of their entire network infrastructure—physical, virtual and cloud—in the same way that attackers do: a very large, diverse and geographically dispersed attack surface...
Volume 1, 2017
by Gail Coury, CISA, CISM, CISSP
Get to know your network.
Volume 1, 2017
by Sunil Bakshi, CISA, CRISC, CISM, CGEIT, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP
I have heard from vendors that cognitive technologies such as machine learning can assist in my risk management and security efforts. Is this the case?
Volume 6, 2016
by Wanbil W. Lee, DBA, FBCS, FHKCS, FHKIE, FIMA, Wolfgang Zankl, Ph.D. and Henry Chang, CISM, CIPT, CISSP, DBA, FBCS
Privacy breaches disturb trust and run the risk of diluting or losing security; it is a show of disrespect to the law and a violation of ethical principles.

Wikis: 2 total

Blog Posts: 155 total

31 Dec 2016
The Mobile Maritime Hub 2009-2050 is an strategic plan that started in 2009, in Vilanova i La Geltrú, a coastal town, to promote maritime, nautical, fishing and scientific activities in a seaside region, by a properly use of the technological tools existi...
Posted By : ramoncod | 0 comments
A customer walks into a grocery store to buy a cold yogurt, then walks toward the checkout stand to buy it. While waiting in line to buy the yogurt, there is a chance it will warm up. If the line is long, not only will the customer refuse to buy the yogu...
Posted By : Don Turnblade | 0 comments
After 30 years working in the IT, Audit, Risk Management and Compliance worlds, I’ve seen a lot of good examples of managing an organizations IT risks and controls. But on the flip side, I’ve also seen too many instances of poor management of an organizat...
Posted By : Joe999 | 0 comments
Cyber security is like exercise.  It is not a destination.  It's a way of life.  In this blog, I want to exercise your cyber-security awareness and pinpoint ways to identify, protect, detect and respond to potential threats you face in your daily activiti...
Posted By : Robert658 | 0 comments
Have you ever taken a moment to think about what you would do should yourmobile phone become lost or stolen? What if your Personal Identifiable Information(PII) or Sensitive Personal Information (SPI) were sold and used along with yourmobile number? Would...
Posted By : Robert658 | 0 comments
This is an opinion piece written using Australian English spelling. Please read at your leisure. There is no denying the outright benefits of The Internet of Things (IoT). The IoT is a Life-Productivity-Enabler. Connecting smart objects with other sma...
Posted By : Philippe_Lopez_AU | 0 comments