Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Information Security Management

Welcome to the Information Security Management topic!

Collaborate, contribute, consume and create knowledge around topics such as cloud computing, application security, vulnerability management, PCI, and data protection.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1389 Members
1 Online
0 Visits

Community Leader

Marc Vael

Marc Vael

Title: Chief Audit Executive

Badge: Energizer

Ross Peachey

Ross Peachey

Badge: Energizer

ShanShan

ShanShan

Badge: Social

Simiyu

Simiyu

Badge: Influential

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 121 total

Must be a Topic member to contribute
View All »
Dear Colleagues, As you know, Ukraine is being severely hit by cyberattacks. I am currently helping to define Information Security Organization and roadmap for a large Ukrainian manufacturing company. I am looking for examples of Information Security Orga...
Alexey808 | 8/7/2017 1:31:56 PM | COMMENTS(0)
Hi All, I'm going to start the first step as a head of information security, my current position in the information technology operations, but I have a little knowledge in the field of security, actually I am looking for your kind advices and recommendati...
Tarek EL-Sherif | 7/13/2017 10:39:42 AM | COMMENTS(9)
Hi,Recently I am carrying out a research for my final year dissertation in Trinity College. The primary aim of my research is to explore the factors influencing the adoption of Information Security Management Systems (ISMS) standards and frameworks.I woul...
KAI720 | 6/13/2017 5:41:20 AM | COMMENTS(0)
Boards of Director are taking an increasingly active role in cybersecurity governance.  The question is: what are they looking for and how should you manage your security program to meet their needs? This topic has been addressed in the “Cyber-Risk Oversi...
Ramakrishna593 | 5/9/2017 10:14:14 AM | COMMENTS(1)
I'm currently reviewing the information security function within our organization. I have now the IS charter and the IS program. Upon checking the charter, it says that "the IS Program shall adopt a risk based approach." However, upon checking the IS Prog...
Edzern | 3/28/2017 3:00:31 AM | COMMENTS(2)
What is the information security perspective if the customers reported receiving SMS for transactions they had not performed where this transactions for others customers and sent to them by system error ?
Tarek EL-Sherif | 3/12/2017 5:09:39 AM | COMMENTS(0)

Documents & Publications: 138 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 36 days ago
In 2017, Attacks will follow your Data Cyberthreats : What's Coming Next and how to prepare for it.
Posted by Mohamad Javed 191 days ago
A turning point for eGovernment development in Europe?
Posted by Mohamad Javed 192 days ago
How to Protect Yourself and Your Family Worth Spending some time on this Release from Cisco on How to Protect yourself. How do websites collect information? Why do websites collect information about you? What information do websites collect from your computer? Google Analytics How can you give or deny permission to collect information about you?
Posted by Mohamad Javed 192 days ago
Books
Posted by ISACA 313 days ago

Events & Online Learning: 24 total

16 Mar 2015
ISACA International Event
Orlando, FL, USA
15 Jun 2015
ISACA International Event
Ciudad de México, Mexico
21 Sep 2015
ISACA International Event
Miami, FL, USA
21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM

Journal Articles: 300 total

Volume 3, 2107
by Jayakumar Sundaram, CISA, ISO 27001 LA
The SoA is a continuously updated and controlled document that provides an overview of information security implementation.
Volume 4, 2017
by Steven J. Ross, CISA, CISSP, MBCP
Some time ago in this space, I used an obscure statement by a nearly forgotten British Prime Minister to make some points about cyber security.
Volume 4, 2017
by Sunil Bakshi, CISA, CRISC, CISM, CGEIT, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP
Our organization has employees who work mostly in the field. Previously, they had been provided laptops and mobile phones by the organization.
Volume 4, 2017
by Theresa Grafenstine, CISA, CRISC, CGEIT, CGAP, CGMA, CIA, CISSP, CPA
Get to know your network.
Volume 4, 2017
by ISACA | Reviewed by Ravi Ayappa, Ph.D., CISA, CRISC, CISM
Transforming Cybersecurity is a useful handbook for any cyber security practitioner, information security manager (ISM) or IT auditor.
Volume 4, 2017
by Tolga Mataracioglu, CISA, CISM, COBIT Foundation, BS 25999 LA, CCNA, CEH, ISO 27001 LA, MCP, MCTS, VCP
In this article, the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) ISO/IEC 27001:2013 standard is introduced briefly and compared to ISO/IEC 27001:2005.

Wikis: 2 total

Blog Posts: 181 total

Few days ago the person behind the Hacking Team hack revealed how he did it in pastebin - (the original in Spanish) https://pastebin.com/raw/GPSHF04A I was very keen to understand how good you need to be to hack back one of the most (in)famous hacking...
Posted By : TiagoRosado | 0 comments
9 Aug 2017
How, where, and when can IT innovate even in anapparent non-innovation culture?Innovationcan be a broad concept whose definition for a specific company, department orpractitioner is based very much upon context. Organization mission, culture,size, revenue...
Posted By : Richard521 | 0 comments
Liechtensteins Teilnahme an der 'European Cybersecurity Challenge' in DüsseldorfEdit articleUm was geht es genau?Die European Cybersecurity Challenge ist ein Wettbewerb für Nachwuchskräfte aus dem Bereich IT / InfoSec die sich für Cybersecurity interessie...
Posted By : Peter Huerlimann | 0 comments
295 days from the time I am writing these words is the beginning of enforcement for GDPR. By the time this is posted to the Web, that number will be smaller. There will be fewer days still once you read this. Time is a funny thing. But these words are ...
Posted By : HPMahan | 0 comments
Realizar tareas de educación y concienciación para el usuario final es vital, teniendo en cuenta que al final es este usuario quien decidirá si se protege. pensando en esto, les comparto consejos útiles. 1. No utilices vocabulario técnico, considera que t...
Posted By : Rene372 | 0 comments
Recently while reading through various cyber security threat feeds, I ran across a very interesting article describing ways to protect your identity and personal data.  In the article the author discussed "Understanding your data-protection and privacy ri...
Posted By : James948 | 0 comments