Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Intrusion Prevention/Detection

Welcome to the Intrusion Prevention/Detection topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
311 Members
1 Online
6140 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 14 total

Must be a Topic member to contribute
View All »
Can anyone recommend some good sources of annotated (labeled) datasets for Intrusion Prevention/Detection Systems tests and Machine Learning?
Dragan Pleskonjic | 11/10/2017 3:56:10 AM | COMMENTS(0)
Hello - I'd like to know what people think are the most valuable types of intrusion threats and attacks to monitor and look out for please. We are considering using intrusion detection and prevention so would like to understand what are the main threats a...
Martin111 | 12/1/2015 7:39:26 AM | COMMENTS(3)
If we have to look for next generation IDS solution, please can we get some guidance from this group as to what should we look for and from whom? We can consider the listed four technologies from Gartner’s latest IDS/IPS Magic Quadrant, with Cisco and...
Navin Daund | 11/23/2015 3:37:39 AM | COMMENTS(0)
Hi all, I am doing my BSC final project and I am meant to set up a Snort IPS on a PC with 2 network interfaces. I would like Snort to work in inline mode and if possible to simply log and alert for  DDoS traffic and pass-through traffic from one NIC to th...
Ivan668 | 8/14/2015 9:30:11 PM | COMMENTS(2)
Hope you don't mind me posting in this groupabout this year's ISACA Ireland conference, which is focusing on placingbusiness first. Wewould like this conference to be as successful as last year's, which was trulyinternational with 24 speakers from 12 coun...
Neil_Curran | 6/17/2015 4:15:13 AM | COMMENTS(0)
I am performing an audit of our Intrusion Dectection and Prevention System (i.e., HP Tipping Point).  I am attempting to identify how management would ensure all network connections are passing through the IDPS.  What would be the best practice/procedure ...
Philip100 | 3/31/2015 11:18:31 AM | COMMENTS(0)

Documents & Publications: 5 total

Must be a Topic member to contribute
Research
Posted by ISACA 1477 days ago
Books
Posted by ISACA 1978 days ago
Books
Aimed at both the novice and expert in IT security and industrial control systems (ICS), this book will help readers gain a better understanding of protecting ICSs from electronic threats.
Posted by ISACA 2087 days ago
Books
Posted by ISACA 2275 days ago

Events & Online Learning: 0 total

No Results Found

Journal Articles: 13 total

Volume 1, 2017
by Rodney Piercy, CISSP, CEH
As enterprises become more dependent on technology and data, it becomes increasingly important to protect the data and ensure the security of the systems.
Volume 1, 2017
by Sunil Bakshi, CISA, CRISC, CISM, CGEIT, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP
I have heard from vendors that cognitive technologies such as machine learning can assist in my risk management and security efforts. Is this the case?
Volume 1, 2017
by Baidyanath Biswas and Arunabha Mukhopadhyay, Ph.D.
Phishing involves social engineering of data over the Internet to acquire personal or business information from unsuspecting users.
Volume 1, 2017
by Sunil Bakshi, CISA, CRISC, CISM, CGEIT, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP
I have heard from vendors that cognitive technologies such as machine learning can assist in my risk management and security efforts. Is this the case?
Volume 1, 2017
by Baidyanath Biswas and Arunabha Mukhopadhyay, Ph.D.
Phishing involves social engineering of data over the Internet to acquire personal or business information from unsuspecting users.
Volume 5, 2016
by Furkan Caliskan, CISA
With today’s fast-growing cybersecurity needs, building an effective cyberdefense infrastructure is a big challenge for many organizations.

Wikis: 2 total

Blog Posts: 5 total

Must be a Topic member to view blog posts
Information Security and Privacy is hot issue at present time. Number of security breaches is rapidly increasing.  In case of late detection, costs of breaches are skyrocketing. In the same time Artificial Intelligence (AI), Machine Learning (ML) are fast...
Posted By : Dragan Pleskonjic | 0 comments
My previous blog under name "Dragan on Security" was at location: http://conwex.info/blog/. It was active from August 28, 2005 to October 3, 2012. By beginning of 2017 it is moved to new location http://www.dragan-pleskonjic.com/blog/. With possibility to...
Posted By : Dragan Pleskonjic | 0 comments
Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments
On my last post in the CCI Blog, I described how American Water Works Association Cyber Security Framework didn’t addressed the detection Cyber Security events measures for these control systems.Today I have seen a good tweet (as always) from our collea...
Posted By : Enrique229 | 0 comments
Water Management Cyber Security guide from the American Water Works Association is bypassing certain critical controls on ICS Networks. Are we still in time in Spain to avoid this mishap? I know I should be looking for the needle in the Haystack, but lo...
Posted By : Enrique229 | 0 comments