Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Controls Monitoring

Welcome to the Controls Monitoring topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
206 Members
0 Online
6045 Visits

Community Leader

Ejaz024

Ejaz024

Title: IT Auditor

Points: 639

Badge: Lively

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 9 total

Must be a Topic member to contribute
View All »
When was the last time we took our controls inventory? Do we know what controls are in place, when those were designed and if still working as intended? Share with us what steps your organization have taken to maintain an updated controls documentation.
Ejaz024 | 6/1/2016 11:06:22 AM | COMMENTS(2)
There is an argument that if changes to a critical production application require development work then some assurance is needed on availability (and even continuity) of the IT development environment used to develop that application. Has anyone come acro...
Phil Green | 6/1/2016 11:03:52 AM | COMMENTS(1)
Exceptions to our defined IT controls are managed in what we call an 'exception library'.  This library lists the specific exceptions associated with specific work requests that have been requested, their status in the approval process and the effect...
Scott7931 | 1/1/2016 12:37:33 PM | COMMENTS(2)
Hope you don't mind me posting in this groupabout this year's ISACA Ireland conference, which is focusing on placingbusiness first. Wewould like this conference to be as successful as last year's, which was trulyinternational with 24 speakers from 12 coun...
Neil_Curran | 6/23/2015 4:33:07 PM | COMMENTS(1)
Hello there and welcome to the community. Here's a little about me. I was born in Abu Dhabi, UAE, grew up in Lahore, Pakistan; and after spending first 6 years of professional life in UAE, I choose to make US my adopted home. So, if there is something c...
Ejaz024 | 5/15/2015 7:05:20 AM | COMMENTS(0)
Hi Everyone, I'm the chapter president of ISACA Ireland and would like to let members of this topic know that we are seeking innovative, practical and / or thought provoking session proposals for our conference on 3rd Oct 2014.  For knowledge center membe...
Neil_Curran | 8/2/2014 12:49:06 PM | COMMENTS(0)

Documents & Publications: 39 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 128 days ago
Books
Posted by ISACA 1208 days ago
Downloads
Posted by ISACA 1418 days ago
Downloads
Posted by ISACA 1436 days ago

Events & Online Learning: 0 total

No Results Found

Journal Articles: 61 total

Volume 3, 2018
by Alex Quiles, CISA
The use of Windows accounts to authorize users to applications introduces risk that an auditor should evaluate.
Volume 2, 2018
by Ron Davidson
The threat landscape has changed significantly for operational technology (OT) environments as their connectivity to IT networks and the Internet has exponentially increased.
Volume 6, 2017
by Marcin Jekot, CISSO, ISO 27001 LA, SSP and Yiannis Pavlosoglou, Ph.D., CISSP
Never has such an abstract concept of “things” taken to the consumer market so quickly. From printers to thermostats to washing machines and cars, devices are being rushed and fitted with wireless interfaces.
Volume 6, 2017
by ISACA | Reviewed by Ravi Ayappa, Ph.D., CISA, CRISC, CISM
This book is an ideal handbook for auditors, database administrators (DBAs) and security practitioners who would like detailed insight on Oracle database security.
Volume 4, 2017
by Larry G. Wlosinski, CISA, CRISC, CISM, CAP, CBCP, CCSP, CDP, CIPM, CISSP, ITIL v3, PMP
The root causes of privacy incidents include the outsourcing of data, malicious insiders, system glitches, cyberattacks, and the failure to shred or dispose of privacy data properly.
Volume 4, 2017
by Tolga Mataracioglu, CISA, CISM, COBIT Foundation, BS 25999 LA, CCNA, CEH, ISO 27001 LA, MCP, MCTS, VCP
In this article, the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) ISO/IEC 27001:2013 standard is introduced briefly and compared to ISO/IEC 27001:2005.

Wikis: 2 total

Blog Posts: 107 total

https://www.theguardian.com/technology/2018/may/17/cyberlaundering-funds-terror-internet-fake-transactions-cashless-society?CMP=Share_iOSApp_Other
Posted By : TafadzwaPadare | 0 comments
20 Apr 2018
Good day. I have an interesting situation that came about just this week.  New career opportunities are not all that they seem to be.  What I thought was going to be a great career change ended up in disaster.  With only one week and two day's, I was dism...
Posted By : Brian824 | 0 comments
Have you experienced ransomware attack so far and, if yes, what did you do to resolve? I set up Twitter poll here: https://twitter.com/DPleskonjic/status/953608717399941120 It lasts for seven days. Thank you for taking part in the poll.
Posted By : Dragan Pleskonjic | 5 comments
21 Feb 2018
We are happy to announce that  on Feb//2018  the ISACA awareness session  was held in Baghdad.This the first time to speak about ISACA Value in Iraq.Professional from government and private sector were excited to hear about ISACA value and they started to...
Posted By : Ali099 | 1 comments
There are some math models for business that MBAs are taught. Just like assembling burgers for fast food or call wait queue management in a call center, vulnerability patching is a time based business opportunity. Leadership can be expected to use this ...
Posted By : Don Turnblade | 1 comments
I predict that on 1 July 2018, I will be calmly eating a barbecue sandwich, talking with friends and possibly, I will burn a copy of the RFC2246: TLS version 1.0 standard for entertainment value.  Those will less effective Vendor, Network, Systems, Applic...
Posted By : Don Turnblade | 0 comments