Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Controls Monitoring

Welcome to the Controls Monitoring topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
200 Members
1 Online
5807 Visits

Community Leader

Ejaz024

Ejaz024

Title: IT Auditor

Points: 630

Badge: Lively

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 9 total

Must be a Topic member to contribute
View All »
When was the last time we took our controls inventory? Do we know what controls are in place, when those were designed and if still working as intended? Share with us what steps your organization have taken to maintain an updated controls documentation.
Ejaz024 | 6/1/2016 11:06:22 AM | COMMENTS(2)
There is an argument that if changes to a critical production application require development work then some assurance is needed on availability (and even continuity) of the IT development environment used to develop that application. Has anyone come acro...
Phil Green | 6/1/2016 11:03:52 AM | COMMENTS(1)
Exceptions to our defined IT controls are managed in what we call an 'exception library'.  This library lists the specific exceptions associated with specific work requests that have been requested, their status in the approval process and the effect...
Scott7931 | 1/1/2016 12:37:33 PM | COMMENTS(2)
Hope you don't mind me posting in this groupabout this year's ISACA Ireland conference, which is focusing on placingbusiness first. Wewould like this conference to be as successful as last year's, which was trulyinternational with 24 speakers from 12 coun...
Neil_Curran | 6/23/2015 4:33:07 PM | COMMENTS(1)
Hello there and welcome to the community. Here's a little about me. I was born in Abu Dhabi, UAE, grew up in Lahore, Pakistan; and after spending first 6 years of professional life in UAE, I choose to make US my adopted home. So, if there is something c...
Ejaz024 | 5/15/2015 7:05:20 AM | COMMENTS(0)
Hi Everyone, I'm the chapter president of ISACA Ireland and would like to let members of this topic know that we are seeking innovative, practical and / or thought provoking session proposals for our conference on 3rd Oct 2014.  For knowledge center membe...
Neil_Curran | 8/2/2014 12:49:06 PM | COMMENTS(0)

Documents & Publications: 40 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 39 days ago
Books
Posted by ISACA 928 days ago
Research
Posted by ISACA 948 days ago
Downloads
Posted by ISACA 1138 days ago

Events & Online Learning: 3 total

21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.

Journal Articles: 57 total

Volume 4, 2107
by Larry G. Wlosinski, CISA, CRISC, CISM, CAP, CBCP, CCSP, CDP, CIPM, CISSP, ITIL v3, PMP
The root causes of privacy incidents include the outsourcing of data, malicious insiders, system glitches, cyberattacks, and the failure to shred or dispose of privacy data properly.
Volume 4, 2017
by Tolga Mataracioglu, CISA, CISM, COBIT Foundation, BS 25999 LA, CCNA, CEH, ISO 27001 LA, MCP, MCTS, VCP
In this article, the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) ISO/IEC 27001:2013 standard is introduced briefly and compared to ISO/IEC 27001:2005.
Volume 4, 2017
by Sri Mallur
Industrial control systems (ICSs) are changing by relying more on off-the-shelf information technology (IT), thereby exposing these systems to more IT risk.
Volume 3, 2017
by ISACA | Reviewed by Diana M. Hamono, CISA, CGEIT, COBIT 5 Foundation
This book is a useful resource for those involved in establishing a secure cloud computing environment in their organization.
Volume 3, 2017
by Kurt Kincaid, CISA, Lean Six Sigma Green Belt
What follows is a discussion of the nature of HTTPS, how it should be configured, and how to remotely assess that configuration for oneself, rather than relying on verbal or written attestation from server or application administrators.
Volume 1, 2017
by Reviewed by Larry Marks, CISA, CRISC, CISM, CGEIT, CFE, CISSP, CRVPM, CSTE, ITIL, PMP
This short reference book walks through a firm’s governance structure and identifies high-level strategies that have to be considered in the context of the enterprise environment to gain value for application

Wikis: 2 total

Blog Posts: 90 total

Recently while reading through various cyber security threat feeds, I ran across a very interesting article describing ways to protect your identity and personal data.  In the article the author discussed "Understanding your data-protection and privacy ri...
Posted By : James948 | 0 comments
22 Jul 2017
Hasta hace pocos años contar con una aplicación de inteligencia de negocios era caro, complejo y necesitabas el apoyo constante del personal de informática para obtener la información precisa. Hoy ya existen herramientas como Power BI Desktop que permiten...
Posted By : Alejandro906 | 0 comments
La demanda de servicios bancarios a través de Internet, producto del surgimiento de nuevas necesidades en los consumidores atraídos por el auge tecnológico, mantiene a las entidades financieras inmersas en una encrucijada en la cual deben equilibrar el ni...
Posted By : Gerardo Zuñiga | 1 comments
Places where the relevant principles of COBIT map to COSO 2013 principles* are marked as Yes. .ExternalClassAA9D49C4D9F042DC96DF42A7B720A8E8 table {;} .ExternalClassAA9D49C4D9F042DC96DF42A7B720A8E8 .font51287 {color:black;font-size:9.0pt;font-weig...
Posted By : Sugandh | 0 comments
Senior Manager           ultimate responsibility Information security Officer          functional responsibility Security Analyst           Strategic, develops policies and guidelines Owner         - Responsible for asset         - Determine level of clas...
Posted By : Muhammad554 | 0 comments
Manejo de TI interno. El tener toda la estructura de TI internamente, sin subcontrataciones, puede dar una acumulación de problemas difíciles de manejar para una sola organización.Asociaciones con contrapartes. Al trabajar en un proyecto conjunto con una...
Posted By : Gladys789 | 0 comments