Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Controls Monitoring

Welcome to the Controls Monitoring topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
204 Members
0 Online
5895 Visits

Community Leader

Ejaz024

Ejaz024

Title: IT Auditor

Points: 637

Badge: Lively

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 9 total

Must be a Topic member to contribute
View All »
When was the last time we took our controls inventory? Do we know what controls are in place, when those were designed and if still working as intended? Share with us what steps your organization have taken to maintain an updated controls documentation.
Ejaz024 | 6/1/2016 11:06:22 AM | COMMENTS(2)
There is an argument that if changes to a critical production application require development work then some assurance is needed on availability (and even continuity) of the IT development environment used to develop that application. Has anyone come acro...
Phil Green | 6/1/2016 11:03:52 AM | COMMENTS(1)
Exceptions to our defined IT controls are managed in what we call an 'exception library'.  This library lists the specific exceptions associated with specific work requests that have been requested, their status in the approval process and the effect...
Scott7931 | 1/1/2016 12:37:33 PM | COMMENTS(2)
Hope you don't mind me posting in this groupabout this year's ISACA Ireland conference, which is focusing on placingbusiness first. Wewould like this conference to be as successful as last year's, which was trulyinternational with 24 speakers from 12 coun...
Neil_Curran | 6/23/2015 4:33:07 PM | COMMENTS(1)
Hello there and welcome to the community. Here's a little about me. I was born in Abu Dhabi, UAE, grew up in Lahore, Pakistan; and after spending first 6 years of professional life in UAE, I choose to make US my adopted home. So, if there is something c...
Ejaz024 | 5/15/2015 7:05:20 AM | COMMENTS(0)
Hi Everyone, I'm the chapter president of ISACA Ireland and would like to let members of this topic know that we are seeking innovative, practical and / or thought provoking session proposals for our conference on 3rd Oct 2014.  For knowledge center membe...
Neil_Curran | 8/2/2014 12:49:06 PM | COMMENTS(0)

Documents & Publications: 40 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 156 days ago
Books
Posted by ISACA 1045 days ago
Research
Posted by ISACA 1065 days ago
Downloads
Posted by ISACA 1255 days ago

Events & Online Learning: 0 total

No Results Found

Journal Articles: 59 total

Volume 6, 2017
by ISACA | Reviewed by Ravi Ayappa, Ph.D., CISA, CRISC, CISM
This book is an ideal handbook for auditors, database administrators (DBAs) and security practitioners who would like detailed insight on Oracle database security.
Volume 4, 2017
by Larry G. Wlosinski, CISA, CRISC, CISM, CAP, CBCP, CCSP, CDP, CIPM, CISSP, ITIL v3, PMP
The root causes of privacy incidents include the outsourcing of data, malicious insiders, system glitches, cyberattacks, and the failure to shred or dispose of privacy data properly.
Volume 4, 2017
by Tolga Mataracioglu, CISA, CISM, COBIT Foundation, BS 25999 LA, CCNA, CEH, ISO 27001 LA, MCP, MCTS, VCP
In this article, the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) ISO/IEC 27001:2013 standard is introduced briefly and compared to ISO/IEC 27001:2005.
Volume 4, 2017
by Sri Mallur
Industrial control systems (ICSs) are changing by relying more on off-the-shelf information technology (IT), thereby exposing these systems to more IT risk.
Volume 3, 2017
by Kurt Kincaid, CISA, Lean Six Sigma Green Belt
What follows is a discussion of the nature of HTTPS, how it should be configured, and how to remotely assess that configuration for oneself, rather than relying on verbal or written attestation from server or application administrators.
Volume 3, 2017
by ISACA | Reviewed by Diana M. Hamono, CISA, CGEIT, COBIT 5 Foundation
This book is a useful resource for those involved in establishing a secure cloud computing environment in their organization.

Wikis: 2 total

Blog Posts: 98 total

Globally, many organizations are spending millions of dollars protecting their businesses and its enabling infrastructure, but are they really secure? We shall discuss answer to this question in a little while. We need to understand core basics before we ...
Posted By : SudireddyRamreddy | 1 comments
Information Security and Privacy is hot issue at present time. Number of security breaches is rapidly increasing.  In case of late detection, costs of breaches are skyrocketing. In the same time Artificial Intelligence (AI), Machine Learning (ML) are fast...
Posted By : Dragan Pleskonjic | 0 comments
30 Nov 2017
I predict that on 1 July 2018, I will be calmly eating a barbecuesandwich, talking with friends and possibly, I will burn a copy of the RFC2246: TLS version 1.0 standard for entertainment value.  Those will lesseffective Vendor, Network, Systems, Applicat...
Posted By : Don Turnblade | 0 comments
Tools What to do for such an assignment practical auditing of the OS and Database CLOUD Computing challenges Third Party integration and the Audit functions
Posted By : Kemza | 0 comments
What do you think by starting new chapter at Nepal: 1. What benifit will Nepal Get?2. What ICT sectrer will Get?3. What ISACA's current/future member will Get?4. What IS Auditor will get?
Posted By : Dr. Pawan K. Sharma | 0 comments
With the advancement of technology, many people are engaged on Internet to perform their day to day online activities. One out ofthree people are now planning to conduct and promote their business throughonline, so it has become as a fastest way of commun...
Posted By : Chiranjibi492 | 0 comments