Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Mobile Computing

Welcome to the Mobile Computing topic!

Collaborate, contribute, consume and create knowledge around compliance with topics such as Bring Your Own Device (BYOD), mobile applications & mobile security.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
728 Members
1 Online
9447 Visits

Community Leader

Andreas Schober

Andreas Schober

Title: Senior Auditor

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 87 total

Must be a Topic member to contribute
View All »
Close to two-thirds (63%) of global IT professionals oppose giving governments backdoor access to encrypted information systems, and similar numbers (59%) feel that privacy is being compromised in an effort to implement stronger cybersecurity laws. The su...
Andreas Schober | 1/20/2016 3:08:43 AM | COMMENTS(0)
Hi there I'm looking for occurrences of cyber attack thru mobile devices. Are you aware of any cyber attack where an authorized device in the frame of BYOD was used as a vector? Is there a website where these kind of specific attacks are gathered? I...
Mamane | 12/6/2015 3:34:09 AM | COMMENTS(2)
2 questions: 1- How does this apply to other federal/provincial/local governments? 2- How does this apply to the private sector? Article is here:
M.Lambert | 12/3/2015 6:55:29 AM | COMMENTS(3)
As you face an increasing number of identities with the inclusion of different types of business users, techniques such as risk-based access and entitlement catalogs become essential to mitigating the risks to your business. Join CA Technologies for a lo...
Andreas Schober | 12/1/2015 7:11:55 AM | COMMENTS(0)
Technology drives business innovation. But which new technology will take you and your enterprise where you want to go? Join IT expert Jamie Pasfield for next week’s insightful, free ISACA Webinar focusing on new global technologies, particularly those im...
Andreas Schober | 11/13/2015 1:16:25 AM | COMMENTS(0)
Dr. Jacqueline Gutierrez discusses ways in which a cyber-attack can occur on a mobile device -1- Having your device stolen the hacked; -2- Cyber-Attacks on Phone Apps; -3- Phishing scams such as links to websites designed to trick you into providing...
M.Lambert | 10/23/2015 1:54:47 PM | COMMENTS(0)

Documents & Publications: 28 total

Must be a Topic member to contribute
View All »
Posted by ISACA 221 days ago
Posted by ISACA 226 days ago
Posted by ISACA 308 days ago
The Global State of Information Security Survey 2015 is a worldwide study by PwC, CIO, and CSO. It was conducted online from March 27, 2014 to May 25, 2014. Readers of CIO and CSO and clients of PwC from around the globe were invited via e-mail to take the survey. The results discussed in this report are based on responses of more than 9,700 CEOs, CFOs, CIOs, CISOs, CSOs, VPs, and directors of IT and security practices from more than 154 countries. Thirty-five percent (35%) of respondents are from North America, 34% from Europe, 14% from Asia Pacific, 13% from South America, and 4% from the Middle East and Africa. The margin of error is less than 1%.
Posted by Andreas Schober 450 days ago
A mandate for infrastructure agility, dynamic optimization and software defined environments
Posted by JasonY 473 days ago

Events & Online Learning: 4 total

21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.
22 Aug 2016
ISACA International Event
Hollywood, Florida, US
2016 GRC Conference - 22-24 August , Fort Lauderdale, FL. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 20 total

Volume 6, 2015
For the past several years, a lot of research, writing and speaking has been focused on the Internet of Things (IoT) and the smart devices that are used within it.
Volume 2, 2015
by Marcelo Hector Gonzalez, CISA, CRISC, and Jana Djurica
There are a number of definitions of Internet of Things (IoT), with all of them having slightly different meanings.
Volume 5, 2014
by William Emmanuel Yu, Ph.D., CISM, CRISC, CISSP, CSSLP
As enterprises attempt to determine the best ways of handling today’s bring your own device (BYOD) trends, they also realize the potential for mobilizing their existing enterprise systems and applications.
Volume 5, 2014
by Giuliano Pozza
The discussion around bring your own device (BYOD) policies is often focused on topics such as the opportunity, risk and security implications of using personal devices and user apps in the business context.
Volume 1, 2014
by Daksha Bhasker, CISM
The recent proliferation of promising wireless technologies has quickly been followed by torrents of new mobile malware and cyberthreats.
Volume 4, 2013
by Gaurav Priyadarshi, CISA, BS 25999 LI, ISO 27001 LA, ITIL V3
As BYODT becomes increasingly acceptable and popular, it is likely to be one of the biggest challenges for information security governance.

Wikis: 2 total

Blog Posts: 2 total

Must be a Topic member to view blog posts
New post on IT Grackle: "The Privacy Lock On Your Phone" #mobile #security
Posted By : Calvin Powers | 0 comments
Antes  que nada quisiera dedicar estas lineas aun grande del internet : Aaron Swartz ... No en vano el inventor de la World Wide Web, Sir Tim Berners-Lee, tuiteó: "Aaron está muerto. Caminantes del mundo, perdimos a uno de nuestros sabios. Hackers por der...
Posted By : ArthurHuamani | 0 comments