Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Mobile Computing

Welcome to the Mobile Computing topic!

Collaborate, contribute, consume and create knowledge around compliance with topics such as Bring Your Own Device (BYOD), mobile applications & mobile security.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
479 Members
0 Online
7333 Visits

 Recent Discussions

New Cybersecurity Resources Available. Posted by Andreas Schober.
New ISACA guide: Six Steps to Using Risk Scena... Posted by Andreas Schober.
Securing Mobile Devices for BYOD. Posted by Robert Wilkins III, SFC, SSYB.

Community Leader

Andreas Schober

Andreas Schober

Title: Senior Auditor

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 57 total

Must be a Topic member to contribute
View All »
ISACA has issued new cybersecurity-related publications. Increases in cybercrime are driving the need for organizations to implement cybersecurity programs, and these recently released publications relate cybersecurity implementation with regulatory guide...
Andreas Schober | 10/7/2014 4:36:29 PM | COMMENTS(4)
ISACA today issued new guidance providing six steps to using risk scenarios for improved risk management. The guide also offers 60 customizable scenarios across 20 categories. Organizations can tailor these for their use. Toolkit and Scenarios are free to...
Andreas Schober | 9/30/2014 1:01:13 PM | COMMENTS(2)
Mobile Platform Security, I believe, is an issue we need to work in reverse. The current progression of mobile OS proliferation among technology is from Phone to Tablet to TV to Laptop to Desktop. However, for many corporations, the current IT Security St...
Robert Wilkins III, SFC, SSYB | 9/25/2014 8:06:19 PM | COMMENTS(3)
There has been very little information about security of thin SIM that gets stuck onto an SIM card. There are arguments that the thin SIM is able to get information from the SIM card on which it is stuck. I need guidance here. Does the thin SIM card inte...
DANIEL638 | 9/25/2014 5:17:41 AM | COMMENTS(0)
On my way to work today, I saw a gentleman who looked strikingly like one of Apple's late founders.  I struggled to think of his name, but for the life of me, I could not.  At this time, I remembered that I have this handly little device that I can ask qu...
Robert Wilkins III, SFC, SSYB | 9/24/2014 9:16:52 PM | COMMENTS(1)
As companies are moving more and more of their guest facing presence to applications for mobile devices, I'm curious on what are some areas where others have examined or have done testing on.   Besides the standard risk areas like pen testing or performan...
SArndt | 9/23/2014 2:28:12 PM | COMMENTS(5)

Documents & Publications: 26 total

Must be a Topic member to contribute
View All »
A mandate for infrastructure agility, dynamic optimization and software defined environments
Posted by JasonY 5 days ago
This document was created to assist and educate merchants regarding security best practices associated with skimming attacks. Though currently not mandated by PCI SSC, guidelines and best practices documents are produced to help educate and create awareness of challenges faced by the payment industry. The guidelines are the result of industry and law enforcement understanding of the current and evolving threat landscape associated with skimming.
Posted by Andreas Schober 39 days ago
Compliance, Control, Cost and Consumerisation: What businesses can learn from the public sector about best-practice mobile enterprise management.
Posted by nooruddin 61 days ago
Posted by ISACA 159 days ago

Events & Online Learning: 4 total

6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
29 Sep 2014
ISACA International Event
Barcelona, Spain
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM 2014—the leading European conference for IT audit, assurance, security and risk professionals.
6 Oct 2014
ISACA International Event
Panama City, Panama
La Conferencia Latinoamericana CACS/ISRM 2014

Journal Articles: 18 total

Volume 5, 2014
by William Emmanuel Yu, Ph.D., CISM, CRISC, CISSP, CSSLP
As enterprises attempt to determine the best ways of handling today’s bring your own device (BYOD) trends, they also realize the potential for mobilizing their existing enterprise systems and applications.
Volume 5, 2014
by Giuliano Pozza
The discussion around bring your own device (BYOD) policies is often focused on topics such as the opportunity, risk and security implications of using personal devices and user apps in the business context.
Volume 1, 2014
by Daksha Bhasker, CISM
The recent proliferation of promising wireless technologies has quickly been followed by torrents of new mobile malware and cyberthreats.
Volume 4, 2013
by Gaurav Priyadarshi, CISA, BS 25999 LI, ISO 27001 LA, ITIL V3
As BYODT becomes increasingly acceptable and popular, it is likely to be one of the biggest challenges for information security governance.
Volume 1, 2013
by William Emmanuel Yu, Ph.D., CISM, CRISC, CISSP, CSSLP
This article details additional BYOD security concerns that emerge when considering greater mobility and third-party cloud computing.
Volume 1, 2013
by Srikanth Ravindran, Rajat Sadana and Deepa Baranwal
This article provides insights on BYOD, its implication to IT and how organizations need to approach and adopt it.

Wikis: 2 total

Blog Posts: 0 total

Must be a Topic member to view blog posts

No Results Found