Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Mobile Computing

Welcome to the Mobile Computing topic!

Collaborate, contribute, consume and create knowledge around compliance with topics such as Bring Your Own Device (BYOD), mobile applications & mobile security.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
416 Members
3 Online
6725 Visits

 Recent Discussions

Mobile Device Vulnerability to Heartbleed Bug. Posted by Andreas Schober.
@ISACA Volume 8. Posted by Andreas Schober.
Mobile device encryption. Posted by Andreas Schober.

Community Leader

Andreas Schober

Andreas Schober

Title: Senior Auditor

NEW! Participate in Discussions Via Email. 

You can now respond to discussions by simply replying to the email alert. Just enable this feature in discussions on this topic. Learn more

Discussions: 41 total

Must be a Topic member to contribute
View All »
Regarding the Heartbleed Vulnerability made public last week you may be interested in the following aritcle: Android Devices Vulnerable to Heartbleed Bug by Jordan Robertson http://www.bloomberg.com/news/2014-04-11/millions-of-android-devices-vulnerable-t...
Andreas Schober | 4/14/2014 2:08:33 AM | COMMENTS(0)
For those interested in Frameworks, there are exciting news: the new NIST Cybersecurity Framework Features COBIT 5 in Its Core. For detailed information read the latest edition of @ISACA.
Andreas Schober | 4/10/2014 3:54:31 AM | COMMENTS(0)
If you are interested in Mobile device encryption may I point you to these two articles: Mobile device encryption: Balancing data protection and performance by Brien Posey: http://searchhealthit.techtarget.com/feature/Mobile-device-encryption-Balancing-d...
Andreas Schober | 3/11/2014 6:40:34 AM | COMMENTS(0)
There's been a lot of discussion about tech at the Super Bowl. (See below.) Wondering what everyone here thinks about some of the coolest new developments? http://www.forbes.com/sites/haydnshaughnessy/2014/01/29/super-bowl-2014-stirring-up-the-wearable...
Chris McNamara | 2/3/2014 3:43:57 AM | COMMENTS(1)
Smart grids, smartphones and other new technologies are generating terabytes of consumer data and, potentially, big headaches for privacy professionals. Protect your enterprise’s reputation—join privacy expert Rebecca Herold tomorrow, 9 January 2014, at 1...
Andreas Schober | 1/9/2014 3:34:58 AM | COMMENTS(0)
As some may have already noticed there is a new resource online: "Security as a Service" an ISACA Cloud Vision Series White Paper. https://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Security-As-A-Service.aspx
Andreas Schober | 12/10/2013 2:07:19 AM | COMMENTS(0)

Documents & Publications: 21 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 76 days ago
Downloads
Posted by ISACA 224 days ago
Research
Posted by ISACA 224 days ago

Events & Online Learning: 4 total

6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
30 Apr 2014
Online
Online
29 Sep 2014
ISACA International Event
Barcelona, Spain
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM 2014—the leading European conference for IT audit, assurance, security and risk professionals.
6 Oct 2014
ISACA International Event
Panama City, Panama
La Conferencia Latinoamericana CACS/ISRM 2014

Journal Articles: 17 total

Volume 1, 2014
by Daksha Bhasker, CISM
The recent proliferation of promising wireless technologies has quickly been followed by torrents of new mobile malware and cyberthreats.
Volume 6, 2013
by Adesanya Ahmed, CRISC, CGEIT, ACMA, ACPA
Smartphones, tablets and other mobile devices are playing an increasingly central role in how people communicate, network, work, shop and receive information.
Volume 4, 2013
by Gaurav Priyadarshi, CISA, BS 25999 LI, ISO 27001 LA, ITIL V3
As BYODT becomes increasingly acceptable and popular, it is likely to be one of the biggest challenges for information security governance.
Volume 1, 2013
by William Emmanuel Yu, Ph.D., CISM, CRISC, CISSP, CSSLP
This article details additional BYOD security concerns that emerge when considering greater mobility and third-party cloud computing.
Volume 1, 2013
by Pascal A. Bizarro, Ph.D., CISA, Andy Garcia, Ph.D., CPA and Jacob Nix
Risk exists with the implementation of personal mobile devices in business, but with risk comes reward.
Volume 1, 2013
by Srikanth Ravindran, Rajat Sadana and Deepa Baranwal
This article provides insights on BYOD, its implication to IT and how organizations need to approach and adopt it.

Wikis: 2 total

Blog Posts: 1 total

Must be a Topic member to view blog posts
Antigamente para estar disponível um executivo precisava apenas de um celular para receber chamadas. Com o avanço da tecnologia móvel, a disponibilidade vai muito além de atender ligações: envolve o acesso à Internet, aos sistemas corporativos, à i...
Posted By : jpontes | 0 comments