Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Mobile Computing

Welcome to the Mobile Computing topic!

Collaborate, contribute, consume and create knowledge around compliance with topics such as Bring Your Own Device (BYOD), mobile applications & mobile security.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
578 Members
1 Online
7975 Visits

Community Leader

Andreas Schober

Andreas Schober

Title: Senior Auditor

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 67 total

Must be a Topic member to contribute
View All »
If you are interested in the progress regarding the alleged Gemalto SIM card encryption keys hack you may find Gemalto's latest press release - which presents the findings of its investigations - helpful. http://www.gemalto.com/press/Pages/Gemalto-presen...
Andreas Schober | 2/26/2015 4:44:04 AM | COMMENTS(0)
Hello I am about to start a Remote Support audit and I was wondering if anyone has or knows of a Remote Support audit program? Thank you.
Joanne548 | 2/23/2015 4:20:47 AM | COMMENTS(7)
For those interested in policies, technology and best practices to manage, monitor and audit the use of mobile devices as part of a larger Identity Management strategy may find the upcoming webinar by Mark Wilcox (Senior Principal Product Manager, Oracle ...
Andreas Schober | 2/2/2015 1:38:49 AM | COMMENTS(0)
Does anyone out in the community here have any suggestions for assessing risk of (medical) mobile device applications? Here's the scenario: occasionally one of our medical offices will request purchase and use of a new system, application, or other new te...
Carl097 | 1/26/2015 7:36:21 AM | COMMENTS(6)
Gain the cybersecurity expert’s no-holds-barred perspectives on how existing endpoint security is leaving your enterprise vulnerable to sophisticated attacks. Join Palo Alto Networks’ Sebastian Goodwin for the 2015's first free, one-hour ISACA® Spotlight ...
Andreas Schober | 1/8/2015 1:16:34 AM | COMMENTS(0)
Hello Did anybody tried using / tested NowSecure ?  https://www.nowsecure.com/ I am looking for feedback. I have tried the applicaiton on my Android, and found to be informative, as a user. Would this help increase awareness among End Users on risks re...
Gupta Boda | 1/1/2015 1:27:46 PM | COMMENTS(3)

Documents & Publications: 25 total

Must be a Topic member to contribute
View All »
The Global State of Information Security Survey 2015 is a worldwide study by PwC, CIO, and CSO. It was conducted online from March 27, 2014 to May 25, 2014. Readers of CIO and CSO and clients of PwC from around the globe were invited via e-mail to take the survey. The results discussed in this report are based on responses of more than 9,700 CEOs, CFOs, CIOs, CISOs, CSOs, VPs, and directors of IT and security practices from more than 154 countries. Thirty-five percent (35%) of respondents are from North America, 34% from Europe, 14% from Asia Pacific, 13% from South America, and 4% from the Middle East and Africa. The margin of error is less than 1%.
Posted by Andreas Schober 112 days ago
A mandate for infrastructure agility, dynamic optimization and software defined environments
Posted by JasonY 134 days ago
This document was created to assist and educate merchants regarding security best practices associated with skimming attacks. Though currently not mandated by PCI SSC, guidelines and best practices documents are produced to help educate and create awareness of challenges faced by the payment industry. The guidelines are the result of industry and law enforcement understanding of the current and evolving threat landscape associated with skimming.
Posted by Andreas Schober 168 days ago
Compliance, Control, Cost and Consumerisation: What businesses can learn from the public sector about best-practice mobile enterprise management.
Posted by nooruddin 191 days ago

Events & Online Learning: 6 total

6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
29 Sep 2014
ISACA International Event
Barcelona, Spain
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM 2014—the leading European conference for IT audit, assurance, security and risk professionals.
6 Oct 2014
ISACA International Event
Panama City, Panama
La Conferencia Latinoamericana CACS/ISRM 2014
17 Aug 2015
ISACA International Event
Phoenix, Arizona, US
The IIA and ISACA partner to help you create a foundation for success at the GRC Conference.

Journal Articles: 19 total

Volume 2, 2015
by Marcelo Hector Gonzalez, CISA, CRISC, and Jana Djurica
There are a number of definitions of Internet of Things (IoT), with all of them having slightly different meanings.
Volume 5, 2014
by William Emmanuel Yu, Ph.D., CISM, CRISC, CISSP, CSSLP
As enterprises attempt to determine the best ways of handling today’s bring your own device (BYOD) trends, they also realize the potential for mobilizing their existing enterprise systems and applications.
Volume 5, 2014
by Giuliano Pozza
The discussion around bring your own device (BYOD) policies is often focused on topics such as the opportunity, risk and security implications of using personal devices and user apps in the business context.
Volume 1, 2014
by Daksha Bhasker, CISM
The recent proliferation of promising wireless technologies has quickly been followed by torrents of new mobile malware and cyberthreats.
Volume 4, 2013
by Gaurav Priyadarshi, CISA, BS 25999 LI, ISO 27001 LA, ITIL V3
As BYODT becomes increasingly acceptable and popular, it is likely to be one of the biggest challenges for information security governance.
Volume 1, 2013
by William Emmanuel Yu, Ph.D., CISM, CRISC, CISSP, CSSLP
This article details additional BYOD security concerns that emerge when considering greater mobility and third-party cloud computing.

Wikis: 2 total

Blog Posts: 2 total

Must be a Topic member to view blog posts
New post on IT Grackle: "The Privacy Lock On Your Phone" http://goo.gl/qMNfC #mobile #security
Posted By : Calvin Powers | 0 comments
Antes  que nada quisiera dedicar estas lineas aun grande del internet : Aaron Swartz ... No en vano el inventor de la World Wide Web, Sir Tim Berners-Lee, tuiteó: "Aaron está muerto. Caminantes del mundo, perdimos a uno de nuestros sabios. Hackers por der...
Posted By : ArthurHuamani | 0 comments