Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Mobile Computing

Welcome to the Mobile Computing topic!

Collaborate, contribute, consume and create knowledge around compliance with topics such as Bring Your Own Device (BYOD), mobile applications & mobile security.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
911 Members
3 Online
11163 Visits

Community Leader

Andreas Schober

Andreas Schober

Title: Senior Auditor

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 112 total

Must be a Topic member to contribute
View All »
The ISACA® media relations team is conducting the sixth annual IT Risk/Reward Barometer survey on IT-related business issues, and we would like to include your opinions. We are contacting ISACA members around the world to participate in this survey. Respo...
Andreas Schober | 8/21/2017 7:25:09 AM | COMMENTS(2)
Mobile communications are an increasingly integral part of their everyday lives for people at work and at play. But as mobile access has grown, so have mobile security threats. Such threats are lucrative for hackers and frustrating for companies trying to...
Eric934 | 8/21/2017 7:23:36 AM | COMMENTS(3)
https://www.linkedin.com/pulse/mobile-ransomware-risen-threat-vaibhav-tole?articleId=6154166189766512640#comments-6154166189766512640&trk=prof-post What is a Ransomware:In 'simpler' words - Ransomware is a a malware that locks / encrypts / prevents a devi...
VaibhavTole | 8/21/2017 7:22:20 AM | COMMENTS(1)
The average time to find and respond to a breach has improved drastically. But, really, 147 days is still 147 days too long. In this presentation, we will explore how to harness the common detection techniques used by Prairie Dogs (yes, Prairie Dogs) and ...
Andreas Schober | 8/21/2017 7:21:16 AM | COMMENTS(3)
Hi Everyone, For a while now, I have been thinking, not too sure, if malware designed for mobile devices, such as the Android, iOS, et al have enough damaging power to destroy computer files. If the answer is YES, I would like anyone to suggest PRACTICABL...
Adesoji | 8/21/2017 7:18:03 AM | COMMENTS(8)
Through 2017 organizations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organization will be compromised, but when. A traditional prevention-centric strategy naively assumes all threats...
Andreas Schober | 8/21/2017 7:17:52 AM | COMMENTS(2)

Documents & Publications: 18 total

Must be a Topic member to contribute
View All »
Posted by ISACA 872 days ago
Posted by ISACA 877 days ago
The Global State of Information Security Survey 2015 is a worldwide study by PwC, CIO, and CSO. It was conducted online from March 27, 2014 to May 25, 2014. Readers of CIO and CSO and clients of PwC from around the globe were invited via e-mail to take the survey. The results discussed in this report are based on responses of more than 9,700 CEOs, CFOs, CIOs, CISOs, CSOs, VPs, and directors of IT and security practices from more than 154 countries. Thirty-five percent (35%) of respondents are from North America, 34% from Europe, 14% from Asia Pacific, 13% from South America, and 4% from the Middle East and Africa. The margin of error is less than 1%.
Posted by Andreas Schober 1101 days ago
A mandate for infrastructure agility, dynamic optimization and software defined environments
Posted by JasonY 1123 days ago
This document was created to assist and educate merchants regarding security best practices associated with skimming attacks. Though currently not mandated by PCI SSC, guidelines and best practices documents are produced to help educate and create awareness of challenges faced by the payment industry. The guidelines are the result of industry and law enforcement understanding of the current and evolving threat landscape associated with skimming.
Posted by Andreas Schober 1157 days ago

Events & Online Learning: 2 total

16 Aug 2017
ISACA International Event
Grapevine, Texas, US
2018 GRC Conference - 13-15 August , Nashville, TN. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 31 total

Volume 6, 2017
by Ian Cooke, CISA, CGEIT, CRISC, COBIT Assessor and Implementer, CFE, CPTE, DipFM, ITIL Foundation, Six Sigma Green Belt
As the uses, storage capabilities, power and proliferation of mobile devices have increased, so has the risk they pose to an enterprise.
Volume 5, 2017
by Adeniyi Akanni, Ph. D., CISA, CRISC, ISO 27001 LA, ITIL
Using mobile devices to complete commercial transactions is a newer scientific advancement in the information and communication technology (ICT) sphere.
Volume 4, 2017
by Ed Moyle
From email to calendaring to business applications, employees are, quite literally, doing business from any device, any time of the day or night, from anywhere and everywhere on the planet.
Volume 4, 2017
by Sunil Bakshi, CISA, CRISC, CISM, CGEIT, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP
Our organization has employees who work mostly in the field. Previously, they had been provided laptops and mobile phones by the organization.
Volume 4, 2017
by Guy Ngambeket, CISA, CISM, CGEIT, ITIL v3 , PMP
Remote working has a lot of advantages, both for the company and the employees. In the past years, it has become increasingly used by companies as a perk.
Volume 3, 2017
by Indrajit Atluri, CRISC, CISM, CEH, CISSP, CSSLP, HCISPP, ITILv3
The resolve to address IoT device security at various levels—hardware and software, government and enterprise, consumers and services—is widespread.

Wikis: 2 total

Blog Posts: 3 total

Must be a Topic member to view blog posts
La demanda de servicios bancarios a través de Internet, producto del surgimiento de nuevas necesidades en los consumidores atraídos por el auge tecnológico, mantiene a las entidades financieras inmersas en una encrucijada en la cual deben equilibrar el ni...
Posted By : Gerardo Zuñiga | 1 comments
New post on IT Grackle: "The Privacy Lock On Your Phone" http://goo.gl/qMNfC #mobile #security
Posted By : Calvin Powers | 0 comments
Antes  que nada quisiera dedicar estas lineas aun grande del internet : Aaron Swartz ... No en vano el inventor de la World Wide Web, Sir Tim Berners-Lee, tuiteó: "Aaron está muerto. Caminantes del mundo, perdimos a uno de nuestros sabios. Hackers por der...
Posted By : ArthurHuamani | 0 comments