Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Mobile Computing

Welcome to the Mobile Computing topic!

Collaborate, contribute, consume and create knowledge around compliance with topics such as Bring Your Own Device (BYOD), mobile applications & mobile security.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
838 Members
1 Online
10399 Visits

Community Leader

Andreas Schober

Andreas Schober

Title: Senior Auditor

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 102 total

Must be a Topic member to contribute
View All »
Data loss is a huge problem for companies across the globe. But how big is big, who is most at risk, and what can your organization do about it? Join data protection expert Rob Gresham for a deep-dive analysis of the latest data breach incident benchma...
Andreas Schober | 10/26/2016 2:38:49 AM | COMMENTS(0)
The ISACA® media relations team is conducting the sixth annual IT Risk/Reward Barometer survey on IT-related business issues, and we would like to include your opinions. We are contacting ISACA members around the world to participate in this survey. Respo...
Andreas Schober | 9/28/2016 4:16:27 AM | COMMENTS(0)
Attend this free virtual conference on how to identify and develop risk management strategies specifically tailored to mitigate the threats your business will inevitably face. Cybersecurity Evolves: Risk in the Age of Dark Data, IoT and Advanced Analyt...
Andreas Schober | 8/26/2016 1:30:40 AM | COMMENTS(0)
Hi Anyone here aware of specific frameworks that could be leveraged for mobile applications development and delivery? I am interested to get any information about potential control frameworks that include security requirements in SDLC and could be leverag...
Surya 9 | 8/18/2016 9:07:31 AM | COMMENTS(1)
Employing data classification is now the best practice standard in the first step to achieving a holistic data-centric security strategy, but where do you start? And how do you overcome challenges to implement classification successfully in your organizat...
Andreas Schober | 7/31/2016 10:16:47 AM | COMMENTS(0)
Mobile communications are an increasingly integral part of their everyday lives for people at work and at play. But as mobile access has grown, so have mobile security threats. Such threats are lucrative for hackers and frustrating for companies trying to...
Eric934 | 7/1/2016 12:06:06 AM | COMMENTS(2)

Documents & Publications: 28 total

Must be a Topic member to contribute
View All »
Posted by ISACA 487 days ago
Posted by ISACA 491 days ago
Posted by ISACA 573 days ago
The Global State of Information Security Survey 2015 is a worldwide study by PwC, CIO, and CSO. It was conducted online from March 27, 2014 to May 25, 2014. Readers of CIO and CSO and clients of PwC from around the globe were invited via e-mail to take the survey. The results discussed in this report are based on responses of more than 9,700 CEOs, CFOs, CIOs, CISOs, CSOs, VPs, and directors of IT and security practices from more than 154 countries. Thirty-five percent (35%) of respondents are from North America, 34% from Europe, 14% from Asia Pacific, 13% from South America, and 4% from the Middle East and Africa. The margin of error is less than 1%.
Posted by Andreas Schober 716 days ago
A mandate for infrastructure agility, dynamic optimization and software defined environments
Posted by JasonY 738 days ago

Events & Online Learning: 4 total

21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.
22 Aug 2016
ISACA International Event
Hollywood, Florida, US
2016 GRC Conference - 22-24 August , Fort Lauderdale, FL. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 18 total

Volume 5, 2016
by Betsie Estes
Geolocation is a technology that uses data acquired from an individual’s computer or mobile device to identify or describe the user’s actual physical location.
Volume 4, 2016
Securing Mobile Devices emphasizes the importance of collaboration among business, IT, security, legal and compliance to ensure that controls are properly designed and implemented.
Volume 4, 2016
by Mohammed J. Khan, CISA, CRISC, CIPM
It is imperative that IT auditors work with all teams within the organization responsible for the development of mobile apps—business, IT development, IT security, legal and compliance.
Volume 4, 2016
by Robert Clyde, CISM
Ask any merchant and he/she will tell you that accepting credit card payments comes with its own set of security challenges.
Volume 4, 2016
by Larry G. Wlosinski, CISA, CISM, CRISC, CAP, CBCP, CCSP, CDP, CISSP, ITIL v3
This article discusses the actors, threats, vulnerabilities and risk associated with mobile computing devices and highlights the pervasiveness of security and privacy problems and issues.
Volume 3, 2016
While mobile devices have enhanced productivity, these devices compete for limited attention span and may make it more difficult to gain sufficient attention for security awareness.

Wikis: 2 total

Blog Posts: 2 total

Must be a Topic member to view blog posts
New post on IT Grackle: "The Privacy Lock On Your Phone" #mobile #security
Posted By : Calvin Powers | 0 comments
Antes  que nada quisiera dedicar estas lineas aun grande del internet : Aaron Swartz ... No en vano el inventor de la World Wide Web, Sir Tim Berners-Lee, tuiteó: "Aaron está muerto. Caminantes del mundo, perdimos a uno de nuestros sabios. Hackers por der...
Posted By : ArthurHuamani | 0 comments