Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Mobile Computing

Welcome to the Mobile Computing topic!

Collaborate, contribute, consume and create knowledge around compliance with topics such as Bring Your Own Device (BYOD), mobile applications & mobile security.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
440 Members
1 Online
7022 Visits

 Recent Discussions

HTTP Shaming IDs apps and Web services operat... Posted by JasonY.
Upcoming Webinar: Mobile Device Access vs Ente... Posted by Andreas Schober.
Uber Vs. Lyft. Posted by JasonY.

Community Leader

Andreas Schober

Andreas Schober

Title: Senior Auditor

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 50 total

Must be a Topic member to contribute
View All »
This new website, HTTP Shaming, provides a list of websites and mobile apps that have weak security that can put consumers at risk. Check it out... Article: S...
JasonY | 8/23/2014 2:06:47 AM | COMMENTS(3)
Enabling employees and others to exchange data between enterprise networks and their own mobile devices has helped achieve significant competitive advantages for businesses the world over. But the wholesale use of mobile devices within enterprises also co...
Andreas Schober | 8/23/2014 1:59:06 AM | COMMENTS(2)
While this article isn't directly related to security, the rapid growth and subsequent competition between Uber and Lyft (and conventional taxis) is continuing to get more intense.  These companies are transforming the way the personal transportation indu...
JasonY | 8/18/2014 5:47:48 PM | COMMENTS(2)
Using mobile devices to handle enterprise data may expose corporate information to new types of attacks and threats. But failure to allow mobile devices in also exposes organizations to potential competitive disadvantages. How do you evaluate the conflict...
Andreas Schober | 8/18/2014 2:17:44 PM | COMMENTS(4)
Bring Your Own Identity (BYOID) can deliver tangible benefits, but also potential risk and liability concerns. CA Technologies and The Ponemon Institute recently conducted a worldwide survey of over 3,000 IT and business users to understand the value, ben...
Andreas Schober | 8/7/2014 6:38:38 AM | COMMENTS(1)
Hi Everyone, I'm the chapter president of ISACA Ireland and would like to let members of this topic know that we are seeking innovative, practical and / or thought provoking session proposals for our conference on 3rd Oct 2014.  For knowledge center membe...
Neil_Curran | 8/2/2014 1:14:54 PM | COMMENTS(0)

Documents & Publications: 23 total

Must be a Topic member to contribute
View All »
Compliance, Control, Cost and Consumerisation: What businesses can learn from the public sector about best-practice mobile enterprise management.
Posted by nooruddin 6 days ago
Posted by ISACA 104 days ago
Posted by ISACA 213 days ago

Events & Online Learning: 4 total

6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
29 Sep 2014
ISACA International Event
Barcelona, Spain
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM 2014—the leading European conference for IT audit, assurance, security and risk professionals.
6 Oct 2014
ISACA International Event
Panama City, Panama
La Conferencia Latinoamericana CACS/ISRM 2014

Journal Articles: 16 total

Volume 1, 2014
by Daksha Bhasker, CISM
The recent proliferation of promising wireless technologies has quickly been followed by torrents of new mobile malware and cyberthreats.
Volume 4, 2013
by Gaurav Priyadarshi, CISA, BS 25999 LI, ISO 27001 LA, ITIL V3
As BYODT becomes increasingly acceptable and popular, it is likely to be one of the biggest challenges for information security governance.
Volume 1, 2013
by William Emmanuel Yu, Ph.D., CISM, CRISC, CISSP, CSSLP
This article details additional BYOD security concerns that emerge when considering greater mobility and third-party cloud computing.
Volume 1, 2013
by Pascal A. Bizarro, Ph.D., CISA, Andy Garcia, Ph.D., CPA and Jacob Nix
Risk exists with the implementation of personal mobile devices in business, but with risk comes reward.
Volume 1, 2013
by Srikanth Ravindran, Rajat Sadana and Deepa Baranwal
This article provides insights on BYOD, its implication to IT and how organizations need to approach and adopt it.
Volume 4, 2012
by Gan Subramaniam, CISA, CISM, CCNA, CCSA, CIA, CISSP, ISO 27001 LA, SSCP
What kind of security controls must be in place to tackle BYOD?

Wikis: 2 total

Blog Posts: 0 total

Must be a Topic member to view blog posts

No Results Found