Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Physical Security

Welcome to the Physical Security topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
306 Members
0 Online
6727 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 22 total

Must be a Topic member to contribute
View All »
I am shortly commencing a physical security assessment of a series of healthcare facilities in the same network. I'm seeking any guidance from peers related to relevant frameworks, standards, and best practices. I do have a good ASIS publication and would...
Nick908 | 2/18/2018 9:22:13 PM | COMMENTS(0)
Does the ATM antiskimming devices are operational risk or information security ?
Tarek EL-Sherif | 12/18/2017 4:23:00 AM | COMMENTS(0)
Regarding environment risks such as flood, fire, collapse, or even typhoon and earthquake, which shall be fall into the scope of physical security. Since those datacenter is usually build and established, there isn't much can be improved afterwards. An...
Antony Lee | 11/20/2017 7:46:51 AM | COMMENTS(1)
Every one nowadays uses social media. My own experience of using social media to share picture and having a good memories while at work. Is this a threat?  Data center should be kept in secure location, no windows and implement dead man doors etc.  By sha...
nooruddin | 7/27/2017 11:08:57 AM | COMMENTS(6)
Can anyone in this forum recommend a good biometric access solution for a corporate data centre?
Phil Green | 2/16/2016 7:02:11 AM | COMMENTS(1)
Hi Everyone, I am starting a spreadsheet for Intrusion Systems. Can you please tell me if your Intrusion Systems are on a generator back-up circuit? If you're not sure please ask your facilities manager. All the best! Dave
David446 | 2/16/2016 6:37:12 AM | COMMENTS(5)

Documents & Publications: 2 total

Must be a Topic member to contribute
Is the system backed up by properly trained, alert guards? Is the alarm system for active areas of structures turned off during operational hours? Is the system tested prior to activating it from nonoperational periods? Is the alarm system inspected regularly? Is the system tamper-resistant? Weatherproof? Is an alternate alarm system provided for use in the event of failure of the primary system? and all related question.. more
Posted by nooruddin 1366 days ago
Books
Posted by ISACA 2204 days ago

Events & Online Learning: 0 total

No Results Found

Journal Articles: 3 total

Volume 3, 2018
by Charles Hale, CCNA, CISSP, MCSE
With the aggressive pace at which data have grown and the need for constant real-time access becoming the norm, paying increased attention to securing networks and data has become critical.
Volume 4, 2014
by Haris Hamidovic, Ph.D., CIA, ISMS IA
The fire protection strategy for computer rooms should be formulated after determination of, or in conjunction with, the choice of a disaster recovery plan.
Volume 4, 2011
by Peter English, CISM
Advanced electronic equipment and fast, cheap communications mean that many previously static aspects of daily life, including physical security, are lagging behind the new reality that has been created.

Wikis: 2 total

Blog Posts: 1 total

Must be a Topic member to view blog posts
On March 1st,  I was invited to speak at the CampIT conference on Enterprise Risk/Security Management at Rosemont Convention Center. Before me there were two speakers. The first presenter spent an hour presenting the story from the trenches of technolog...
Posted By : appolloconsulting | 2 comments