Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Risk Assessment

Welcome to the Risk Assessment Topic!

Collaborate, contribute, consume and create knowledge around topics such as core risk processes, scenarios, risk aggregation and response.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
1481 Members
2 Online
14319 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 58 total

Must be a Topic member to contribute
View All »
Third Party/Supply Chain Risk Assessment is an area where a lot of organisations struggle and it is one which is becoming increasingly important. Security of the supply chain features in regulations such as EU GDPR and the EU NIS Directive and also sector...
Michael441 | 6/3/2018 7:21:07 AM | COMMENTS(1)
We are looking for a web based tool to survey our executive management team. We would like them to be able to rank the risks relevant to their areas and then compile the data to be used in our overall risk assessment. What tools have you all used for this...
Caitlin663 | 4/20/2018 8:48:52 AM | COMMENTS(2)
Hello, I am looking for a framework/model for an application risk assessment that I could adopt for my Bank. Do you have one that you could share with me? Thanks Parvathy
Parvathy918 | 4/18/2018 3:07:49 PM | COMMENTS(5)
Hi members, I am wondering if any of you could share an information gathering questionnaire when evaluating a new vendor or third party. I ran into the SIG Shared Assessment Questionnaire but it seems a bit pricey... Thanks in advance!
danic1979 | 2/9/2018 7:52:22 AM | COMMENTS(0)
Has anyone ever seen mention of the concept of a Disaster Recovery Risk Assessment? Our company has done a risk assessment and we have a Disaster Recovery Plan, but they are separate document though of course related but I had never seen the idea even, o...
Steven373 | 1/30/2018 4:12:26 PM | COMMENTS(4)
I am looking for a risk assessment template for web application security.  
Deidre085 | 12/13/2017 2:39:59 PM | COMMENTS(1)

Documents & Publications: 35 total

Must be a Topic member to contribute
View All »
Posted by ISACA 1543 days ago
This article contains a description of a new approach to conducting information security assessments. The new approach eliminates redundant assessments and removes the need to use inherited controls.
Posted by Larry Wlosinski 793 days ago
Posted by ISACA 836 days ago
Posted by ISACA 941 days ago

Events & Online Learning: 5 total

16 Mar 2015
ISACA International Event
Orlando, FL, USA
1 Aug 2016
ISACA International Event
Chicago, IL, USA
4 Dec 2018
ISACA International Event
San Diego, CA, USA

Journal Articles: 29 total

Volume 6, 2106
by Venkatasubramanian Ramakrishnan, CISM, CRISC, CHFI
Bayesian networks can capture the complex interdependencies among risk factors and can effectively combine data with expert judgment.
Volume 3, 2018
This article describes an approach that can be used to establish the correlation among operational IT risk, the appropriateness of mitigating measures and organizational targets.
Volume 4, 2017
by Steven De Haes, Ph.D., Anant Joshi, Ph.D., Tim Huygh and Salvi Jansen
IT governance, also referred to as governance of enterprise IT (GEIT) or corporate governance of IT, is a subset of corporate governance that is concerned with enterprise IT assets.
Volume 4, 2017
by Sudhakar Sathiyamurthy, CISA, CRISC, CGEIT, CIPP, ITIL Expert
The trustworthiness of various risk assessment methods in pursuit of risk-based decisions is largely questioned in the marketplace.
Volume 6, 2016
by Shirali Vyas, CA, ICAI
The 2008 financial crisis and its cascading effects have made it necessary to redefine the supplier risk management norms.
Volume 3, 2016
by Ed Gelbstein, Ph.D.
Every topic can be subdivided into many more sections, but the intention of this column is not to provide a detailed manual (it would be a large book), just an overview.

Wikis: 2 total

Blog Posts: 15 total

Mi primer acercamiento real al Framework (o Marco de Referencia) de ISACA COBIT 5, fue a mediados del año pasado (2016) cuando decidí tomar un curso de examinación para la certificación de COBIT® 5 Foundation (Fundamentos de COBIT 5). La jerga técnica me ...
Posted By : MNUNEZA | 0 comments
Information Security and Privacy is hot issue at present time. Number of security breaches is rapidly increasing.  In case of late detection, costs of breaches are skyrocketing. In the same time Artificial Intelligence (AI), Machine Learning (ML) are fast...
Posted By : Dragan Pleskonjic | 0 comments
“Enterprise architecture is now a strategic componentof every forward-thinking organization around the world.”Source: Related Article: Common Perspective on Enterprise Architecture: http://feapo....
Posted By : SA | 1 comments
Let us have positive inspirational slogans for every situation. Last week I started the project meeting like this: I don't know you are all so good at tuning the website. The performance is now is wonderful. I could witness reduction of stress, anxiety an...
Posted By : Jayakumar Sundaram | 1 comments
Dear Community Members,We have established the Topic “Strategic Planning/Alignment” which I believe might be of interest to you. We would like to benefit from your experience and knowledge. Some of you are already members of the topic (which you will find...
Posted By : SA | 1 comments
13 Nov 2014
You are invited to comment on my post in ISACA Now which can be accessed using the following link: Title: From games to government, babies to business--the role of strategyLink: Shahi...
Posted By : SA | 0 comments