Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Risk Assessment

Welcome to the Risk Assessment Topic!

Collaborate, contribute, consume and create knowledge around topics such as core risk processes, scenarios, risk aggregation and response.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
934 Members
2 Online
10398 Visits

Community Leader

Bassil Mohammad


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 39 total

Must be a Topic member to contribute
View All »
Dears, I recently completed an IT Risk Management project for a leading Oil & Gas company in ME with Cobit 5 for Risk as a framework for Risk Function and Management. To share experience, I will post a series of views on how I found Cobit 5 for Risk imple...
Bassil Mohammad | 11/22/2015 1:19:14 PM | COMMENTS(12)
Has anyone been party to a risk assessment of a cloud service? Is there anything you can share on your experience of this exercise?
Phil Green | 10/31/2015 5:35:39 AM | COMMENTS(0)
Has anyone had a formal IT Risk assessment completed by an independent outside entity?  If so, would you be willing to share your experience?  We plan to focus primarily on system applications originally. Thanks in advance for any assistance!
Tasha809 | 10/1/2015 12:04:08 PM | COMMENTS(2)
Does/Has anyone done any risk assessment on software defined networks (SDN)? If so, can you share your resources? Thank you
cjustice | 9/13/2015 10:04:08 PM | COMMENTS(2)
Dears, There are no much actual use cases for COBIT 5 - in IT.Can you share any experiences that you have in this regards? I saw several published cases, but I do not believe they really reflect an actual implementation of COBIT 5.  
Bassil Mohammad | 8/20/2015 6:07:06 AM | COMMENTS(0)
Hope you don't mind me posting in this groupabout this year's ISACA Ireland conference, which is focusing on placingbusiness first. Wewould like this conference to be as successful as last year's, which was trulyinternational with 24 speakers from 12 coun...
Neil_Curran | 6/17/2015 4:26:59 AM | COMMENTS(0)

Documents & Publications: 69 total

Must be a Topic member to contribute
View All »
Posted by ISACA 606 days ago
Posted by ISACA 4 days ago
Posted by ISACA 14 days ago

Events & Online Learning: 8 total

14 Oct 2013
ISACA International Event
Boston, MA, USA
6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
11 Aug 2014
ISACA International Event
Seattle, WA, USA
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.

Journal Articles: 57 total

Volume 6, 2015
by Mette Brottmann, Klaus Agnoletti, Morten Als Pedersen, Ronnie Lykke Madsen, Michael Rosendal Krumbak and Thor Ahrends, CISA, CISM, CRISC
Most IT professionals know the theory and importance of addressing and mitigating risk. Daily resource limitations and task prioritisation, however, do not always allow for best practice approaches to be taken.
Volume 5, 2015
by Omar Y. Sharkasi, CBCP, CFE, CRP
IT leaders must increase cybersecurity public awareness and coordination across the subset of federal governments, all while having to do more with less.
Volume 1, 2015
by Ed Gelbstein, Ph.D.
An information security practitioner preparing a ROSI calculation needs to prepare it in such a way to ensure that it leads to the requested resources and preserves the practitioner’s credibility.
Volume 1, 2015
by Ed Gelbstein, Ph.D.
An information security practitioner preparing a ROSI calculation needs to prepare it in such a way to ensure that it leads to the requested resources and preserves the practitioner’s credibility.
Volume 6, 2014
by Tommie Singleton, CISA, CGEIT, CPA
With the advent of the latest wave of information technologies such as big data, social media, technologies as a service and the cloud in general, it is worth taking the time to revisit the basics of IT audit.
Volume 5, 2014
by Jonathan Copley, CISA and Upesh Parekh, CISA
A resilient service is one that is capable of withstanding major and minor disruptions caused by natural and man-made sources.

Wikis: 2 total

Blog Posts: 12 total

13 Nov 2014
You are invited to comment on my post in ISACA Now which can be accessed using the following link: Title: From games to government, babies to business--the role of strategyLink: Shahi...
Posted By : SA | 0 comments
Dear Community Members,We have established the Topic “Strategic Planning/Alignment” which I believe might be of interest to you. We would like to benefit from your experience and knowledge. Some of you are already members of the topic (which you will find...
Posted By : SA | 0 comments
“Enterprise architecture is now a strategic componentof every forward-thinking organization around the world.”Source: Related Article: Common Perspective on Enterprise Architecture: http://feapo....
Posted By : SA | 0 comments
Ina fast changing world of business and relentless competition, strategicplanning is not only critical, but also the differentiating factor for anorganization. Since IT has moved from a supportive role to a more strategicrole, the IT Strategic Planning an...
Posted By : SA | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
Enterprise Architecture Practice provides several benefits to organization. Some of the benefits are listed below:  an improved road map for strategy execution; focused and measured strategy implementation; creating synergies; cost reduction (value for m...
Posted By : SA | 0 comments