Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Risk Assessment

Welcome to the Risk Assessment Topic!

Collaborate, contribute, consume and create knowledge around topics such as core risk processes, scenarios, risk aggregation and response.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
842 Members
0 Online
9846 Visits

Community Leader

Bassil Mohammad

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 35 total

Must be a Topic member to contribute
View All »
Hope you don't mind me posting in this groupabout this year's ISACA Ireland conference, which is focusing on placingbusiness first. Wewould like this conference to be as successful as last year's, which was trulyinternational with 24 speakers from 12 coun...
Neil_Curran | 6/17/2015 4:26:59 AM | COMMENTS(0)
HelloI am in the process of planing for assessment for systems hosting customer data for Mobile operator.In order to do that I am checking with all units to build inventory for the systems and servers hosting the data in their scope but this approach is l...
AHMED359 | 5/28/2015 5:49:37 AM | COMMENTS(1)
IT RISK MANAGEMENTDRIVERS, CHALLENGES AND ENABLERS FOR AUSTRALIANORGANISATIONS To attain strategic, program and operational objectives,most organisations rely on the right IT services to be delivered at the righttime. This is only possible if IT risks hav...
Paras_Shah1 | 4/7/2015 3:44:47 PM | COMMENTS(8)
Hi people, I'm a newly practising CISA, and at the sametime preparing to do the CRISC exam in June 2014; (not to mention my very muchneeded IT Risk assessment input to the organisation's audit plan.)I'm however, having some difficulty with thematerial in ...
Wendy B. | 3/12/2015 6:59:46 PM | COMMENTS(6)
Undocumented features are frequently found in software releases. Software suppliers generally left such features unsupported. What do you consider the risk for using such features? Is there some guidelines on the subject?
Muhammad614 | 2/23/2015 2:40:27 AM | COMMENTS(3)
Do you use probabilities in risk assessment and evaluation? In which manner? Here is my opinion. Agree or not? https://www.academia.edu/5103828/How_Much_Matter_Probabilities_in_Information_Security_Quantitative_Risk_Assessment
Adrian Munteanu | 2/23/2015 2:37:49 AM | COMMENTS(7)

Documents & Publications: 60 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 489 days ago
Posted by ISACA 34 days ago
Posted by ISACA 39 days ago
Posted by ISACA 39 days ago

Events & Online Learning: 4 total

14 Oct 2013
ISACA International Event
Boston, MA, USA
6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
11 Aug 2014
ISACA International Event
Seattle, WA, USA
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.

Journal Articles: 54 total

Volume 1, 2015
by Ed Gelbstein, Ph.D.
An information security practitioner preparing a ROSI calculation needs to prepare it in such a way to ensure that it leads to the requested resources and preserves the practitioner’s credibility.
Volume 6, 2014
by Tommie Singleton, CISA, CGEIT, CPA
With the advent of the latest wave of information technologies such as big data, social media, technologies as a service and the cloud in general, it is worth taking the time to revisit the basics of IT audit.
Volume 5, 2014
by Jonathan Copley, CISA and Upesh Parekh, CISA
A resilient service is one that is capable of withstanding major and minor disruptions caused by natural and man-made sources.
Volume 1, 2014
by Gregory Zoughbi, CISA, CISM, CGEIT, CRISC, COBIT 4.1 (F), ABCP, CISSP, ITIL Expert, PMP, TOGAF 9 (C)
A proper understanding of a potential enterprise resource planning (ERP) investment’s benefits, costs and risk is essential for successfully creating its business case.
Volume 5, 2013
by Shah H. Sheikh, CISA, CISM, CRISC, CISSP, CCSK
Cloud computing is a significant step in the Internet’s evolution, providing the means through which everything can be delivered as a service wherever and whenever needed.
Volume 2, 2013
by Brian Vazzana, CISA, CICA, CPA.CITP
This article guides the IT professional through the mind and methodology of the IS auditor with a specific focus on procedures performed by external auditors.

Wikis: 2 total

Blog Posts: 12 total

13 Nov 2014
You are invited to comment on my post in ISACA Now which can be accessed using the following link: Title: From games to government, babies to business--the role of strategyLink: http://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=386 Shahi...
Posted By : SA | 0 comments
Dear Community Members,We have established the Topic “Strategic Planning/Alignment” which I believe might be of interest to you. We would like to benefit from your experience and knowledge. Some of you are already members of the topic (which you will find...
Posted By : SA | 0 comments
“Enterprise architecture is now a strategic componentof every forward-thinking organization around the world.”Source: http://feapo.org/press-release-ea-perspectives-white-paper/ Related Article: Common Perspective on Enterprise Architecture: http://feapo....
Posted By : SA | 0 comments
Ina fast changing world of business and relentless competition, strategicplanning is not only critical, but also the differentiating factor for anorganization. Since IT has moved from a supportive role to a more strategicrole, the IT Strategic Planning an...
Posted By : SA | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
Enterprise Architecture Practice provides several benefits to organization. Some of the benefits are listed below:  an improved road map for strategy execution; focused and measured strategy implementation; creating synergies; cost reduction (value for m...
Posted By : SA | 0 comments