Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Risk Assessment

Welcome to the Risk Assessment Topic!

Collaborate, contribute, consume and create knowledge around topics such as core risk processes, scenarios, risk aggregation and response.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
623 Members
2 Online
8198 Visits

 Recent Discussions

Probabilities in risk assessment. Posted by Adrian Munteanu.
CRISC Tutorial Videos. Posted by Wendy B..
2013 IT Risk Management Whitepaper. Posted by Paras_Shah1.

Community Leader

Bassil Mohammad
NEW! Participate in Discussions Via Email. 

You can now respond to discussions by simply replying to the email alert. Just enable this feature in discussions on this topic. Learn more

Discussions: 31 total

Must be a Topic member to contribute
View All »
Do you use probabilities in risk assessment and evaluation? In which manner? Here is my opinion. Agree or not?
Adrian Munteanu | 5/25/2014 7:16:45 AM | COMMENTS(5)
Hi people, I'm a newly practising CISA, and at the sametime preparing to do the CRISC exam in June 2014; (not to mention my very muchneeded IT Risk assessment input to the organisation's audit plan.)I'm however, having some difficulty with thematerial in ...
Wendy B. | 5/25/2014 6:44:54 AM | COMMENTS(2)
IT RISK MANAGEMENTDRIVERS, CHALLENGES AND ENABLERS FOR AUSTRALIANORGANISATIONS To attain strategic, program and operational objectives,most organisations rely on the right IT services to be delivered at the righttime. This is only possible if IT risks hav...
Paras_Shah1 | 5/25/2014 3:53:45 AM | COMMENTS(3)
Undocumented features are frequently found in software releases. Software suppliers generally left such features unsupported. What do you consider the risk for using such features? Is there some guidelines on the subject?
Muhammad614 | 4/19/2014 1:10:09 PM | COMMENTS(2)
Hello everyone, I'd like to use COBIT for risk, someone has already used and some examples of results
Francesco Blanco (Italy) | 2/6/2014 6:11:42 AM | COMMENTS(0)
ISACA's Guidance and Practices Committee is developing a practical guidance on how to develop and manage risk scenarios using the soon-to-be released COBIT 5 for Risk. We're looking for risk professionals with practical experience to review the publicatio...
Tammie111 | 12/4/2013 11:23:14 AM | COMMENTS(2)

Documents & Publications: 49 total

Events & Online Learning: 6 total

14 Oct 2013
ISACA International Event
Boston, MA, USA
6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
11 Aug 2014
ISACA International Event
Seattle, WA, USA
29 Sep 2014
ISACA International Event
Barcelona, Spain
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM 2014—the leading European conference for IT audit, assurance, security and risk professionals.
2 Dec 2014
ISACA International Event
Las Vegas, NV, USA

Journal Articles: 51 total

Volume 1, 2014
by Gregory Zoughbi, CISA, CISM, CGEIT, CRISC, COBIT 4.1 (F), ABCP, CISSP, ITIL Expert, PMP, TOGAF 9 (C)
A proper understanding of a potential enterprise resource planning (ERP) investment’s benefits, costs and risk is essential for successfully creating its business case.
Volume 5, 2013
Cloud computing is a significant step in the Internet’s evolution, providing the means through which everything can be delivered as a service wherever and whenever needed.
Volume 2, 2013
by Brian Vazzana, CISA, CICA, CPA.CITP
This article guides the IT professional through the mind and methodology of the IS auditor with a specific focus on procedures performed by external auditors.
Volume 6, 2012
by Mukul Pareek, CISA, ACA, AICWA, PRM
In the world of market and credit risk, scenario analysis is used as a part of stress testing.
Volume 1, 2012
by Ronke Oyemade, CISA, CRISC, PMP
This article defines IT governance, addresses its importance, and describes how to apply the three lines of defense by implementing a combination of the Risk IT and COBIT frameworks.
Volume 6, 2010
by Jose Luis Carrera Jr., CFE, CIA
Carrera has more than 19 years of international auditing and internal auditing experience, which he gained from his positions at RSM McGladrey & Pullen LLP, Singer Lewak Greenbaum & Goldstein, PwC, and Saudi Arabian Oil Company.

Wikis: 2 total

Blog Posts: 12 total

19 Jun 2014
Posted By : masarker | 2 comments
21 Mar 2014
You are invited to comment on my post in ISACA Now which can be accessed using the following link: Title: From games to government, babies to business--the role of strategyLink: Shahi...
Posted By : SA | 0 comments
Enterprise Architecture Practice provides several benefits to organization. Some of the benefits are listed below:  an improved road map for strategy execution; focused and measured strategy implementation; creating synergies; cost reduction (value for m...
Posted By : SA | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
Ina fast changing world of business and relentless competition, strategicplanning is not only critical, but also the differentiating factor for anorganization. Since IT has moved from a supportive role to a more strategicrole, the IT Strategic Planning an...
Posted By : SA | 0 comments
8 Feb 2014
Session Date Session Type Number of Questions Score Time Taken 2/8/2014 11:30 PM Study Session ...
Posted By : bill_clancy | 0 comments