Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Risk Management

Welcome to the Risk Management topic!

Collaborate, contribute, consume and create knowledge around topics such as Risk Management, Risk Governance, Risk Profile, Governance Risk & Compliance (GRC), & CRISC.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
2347 Members
2 Online
22418 Visits

Community Leader

Brian Barnier

Brian Barnier

Badge: Energizer

Mohamed Tawfik

Mohamed Tawfik

Title: Senior IT Audit Manager

Points: 279

Badge: Lively


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 163 total

Must be a Topic member to contribute
View All »
Many security features exist around Microsoft Office products such as Word and Excel. Are you satisfied? Or are we still scanning the files into ADOBE?
Gerri227 | 5/1/2016 8:07:19 AM | COMMENTS(4)
When acquiring a new business entity is it important to immediately educate the business on risk exposure and how it relates to the acquiring organization's risk strategy? Thoughts?
Gerri227 | 4/28/2016 7:28:17 AM | COMMENTS(0)
This article makes an interesting point about the pressure risk professionals can face to present findings in a different light. Does anyone here have experiences they can share on how they've dealt with such pressure and resolve the ethical challenge the...
Phil Green | 4/23/2016 7:37:46 AM | COMMENTS(6)
I'm reviewing the COBIT5 for Risk Toolkit and would like to use it in our organization. Does anyone have an example of a completed Risk Scenario which they could share. Please remove any sensitive information, I'm only looking for content information to u...
Joe999 | 4/15/2016 5:51:39 PM | COMMENTS(2)
Hi, Just wanted to get some thoughts on how a covered entity can ensure that a Business Associate is not subcontracting to a offshore third party and so on thus creating a subcontracting chain.Is Business Associate the only answer? Also, what laws/reg...
Dipesh744 | 4/7/2016 2:41:13 PM | COMMENTS(1)
All, I am about to start producing a PowerPoint deck (don't we love them) that will form the back bone for a series of lunch and learns (L&L) that I will be holding for the benefit of my business colleagues and to promote awareness. The purpose of the...
Andy630 | 3/10/2016 7:25:27 PM | COMMENTS(5)

Documents & Publications: 113 total

Must be a Topic member to contribute
View All »
Posted by ISACA 763 days ago
Posted by ISACA 56 days ago
Posted by ISACA 56 days ago
Posted by ISACA 101 days ago
Posted by ISACA 161 days ago

Events & Online Learning: 12 total

Journal Articles: 149 total

Volume 3, 2016
by Ed Gelbstein, Ph.D.
Every topic can be subdivided into many more sections, but the intention of this column is not to provide a detailed manual (it would be a large book), just an overview.
Volume 2, 2016
by Angel Serrano, CISA, CISM, CRISC
There are many different definitions of the term ‘big data’, and concerns about whether it will necessitate significant changes in business operations in the short term.
Volume 2, 2016
by Nancy Lankton, CISA, CPA and Jean Price
Ten years ago, Richard Nolan and F. Warren McFarlan wrote a Harvard Business Review article about the role of the board of directors (BoD) in IT governance.
Volume 2, 2016
by Ed Gelbstein, Ph.D.
This article provides a map of the IS/IT risk management activities that are auditable and shows how to maintain a collaborative relationship with the ERM team while avoiding conflicts of interest.
Volume 2, 2016
by Jeroen van Lewe, CISA, CEH, CIA, ECSA
In the Netherlands, large-scale cyberattacks on government web sites began in 2011. In 2012, the Dutch government decided to use IT audits as one of the remedies for this issue.
Volume 2, 2016
by Shubhamangala B. R. and Snehanshu Saha, Ph.D.
Why are breaches continuing despite deploying cutting-edge solutions supported by compliance to thwart the attacks?

Wikis: 2 total

Blog Posts: 99 total

A Potemkin Village is a term used to describe situations where a thinly veiled facade is created with no underlying substance. Legend has it that Grigory Potemkin became Governor of Southern Ukraine and Crimea after the Russian takeover in 1774. Potemkin...
Posted By : Joseph496 | 0 comments
When you are standing in front of the mirror preparing for the day, how many people think to themselves "I will do everything I can to save the company 57 cents including putting customer’s lives at risk." Or how about "I will lie to, deceive, and obstruc...
Posted By : Joseph496 | 0 comments
1. Objective and Convergence of BYOD According to PCWorld definition; BYOD —also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own PC (BYOPC)—refers to the policy of permitting employees to bring personally owned mo...
Posted By : Navid Baradaran | 0 comments
Disclaimer: This only represent my experience Views and opinion Introduction Information Security Manager’s oversee information security programs which includes network security in organisations or business enterprises. With documented knowledge ab...
Posted By : Prince143 | 0 comments
How do you achieve effectiveness or simple integrated approach during implementation of COBIT 5. By selecting required COBIT 5 processes combination to achieve organization requirement and align as per regulations and standards. i.e. to implement Enterpri...
Posted By : Sriram S IT IS | 0 comments
I must be honest and say that up until the day I saw the advert inviting applications for trainee IT Analyst positions in one of the members of the Big-4 that operate in Swaziland, I had no clue about the exciting world of assurance in IT. I had always vi...
Posted By : Tipho217 | 0 comments