Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Risk Management

Welcome to the Risk Management topic!

Collaborate, contribute, consume and create knowledge around topics such as Risk Management, Risk Governance, Risk Profile, Governance Risk & Compliance (GRC), & CRISC.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
2817 Members
1 Online
25994 Visits

Community Leader

Brian Barnier

Brian Barnier

Badge: Energizer

Mohamed Tawfik

Mohamed Tawfik

Title: Financial Controller Sector - General Manager

Points: 296

Badge: Lively


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 192 total

Must be a Topic member to contribute
View All »
Hi all, Would like to find out what are the frameworks or standards are your organization aligning to while creating a risk assessment that rolls up towards the larger scope of ERM? 
KarenY | 6/29/2018 5:04:26 PM | COMMENTS(13)
Hi RM Community, Good day! I'm looking for a sample list of generic KRI's for IT. I'm currently working on a project to initiate monitoring of KRI's. I was able to do research and obtain understanding of KRI. I have yet to perform an understandi...
Sameer848 | 3/1/2018 11:39:55 AM | COMMENTS(6)
There are any number of ways to analyse a risk, some involving very detailed quantitative techniques. At what point does that stop adding value and start hindering or slowing down the development of response plans & actions?
Linda716 | 1/30/2018 9:47:10 PM | COMMENTS(3)
Does the ATM antiskimming devices are operational risk or information security ?
Tarek EL-Sherif | 1/30/2018 5:29:17 AM | COMMENTS(3)
Is bitcoin a bubble or something to stay for long time? If bitcoin is bubble, when it will burst? Have your say in poll I created on Twitter.  Follow this link: Thanks
Dragan Pleskonjic | 12/10/2017 9:51:42 AM | COMMENTS(0)
Hi members, I institutionalized a Risk Mgmt Comittee in my organization. The comittee is made up of our COO, CIO, Director of Risk and Compliance and a few others. We will meet quarterly. I am wondering if any of you could share some non confidential meet...
danic1979 | 12/9/2017 3:46:26 AM | COMMENTS(2)

Documents & Publications: 62 total

Must be a Topic member to contribute
View All »
Posted by ISACA 1567 days ago
Posted by ISACA 860 days ago
Posted by ISACA 965 days ago
Posted by ISACA 975 days ago

Events & Online Learning: 11 total

Journal Articles: 228 total

Volume 3, 2107
by Jayakumar Sundaram, CISA, ISO 27001 LA
The SoA is a continuously updated and controlled document that provides an overview of information security implementation.
Volume 6, 2106
by Venkatasubramanian Ramakrishnan, CISM, CRISC, CHFI
Bayesian networks can capture the complex interdependencies among risk factors and can effectively combine data with expert judgment.
Volume 4, 2018
Our organization is considering multiple projects for developing and implementing IT-based solutions. I have checked on various websites, but could not get a detailed list of generic risk scenarios for IT-related projects.
Volume 4, 2018
Organizations aim to achieve their objectives while managing risk within their risk appetites. A good governance structure for managing risk is to establish three lines of defense.
Volume 4, 2018
by Mehmet Zeki Önal, CISA, CRISC, CGEIT, CCSA, CRMA
From the risk management perspective, the need for data governance exists not only in the insurance sector, but also in all sectors affected by IFRS regulations.
Volume 4, 2018
by Rama Lingeswara Satyanarayana Tammineedi, CISA, CRISC, CBCP, CISSP, MBCI, PMP
Performance evaluation of an organization’s risk management system ensures the risk management process remains continually relevant to the organization’s business strategies and objectives.

Wikis: 2 total

Blog Posts: 150 total
Posted By : TafadzwaPadare | 1 comments
Hello and welcome to my first post of my new blog, 'Cybersecurity ROCKS!'.   As a long time member of the security community and new to the Vancouver area, I'd like to tell you a little about myself, how my career began and where my current passions in cy...
Posted By : cybersecgal | 1 comments
Security in IoT environment
Posted By : Hyun239 | 0 comments
20 Apr 2018
Good day. I have an interesting situation that came about just this week.  New career opportunities are not all that they seem to be.  What I thought was going to be a great career change ended up in disaster.  With only one week and two day's, I was dism...
Posted By : Brian824 | 0 comments
La Tecnología de la Información (TI), en todas sus áreas (base de datos, seguridad de la información, desarrollo de software, redes, etc.), debe tener como objetivo primario el apoyo a los Procesos del Negocio (PN) de la organización. Sin embargo, es comú...
Posted By : emorro | 0 comments
Have you experienced ransomware attack so far and, if yes, what did you do to resolve? I set up Twitter poll here: It lasts for seven days. Thank you for taking part in the poll.
Posted By : Dragan Pleskonjic | 5 comments