Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Risk Management

Welcome to the Risk Management topic!

Collaborate, contribute, consume and create knowledge around topics such as Risk Management, Risk Governance, Risk Profile, Governance Risk & Compliance (GRC), & CRISC.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
2692 Members
3 Online
24956 Visits

Community Leader

Brian Barnier

Brian Barnier

Badge: Energizer

Mohamed Tawfik

Mohamed Tawfik

Title: Financial Controller Sector - General Manager

Points: 294

Badge: Lively


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 187 total

Must be a Topic member to contribute
View All »
I also posted this question in Service Management but have not heard anything yet. My team runs Risk and Compliance efforts.  We had moved to JIRA to run one program as a "project" and sending out "issues" to assignees for them to either answer audit que...
AgVball | 9/6/2017 7:12:13 AM | COMMENTS(4)
We are about to embark on a project to install a GRC solution.  Are there any existing checklists to help with requirements?  Did you use a consulting team to help you create your requirements and guide you through the process?
AgVball | 8/25/2017 5:45:12 AM | COMMENTS(26)
Please can people tell me which risk management frameworks and TOOLS do they use?I.e. NIST, COBIT etc. Thanks in advance
JayMIET927 | 8/24/2017 7:19:31 AM | COMMENTS(12)
Hello all, ISACA's content, such as Risk IT and COBIT are created primarily for you. Yet, wouldn't it be nice to have a way to engage more senior business and IT people? After I was part of the team that created Risk IT, I penned The Operational Ris...
Brian Barnier | 8/8/2017 5:12:55 AM | COMMENTS(3)
Work units within organisations commit to annual business plans.  Risk assessment is the foundation of business plan credibility and assurance. For the work unit business plan, ‘risk’ is the uncertainty of the year-end position. I’m sharing a...
Roger Lines | 8/7/2017 6:25:20 PM | COMMENTS(0)
Do you think it would be ok for your DNS manager to take 5 minutes and add an SPF record so your emails arn't constantly tagged as spam, phishing or forgeries?  headers from emails:Return-Path: Received: from
scheidell | 5/20/2017 10:10:57 PM | COMMENTS(1)

Documents & Publications: 67 total

Must be a Topic member to contribute
View All »
Posted by ISACA 1328 days ago
Posted by ISACA 621 days ago
Posted by ISACA 726 days ago
Posted by ISACA 736 days ago

Events & Online Learning: 12 total

16 Mar 2015
ISACA International Event
Orlando, FL, USA
1 Aug 2016
ISACA International Event
Chicago, IL, USA
16 Aug 2017
ISACA International Event
Grapevine, Texas, US
2018 GRC Conference - 13-15 August , Nashville, TN. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 205 total

Volume 3, 2107
by Jayakumar Sundaram, CISA, ISO 27001 LA
The SoA is a continuously updated and controlled document that provides an overview of information security implementation.
Volume 6, 2106
by Venkatasubramanian Ramakrishnan, CISM, CRISC, CHFI
Bayesian networks can capture the complex interdependencies among risk factors and can effectively combine data with expert judgment.
Volume 6, 2017
by Robert Putrus, CISM, CFE, CMC, PE, PMP
This article presents a risk-based management approach to third-party data security risk and compliance through the development of a third-party risk register.
Volume 6, 2017
by Guy Pearce
The modern GRC landscape has a significant impact on how an enterprise-scale big data project would be undertaken today.
Volume 6, 2017
by Sandra Herrygers, Gaurav Kumar and Jeff Schaeffer
According to research from IBM Security and the Ponemon Institute, the average total cost per company, per event of a data breach is US $3.62 million.
Volume 5, 2017
by Michael Werneburg, CIA, PMP
Service organizations with a bespoke application in a regulated industry have special challenges in addressing application vulnerabilities.

Wikis: 2 total

Blog Posts: 133 total

Globally, many organizations are spending millions of dollars protecting their businesses and its enabling infrastructure, but are they really secure? We shall discuss answer to this question in a little while. We need to understand core basics before we ...
Posted By : SudireddyRamreddy | 0 comments
Hello fellow members COBIT 5 is an excellent guide to developing ICT Governance Frameworks. Many organisations have well documented Frameworks but find it challenging when it comes to implementation. The objective of this post is to start a debate o...
Posted By : Thansen Singh | 0 comments
In your experience, what is the best Risk Management definition and how to explain to to other IT teams the importance of Risk Management and how that is related with a chosen standard, methodology (ISO 27001, CObit, OCTAVE, etc) What is the source defini...
Posted By : Isaias_Telhado | 0 comments
Tools What to do for such an assignment practical auditing of the OS and Database CLOUD Computing challenges Third Party integration and the Audit functions
Posted By : Kemza | 0 comments
In many ways you protect your information. But security which protect your information needs also to be protected in terms of disclosing to the outsiders .Once it disclosed , many a ways it can be break and thus your information is at stake.
Posted By : MUHAMMAD WASEEM RAJA | 0 comments
What do you think by starting new chapter at Nepal: 1. What benifit will Nepal Get?2. What ICT sectrer will Get?3. What ISACA's current/future member will Get?4. What IS Auditor will get?
Posted By : Dr. Pawan K. Sharma | 0 comments