Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Risk Management

Welcome to the Risk Management topic!

Collaborate, contribute, consume and create knowledge around topics such as Risk Management, Risk Governance, Risk Profile, Governance Risk & Compliance (GRC), & CRISC.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
2516 Members
8 Online
23599 Visits

Community Leader

Brian Barnier

Brian Barnier

Badge: Energizer

Mohamed Tawfik

Mohamed Tawfik

Title: Financial Controller Sector - General Manager

Points: 282

Badge: Lively


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 177 total

Must be a Topic member to contribute
View All »
Please can people tell me which risk management frameworks and TOOLS do they use?I.e. NIST, COBIT etc. Thanks in advance
JayMIET927 | 11/3/2016 8:42:52 AM | COMMENTS(10)
Do you know if there is a list of risks (IT and non IT) related to each Cobit 5 process?Thankyou
FrancescoM | 10/22/2016 8:07:41 PM | COMMENTS(7)
One of the many responsibilities of the SPMO is to develop processes and methodologies for project and program managers to adhere to, risk management is a vital element of any given project, hence, SPMO should be in a position to develop risk management p...
Muhammad Odeh | 10/22/2016 6:19:26 PM | COMMENTS(1)
Good DayI have authored a book titled The Money Laundering and Financing of Terrorism and the relevant links is provided below.RegardsKannanMember: Institute of Chartered Accountants of India; Association of Certified Anti-Money Laundering Specialists USA...
rskannan | 9/8/2016 1:08:14 PM | COMMENTS(1)
Hello, Am trying to build, come up with a structured, documented method on testing  IT controls. From the IT Risk Registers, which are already in place how best to go about. I have seen from Operational Risk perspective they have whats called RCA (Risk Co...
Taty | 8/19/2016 11:58:48 AM | COMMENTS(9)
rskannan | 8/11/2016 10:54:32 AM | COMMENTS(0)

Documents & Publications: 113 total

Must be a Topic member to contribute
View All »
Posted by ISACA 981 days ago
Posted by ISACA 204 days ago
Posted by ISACA 274 days ago
Posted by ISACA 319 days ago
Posted by ISACA 379 days ago

Events & Online Learning: 14 total

16 Mar 2015
ISACA International Event
Orlando, FL, USA
21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.

Journal Articles: 177 total

Volume 6, 2106
by Venkatasubramanian Ramakrishnan, CISM, CRISC, CHFI
Bayesian networks can capture the complex interdependencies among risk factors and can effectively combine data with expert judgment.
Volume 6, 2016
by Reviewed by Sunil Bakshi, CISA, CGEIT, CISM, CRISC, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP
The increased use of outsourcing arrangements and the acceptance of cloud computing models has benefits and associated risk.
Volume 6, 2016
by Craig Krivin, Sanjay Bhide, Sandeep Desai, Ravi Dhaval, Joe Norris, Amanthi D. Pendegraft, Susan E. Snow and Dan Wagner
The ISACA Phoenix (Arizona, USA) Chapter research committee set out to learn more about the wave of wearable devices and understand the ISACA community’s attitudes toward wearables’ potential risk and security impacts in the workplace.
Volume 6, 2016
by Shirali Vyas, CA, ICAI
The 2008 financial crisis and its cascading effects have made it necessary to redefine the supplier risk management norms.
Volume 6, 2016
by Gary Roboff
Thought leaders have long recognized that strong leadership and ethical culture are foundational building blocks of enterprises with top-performing risk management programs.
Volume 6, 2016
by Lance Dubsky, CISM, CISSP
CISOs and CSOs need to ensure that their enterprise risk management programs have a solid foundation—the enterprise risk management framework.

Wikis: 2 total

Blog Posts: 113 total

“Enterprise architecture is now a strategic componentof every forward-thinking organization around the world.”Source: Related Article: Common Perspective on Enterprise Architecture: http://feapo....
Posted By : SA | 1 comments
This is an opinion piece written using Australian English spelling. Please read at your leisure. There is no denying the outright benefits of The Internet of Things (IoT). The IoT is a Life-Productivity-Enabler. Connecting smart objects with other sma...
Posted By : Philippe_Lopez_AU | 0 comments
CyberSecurity Month is recognized by the United States government. Homeland Security has a campaign that we will look at called Stop.Think.Connect. It is focused on CyberSecurity awareness. I have been looking at CyberSecurity since 2011 when I found...
Posted By : Gerri Anne Redmond | 0 comments
A customer walks into a grocery store to buy a cold yogurt, then walks toward the checkout stand to buy it. While waiting in line to buy the yogurt, there is a chance it will warm up. If the line is long, not only will the customer refuse to buy the yogu...
Posted By : Don Turnblade | 0 comments
Some exciting projects coming. I am working on reworking our managed health care system to include an all online process from doctor prescribed prescriptions to filled prescriptions. I have reaching out to technology companies and politicians to see if ...
Posted By : Gerri Anne Redmond | 0 comments
National Cyber Security Awareness Month is approaching. It is October. I will be providing some fun things for you to research and learn. Check back often. Look at the Homeland Security site for additional tips.
Posted By : Gerri Anne Redmond | 0 comments