Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Risk Management

Welcome to the Risk Management topic!

Collaborate, contribute, consume and create knowledge around topics such as Risk Management, Risk Governance, Risk Profile, Governance Risk & Compliance (GRC), & CRISC.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
2537 Members
0 Online
23807 Visits

Community Leader

Brian Barnier

Brian Barnier

Badge: Energizer

Mohamed Tawfik

Mohamed Tawfik

Title: Financial Controller Sector - General Manager

Points: 283

Badge: Lively


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 179 total

Must be a Topic member to contribute
View All »
We are about to embark on a project to install a GRC solution.  Are there any existing checklists to help with requirements?  Did you use a consulting team to help you create your requirements and guide you through the process?
AgVball | 1/12/2017 10:44:23 AM | COMMENTS(11)
Hello All, I work for an offshore unit of a U.S based financial institution as a risk manager. The group I support has software development, quality assurance, database and a few business intelligence teams. One of the things we (Risk management t...
Victorjoshua | 1/4/2017 3:06:31 AM | COMMENTS(2)
One of the many responsibilities of the SPMO is to develop processes and methodologies for project and program managers to adhere to, risk management is a vital element of any given project, hence, SPMO should be in a position to develop risk management p...
Muhammad Odeh | 12/12/2016 5:20:19 AM | COMMENTS(2)
Please can people tell me which risk management frameworks and TOOLS do they use?I.e. NIST, COBIT etc. Thanks in advance
JayMIET927 | 11/3/2016 8:42:52 AM | COMMENTS(10)
Do you know if there is a list of risks (IT and non IT) related to each Cobit 5 process?Thankyou
FrancescoM | 10/22/2016 8:07:41 PM | COMMENTS(7)
Good DayI have authored a book titled The Money Laundering and Financing of Terrorism and the relevant links is provided below.RegardsKannanMember: Institute of Chartered Accountants of India; Association of Certified Anti-Money Laundering Specialists USA...
rskannan | 9/8/2016 1:08:14 PM | COMMENTS(1)

Documents & Publications: 71 total

Must be a Topic member to contribute
View All »
Posted by ISACA 1027 days ago
Posted by ISACA 320 days ago
Posted by ISACA 425 days ago
Posted by ISACA 435 days ago

Events & Online Learning: 12 total

16 Mar 2015
ISACA International Event
Orlando, FL, USA
21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.

Journal Articles: 180 total

Volume 6, 2106
by Venkatasubramanian Ramakrishnan, CISM, CRISC, CHFI
Bayesian networks can capture the complex interdependencies among risk factors and can effectively combine data with expert judgment.
Volume 1, 2017
Now that senior executives have begun to take a serious interest in cyber and technology risk, it is necessary to provide meaningful and useful answers to the questions they are beginning to ask.
Volume 1, 2017
by Ed Moyle
Most practitioners are already very accustomed to using technical tools for specific tactical purposes when it comes to security or assurance within their environments.
Volume 1, 2017
by Ravid Circus
Enterprises need to think of their entire network infrastructure—physical, virtual and cloud—in the same way that attackers do: a very large, diverse and geographically dispersed attack surface...
Volume 1, 2017
by Phillimon Zongo
Artificial intelligence (AI) systems, riding on the exponential increases in computing power and the availability of big data, are outperforming humans in numerous domains.
Volume 1, 2017
I have heard from vendors that cognitive technologies such as machine learning can assist in my risk management and security efforts. Is this the case?

Wikis: 2 total

Blog Posts: 115 total

31 Dec 2016
The Mobile Maritime Hub 2009-2050 is an strategic plan that started in 2009, in Vilanova i La Geltrú, a coastal town, to promote maritime, nautical, fishing and scientific activities in a seaside region, by a properly use of the technological tools existi...
Posted By : ramoncod | 0 comments
A customer walks into a grocery store to buy a cold yogurt, then walks toward the checkout stand to buy it. While waiting in line to buy the yogurt, there is a chance it will warm up. If the line is long, not only will the customer refuse to buy the yogu...
Posted By : Don Turnblade | 0 comments
After 30 years working in the IT, Audit, Risk Management and Compliance worlds, I’ve seen a lot of good examples of managing an organizations IT risks and controls. But on the flip side, I’ve also seen too many instances of poor management of an organizat...
Posted By : Joe999 | 0 comments
“Enterprise architecture is now a strategic componentof every forward-thinking organization around the world.”Source: Related Article: Common Perspective on Enterprise Architecture: http://feapo....
Posted By : SA | 1 comments
This is an opinion piece written using Australian English spelling. Please read at your leisure. There is no denying the outright benefits of The Internet of Things (IoT). The IoT is a Life-Productivity-Enabler. Connecting smart objects with other sma...
Posted By : Philippe_Lopez_AU | 0 comments
CyberSecurity Month is recognized by the United States government. Homeland Security has a campaign that we will look at called Stop.Think.Connect. It is focused on CyberSecurity awareness. I have been looking at CyberSecurity since 2011 when I found...
Posted By : Gerri Anne Redmond | 0 comments