Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Risk Management

Welcome to the Risk Management topic!

Collaborate, contribute, consume and create knowledge around topics such as Risk Management, Risk Governance, Risk Profile, Governance Risk & Compliance (GRC), & CRISC.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
2361 Members
0 Online
0 Visits

Community Leader

Brian Barnier
Mohamed Tawfik

Mohamed Tawfik

Title: Senior IT Audit Manager

Points: 279


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 167 total

Must be a Topic member to contribute
View All »
Register for the next Cyber Security Training offered by ISACA in Colorado. June Availability.
Gerri Anne Redmond | 5/26/2016 10:05:33 AM | COMMENTS(0)
Hello. I wanted to introduce myself. I am one of your Working Group Members. Something to think about today. Leadership. Make sure to monitor the use of your admins. No. No. No. I am not talking about firefighter logs. I am talking about ADMI...
Gerri Anne Redmond | 5/16/2016 6:44:49 AM | COMMENTS(0)
When acquiring a new business entity is it important to immediately educate the business on risk exposure and how it relates to the acquiring organization's risk strategy? Thoughts?
Gerri Anne Redmond | 5/13/2016 5:38:45 PM | COMMENTS(3)
In my experience, I have noticed that different locations under one corporate entity are audited slightly differently for example, leniency or remediation of findings or issues. Is lack of audit consistency a risk to the audited corporation or your consu...
Gerri Anne Redmond | 5/11/2016 4:22:51 PM | COMMENTS(1)
Many security features exist around Microsoft Office products such as Word and Excel. Are you satisfied? Or are we still scanning the files into ADOBE?
Gerri Anne Redmond | 5/5/2016 4:23:41 PM | COMMENTS(5)
Auditor: "Please show me your CIs for the end-to-end service chain for application XXX (from application to physical tin in the data centre)."  Response: "No, we can't do that, it's physically impossible."  Are we so caught up in automated solutions and p...
Phil Green | 5/5/2016 3:34:20 AM | COMMENTS(0)

Documents & Publications: 113 total

Must be a Topic member to contribute
View All »
Posted by ISACA 787 days ago
Posted by ISACA 10 days ago
Posted by ISACA 80 days ago
Posted by ISACA 125 days ago
Posted by ISACA 185 days ago

Events & Online Learning: 13 total

Journal Articles: 152 total

Volume 3, 2016
by Stefano Ferroni, CISM, ISO 27001 LA, ITIL Expert
The importance of SoD arises from the consideration that giving a single individual complete control of a process or an asset can expose an organization to risk.
Volume 3, 2016
by Ed Gelbstein, Ph.D.
Every topic can be subdivided into many more sections, but the intention of this column is not to provide a detailed manual (it would be a large book), just an overview.
Volume 3, 2016
by Angel Serrano, CISA, CISM, CRISC
There are many different definitions of the term ‘big data’, and concerns about whether it will necessitate significant changes in business operations in the short term.
Volume 3, 2016
by Samuel Shanthan, CISA, CIPM, MBCI
It is of paramount importance to ensure the continuity of vendors, especially those that are providing and supporting the critical services and processes of the organisation.
Volume 3, 2016
by Simon Grima, Ph.D., Robert W. Klein, Ph.D., Ronald Zhao, Ph.D., Frank Bezzina, Ph.D. and Pascal Lélé, Ph.D.
What are the specific risk and opportunities that affect the ability of the organization to create value in the short, medium and long term? How will the organization capitalize on these to obtain a competitive advantage?
Volume 2, 2016
by Nancy Lankton, CISA, CPA and Jean Price
Ten years ago, Richard Nolan and F. Warren McFarlan wrote a Harvard Business Review article about the role of the board of directors (BoD) in IT governance.

Wikis: 2 total

Blog Posts: 100 total

And so to begin. Let's look at taxonomy. The names and definitions of things that will guide us in our time together. Since this is a blog about Privacy, lets start the definitions there. According to Merriam-Webster, Privacy is a noun that means "The ...
Posted By : HPMahan | 0 comments
A Potemkin Village is a term used to describe situations where a thinly veiled facade is created with no underlying substance. Legend has it that Grigory Potemkin became Governor of Southern Ukraine and Crimea after the Russian takeover in 1774. Potemkin...
Posted By : Joseph496 | 0 comments
When you are standing in front of the mirror preparing for the day, how many people think to themselves "I will do everything I can to save the company 57 cents including putting customer’s lives at risk." Or how about "I will lie to, deceive, and obstruc...
Posted By : Joseph496 | 0 comments
1. Objective and Convergence of BYOD According to PCWorld definition; BYOD —also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own PC (BYOPC)—refers to the policy of permitting employees to bring personally owned mo...
Posted By : Navid Baradaran | 0 comments
Disclaimer: This only represent my experience Views and opinion Introduction Information Security Manager’s oversee information security programs which includes network security in organisations or business enterprises. With documented knowledge ab...
Posted By : Prince143 | 0 comments
How do you achieve effectiveness or simple integrated approach during implementation of COBIT 5. By selecting required COBIT 5 processes combination to achieve organization requirement and align as per regulations and standards. i.e. to implement Enterpri...
Posted By : Sriram S IT IS | 0 comments