Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Risk Management

Welcome to the Risk Management topic!

Collaborate, contribute, consume and create knowledge around topics such as Risk Management, Risk Governance, Risk Profile, Governance Risk & Compliance (GRC), & CRISC.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
2426 Members
0 Online
23033 Visits

Community Leader

Brian Barnier

Brian Barnier

Badge: Energizer

Mohamed Tawfik

Mohamed Tawfik

Title: Senior IT Audit Manager

Points: 280

Badge: Lively

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 174 total

Must be a Topic member to contribute
View All »
Hello, Am trying to build, come up with a structured, documented method on testing  IT controls. From the IT Risk Registers, which are already in place how best to go about. I have seen from Operational Risk perspective they have whats called RCA (Risk Co...
Taty | 8/19/2016 11:58:48 AM | COMMENTS(9)
http://globalriskcommunity.com/video/process-based-operational-risk-management
rskannan | 8/11/2016 10:54:32 AM | COMMENTS(0)
Dear FriendsI wrote a book with the captioned title and it was released last year. The process approach was appreciated by people who grasped the nuances of COSO and CoBit. Operational Risk practitioners found it useful to improve systems to gather data a...
rskannan | 7/19/2016 9:20:15 AM | COMMENTS(0)
Good DayI have authored a book titled The Money Laundering and Financing of Terrorism and the relevant links is provided below.RegardsKannanMember: Institute of Chartered Accountants of India; Association of Certified Anti-Money Laundering Specialists USA...
rskannan | 7/19/2016 3:36:26 AM | COMMENTS(0)
Join us in August for the GRC Conference! I believe that everyone could learn something from attending. Located at the Diplomat Resort and Spa in Florida. Follow the link for more information. http://www.isaca.org/Education/Conferences/Pages/grc.aspx...
Gerri Anne Redmond | 6/14/2016 11:17:24 AM | COMMENTS(0)
You may like to visit the link from MIT Sloan that “speaks about” NON financial metrics. How does that associate or align with risk? Follow the link. Are Nonfinancial Metrics Good Leading Indicators of Future Financial Performance? http://sloanreview....
Gerri Anne Redmond | 6/14/2016 11:07:49 AM | COMMENTS(0)

Documents & Publications: 113 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 879 days ago
Books
Posted by ISACA 102 days ago
Books
Posted by ISACA 172 days ago
Books
Posted by ISACA 217 days ago
Books
Posted by ISACA 277 days ago

Events & Online Learning: 12 total

Journal Articles: 160 total

Volume 4, 2016
by Daniel Schatz, CISM, CCSK, CISSP, CSyP, CVSE, ISO 27001 LA/LI, MCITP-EA
The topic of information security has evolved to one of the top concerns among policymakers and corporations. Leaders demand answers from their support structures as to how such risk can be effectively managed.
Volume 4, 2016
by ISACA | Reviewed by Larry Marks, CISA, CISM, CGEIT, CRISC, CFE, CISSP, CSTE, ITIL, PMP
An APT is a specific targeted and sophisticated attack that keeps coming after the victim and is not easily stopped by a defensive program.
Volume 4, 2016
by Robert Clyde, CISM
Ask any merchant and he/she will tell you that accepting credit card payments comes with its own set of security challenges.
Volume 4, 2016
by Tony Wang
The growth in connected devices that could reside anywhere in the world has increased the complexity and difficulty of managing them and the related network traffic.
Volume 4, 2016
by Larry G. Wlosinski, CISA, CISM, CRISC, CAP, CBCP, CCSP, CDP, CISSP, ITIL v3
This article discusses the actors, threats, vulnerabilities and risk associated with mobile computing devices and highlights the pervasiveness of security and privacy problems and issues.
Volume 4, 2016
by Phil Zongo
This article provides some practical recommendations to address three key areas of risk associated with cloud adoption.

Wikis: 2 total

Blog Posts: 108 total

It is a boundary. Digital trend. Board is responsible for failures. The right board is necessary. Changing culture is via channel the energy  to do things differently. Stay connected to the people on the ground. Focus on looking forward. Do not demonise t...
Posted By : Swee908 | 0 comments
Posted By : Dr. Stephanie Carter | 0 comments
27 Jul 2016
Hi everyone - I hope you can help me with my questions: I have passed my CISA exam last October, with my work experience combine with my educational background, I am able to save 3 years from the requirement to get my CISA designation, but I am lac...
Posted By : Lan234 | 0 comments
GOVERNANCE, RISK, & COMPLIANCE-MANAGERS OF PEOPLE & PROCESSES-I’ve often thought in the last few weeks how meaningful it is to be a manager of people and processes.  I’m so grateful.  As I look back on my experiences in IT Governance, Risk Management & Co...
Posted By : Sharon211 | 1 comments
Approaching this nice certificate and finally put myself to the exam at Jun 11th this year.Result is still pending, wish can pass, otherwise, continue to try in Dec.
Posted By : XIAOQI | 0 comments
Let us have positive inspirational slogans for every situation. Last week I started the project meeting like this: I don't know you are all so good at tuning the website. The performance is now is wonderful. I could witness reduction of stress, anxiety an...
Posted By : Jayakumar Sundaram | 1 comments