Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Risk Management

Welcome to the Risk Management topic!

Collaborate, contribute, consume and create knowledge around topics such as Risk Management, Risk Governance, Risk Profile, Governance Risk & Compliance (GRC), & CRISC.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
2029 Members
6 Online
19944 Visits

Community Leader

Brian Barnier

Brian Barnier

Badge: Energizer

KenDoughty

KenDoughty

Badge: Lively

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 138 total

Must be a Topic member to contribute
View All »
My company is looking to expand our Vendor Risk Management program and in order to build a business case, I need to gather some benchmark data on other companies' programs. This is for internal use only and no company-specific data is required and no attr...
Tera075 | 2/24/2015 2:50:47 AM | COMMENTS(13)
NEW!! Last piece of my IoT Security series: Privacy and Humanity Elements for the IoT / IoE: #InfoSec #CyberSecurity #IoT #IoE #CISO #CSO #CTO #CIO #CEO #Privacy http://blog.norsecorp.com/2015/02/17/privacy-and-humanity-elements-for-the-iot-ioe/
Michael S. Oberlaender | 2/18/2015 4:15:20 PM | COMMENTS(0)
Can anyone suggest or share a template that they use for managing Vendor inventory?
Dipesh744 | 2/7/2015 7:45:41 AM | COMMENTS(2)
NEW!! Here's the next one of my IoT / IoE Security series (continued from last one): http://blog.norsecorp.com/2015/02/04/mandatory-security-design-considerations-for-the-iot-ioe/
Michael S. Oberlaender | 2/5/2015 11:19:46 AM | COMMENTS(1)
Hello all, for those of you who follow North American football, try this for your football party with ISACA friends or chapter event... http://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=480
Brian Barnier | 1/27/2015 6:06:13 PM | COMMENTS(0)
Please find my latest article here: http://blog.norsecorp.com/2015/01/26/iot-ioe-if-it-has-an-ip-address-it-can-be-hacked/
Michael S. Oberlaender | 1/27/2015 12:22:29 PM | COMMENTS(1)

Documents & Publications: 95 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 333 days ago
Books
Posted by ISACA 24 days ago
Research
Posted by ISACA 44 days ago

Events & Online Learning: 14 total

14 Oct 2013
ISACA International Event
Boston, MA, USA
6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
11 Aug 2014
ISACA International Event
Seattle, WA, USA

Journal Articles: 252 total

Volume 1, 2015
by Tieu Luu
In November 2013, the US Office of Management and Budget (OMB) issued memorandum M-14-03 requiring all federal departments and agencies to establish an information security continuous monitoring (ISCM) program.
Volume 1, 2015
by P. W. Singer and Allan Friedman | Reviewed by Larry Marks, CISA
This book defines cybersecurity, discusses the basic issues of cybersecurity about which everyone should be aware and supplies the reader with tools to address these threats.
Volume 1, 2015
by Bill Hargenrader, CISM, CEH, CISSP
ISCM has a major positive impact on improving risk management and compliance across many industries and bodies, including the US federal government, the DoD, and commercial and financial organizations.
Volume 1, 2015
by Ed Gelbstein, Ph.D.
An information security practitioner preparing a ROSI calculation needs to prepare it in such a way to ensure that it leads to the requested resources and preserves the practitioner’s credibility.
Volume 1, 2015
by Yuri Bobbert
Hackers and negative social media hypes have proven able to bring proud organizations to their knees, yet many information and communications technology (ICT) security managers lack a strategy to anticipate and overcome such unpredictable challenges.
Volume 6, 2014
by Kathleen M. Stetz, CISA, CISM, CRISC, PMP
Get to know your network.

Wikis: 2 total

Blog Posts: 75 total

Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments
I saw Garry at the Sydney Chapter’s successful Strategic Planning event in July 2014.  He was animated and gregarious during the evening’s cocktail event and it felt good to see him again and catch...
Posted By : Rob Hanson | 0 comments
It is Friday morning, the week before Christmas and all through Parliament House, not a creature was stirring, not even a mouse.  Well not quite, but the Parliamentary Triangle has taken a relaxed and ...
Posted By : Rob Hanson | 1 comments
If you are still using excel for your governance, risk and compliance Maclear eGRC SuiteTM have put together a whitepaper to help you understand the benefits of automation and what to look for when selecting your solution. IT GRC Whitepaper includes: 1...
Posted By : Shanthamurthy926 | 0 comments
13 Nov 2014
You are invited to comment on my post in ISACA Now which can be accessed using the following link: Title: From games to government, babies to business--the role of strategyLink: http://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=386 Shahi...
Posted By : SA | 0 comments
Dear Community Members,We have established the Topic “Strategic Planning/Alignment” which I believe might be of interest to you. We would like to benefit from your experience and knowledge. Some of you are already members of the topic (which you will find...
Posted By : SA | 0 comments