Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Risk Management

Welcome to the Risk Management topic!

Collaborate, contribute, consume and create knowledge around topics such as Risk Management, Risk Governance, Risk Profile, Governance Risk & Compliance (GRC), & CRISC.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
2065 Members
0 Online
20224 Visits

Community Leader

Brian Barnier

Brian Barnier

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 142 total

Must be a Topic member to contribute
View All »
In studying and refining risk management at individual companies and in public workshops, it turns out that the a valuable quality of a good manager of risk is the "fix it" spirit. In a throw away world, knowing how to find and fix problems in anything --...
Brian Barnier | 4/12/2015 1:25:11 PM | COMMENTS(0)
Hello all, If you are at the ISACA Los Angeles conference, please take a moment to say "hello." The keynotes will be the State of California CIO and Ron Ross from NIST. ISACA International President Rob Stroud will lead the keynote panel. Join me for "...
Brian Barnier | 4/12/2015 1:18:24 PM | COMMENTS(0)
This is a Test Message
Sharon1 | 4/2/2015 3:41:24 PM | COMMENTS(1)
Hi All, I've been asked by a colleague about information security Threat Taxomonies (or lists) to assist him with the risk identification process. He already has the ISF IRAM2 documentation (Appendix F). Have provided additional references to: NIST S...
Ross Peachey | 3/24/2015 7:54:45 AM | COMMENTS(0)
My company is looking to expand our Vendor Risk Management program and in order to build a business case, I need to gather some benchmark data on other companies' programs. This is for internal use only and no company-specific data is required and no attr...
Tera075 | 2/24/2015 2:50:47 AM | COMMENTS(13)
NEW!! Last piece of my IoT Security series: Privacy and Humanity Elements for the IoT / IoE: #InfoSec #CyberSecurity #IoT #IoE #CISO #CSO #CTO #CIO #CEO #Privacy
Michael S. Oberlaender | 2/18/2015 4:15:20 PM | COMMENTS(0)

Documents & Publications: 101 total

Must be a Topic member to contribute
View All »
Posted by ISACA 382 days ago
Posted by ISACA 14 days ago
Posted by ISACA 14 days ago

Events & Online Learning: 13 total

14 Oct 2013
ISACA International Event
Boston, MA, USA
6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
11 Aug 2014
ISACA International Event
Seattle, WA, USA

Journal Articles: 258 total

Volume 2, 2015
by Rich Karlgaard | Reviewed by Dino Ippoliti, CISA, CISM
The soft edge is composed of five pillars and each of them is analyzed in a dedicated chapter that guides readers to answer crucial questions.
Volume 2, 2015
by David Vohradsky, CGEIT, CRISC
With increases in the regulatory regime, increasing technology complexity and pressures on cost, organisations are seeking productivity improvements in the evaluation of the performance of internal controls.
Volume 2, 2015
by Marcelo Hector Gonzalez, CISA, CRISC, and Jana Djurica
There are a number of definitions of Internet of Things (IoT), with all of them having slightly different meanings.
Volume 2, 2015
by Fredric Greene, CISSP
Selected processes from the COBIT 5 framework can improve the effectiveness of enterprise security in an organization.
Volume 2, 2015
by Vasant Raval, DBA, CISA, ACMA
While entrepreneurship has always been a key segment of the economy, there has been a huge surge in this sector since the 1990s.
Volume 2, 2015
by Rodney T. Stamler, Hans J. Marschdorf, Mario Possamai | Reviewed by Upesh Parekh, CISA
It is a common myth that regulators and law enforcement agencies can protect organizations from fraud.

Wikis: 2 total

Blog Posts: 77 total

Recently, I participated in the First Annual Conference of ICT SECURITY WORLD held on Wednesday, March 4, 2015 at the National Centre for Public Administration and Local Government in Tavros, Athens. The presence of ISACA Athens Chapter was a pleasant sur...
Posted By : Konstantinos741 | 0 comments
29 Mar 2015
As I interview IA professionals I get the feeling that as organizations move toward the adoption of the big-data fueled decision-making paradigm senior decision makers are focusing on the implications of big-data as it pertains to their locust of control....
Posted By : Ben Apple | 0 comments
Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments
I saw Garry at the Sydney Chapter’s successful Strategic Planning event in July 2014.  He was animated and gregarious during the evening’s cocktail event and it felt good to see him again and catch...
Posted By : Rob Hanson | 0 comments
It is Friday morning, the week before Christmas and all through Parliament House, not a creature was stirring, not even a mouse.  Well not quite, but the Parliamentary Triangle has taken a relaxed and ...
Posted By : Rob Hanson | 1 comments
If you are still using excel for your governance, risk and compliance Maclear eGRC SuiteTM have put together a whitepaper to help you understand the benefits of automation and what to look for when selecting your solution. IT GRC Whitepaper includes: 1...
Posted By : SHAMU2015 | 0 comments