Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Risk Management

Welcome to the Risk Management topic!

Collaborate, contribute, consume and create knowledge around topics such as Risk Management, Risk Governance, Risk Profile, Governance Risk & Compliance (GRC), & CRISC.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
1975 Members
4 Online
19548 Visits

Community Leader

Ayman Galal

Ayman Galal

Badge: Energizer

Brian Barnier

Brian Barnier

Badge: Energizer



Badge: Social


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 131 total

Must be a Topic member to contribute
View All »
I'm developing a key risk indicator dashboard and am looking for guidance on best practices and reporting formats. Thanks.
Jennifer067 | 12/12/2014 11:04:10 AM | COMMENTS(6)
According to one of the answers on a CRISC practice question, vulnerabilities can be reduced but never eliminated. Since a vulnerability is deficient control relative to a threat level, does this also mean that threats can never be eliminated? What about ...
Hannah656 | 12/12/2014 10:42:36 AM | COMMENTS(10)
Hello all, if you will be at the GRC Conference in NYC Dec 9-12 or the ISACA NCAC Cyber Crime and Security Conference in Washington Dec 16, please say "hello." Always nice to meet community friends in person. Best, Brian
Brian Barnier | 12/12/2014 10:34:09 AM | COMMENTS(3)
This short article is enthused by a publication I read here: The entire article is a reminder tha...
John229 | 11/12/2014 3:32:20 PM | COMMENTS(3)
Hello Everyone, I have enrolled myself for CRISC certification in December. In order to prepare myself i have bought CRISC Review Manual 2014. Do you think it should be sufficient to prepare or should i refer to other study materials as well. All the sug...
Rohit131 | 11/12/2014 4:32:18 AM | COMMENTS(15)
It is often said that an effective plan must contain all aspects of its intended objectives. Considering the pace at which technology is evolving as compared to set business objectives, senior managements need to develop a trust relationship with techno...
John229 | 11/10/2014 9:49:20 AM | COMMENTS(1)

Documents & Publications: 94 total

Must be a Topic member to contribute
View All »
Posted by ISACA 265 days ago
Posted by ISACA 13 days ago
Posted by ISACA 17 days ago

Events & Online Learning: 12 total

14 Oct 2013
ISACA International Event
Boston, MA, USA
6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
11 Aug 2014
ISACA International Event
Seattle, WA, USA

Journal Articles: 247 total

Volume 6, 2014
by Kathleen M. Stetz, CISA, CISM, CRISC, PMP
Get to know your network.
Volume 6, 2014
by Eric A. Beck
Corporate risk managers and security professionals understand that risk is not a problem that can be solved, but rather a process that must be managed.
Volume 6, 2014
by Ed Gelbstein, Ph.D., and Viktor Polic, CISA, CRISC, CISSP
Understanding who owns data is not as simple as it appears at first. It is easy to say that all data belong to the organization.
Volume 6, 2014
by Ivan Alcoforado, CISSP, PMP
As more and more organizations start reporting cybersecurity risk and incidents, security professionals, internal auditors and IT auditors need to pay as much attention to IACS controls as they do to controls for traditional IT.
Volume 6, 2014
by Jeimy J. Cano M., Ph.D, CFE
International trends reflect a paradigmatic change in current business models caused by the markets’ asymmetry and dynamics where instability is the constant and change is the norm.
Volume 6, 2014
by Tommie Singleton, CISA, CGEIT, CPA
With the advent of the latest wave of information technologies such as big data, social media, technologies as a service and the cloud in general, it is worth taking the time to revisit the basics of IT audit.

Wikis: 2 total

Blog Posts: 71 total

13 Nov 2014
You are invited to comment on my post in ISACA Now which can be accessed using the following link: Title: From games to government, babies to business--the role of strategyLink: Shahi...
Posted By : SA | 0 comments
Dear Community Members,We have established the Topic “Strategic Planning/Alignment” which I believe might be of interest to you. We would like to benefit from your experience and knowledge. Some of you are already members of the topic (which you will find...
Posted By : SA | 0 comments
“Enterprise architecture is now a strategic componentof every forward-thinking organization around the world.”Source: Related Article: Common Perspective on Enterprise Architecture: http://feapo....
Posted By : SA | 0 comments
Ina fast changing world of business and relentless competition, strategicplanning is not only critical, but also the differentiating factor for anorganization. Since IT has moved from a supportive role to a more strategicrole, the IT Strategic Planning an...
Posted By : SA | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
Enterprise Architecture Practice provides several benefits to organization. Some of the benefits are listed below:  an improved road map for strategy execution; focused and measured strategy implementation; creating synergies; cost reduction (value for m...
Posted By : SA | 0 comments