Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Risk Management

Welcome to the Risk Management topic!

Collaborate, contribute, consume and create knowledge around topics such as Risk Management, Risk Governance, Risk Profile, Governance Risk & Compliance (GRC), & CRISC.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1810 Members
4 Online
18233 Visits

 Recent Discussions

Agility and Risk management. Posted by Ayman Galal.
Will you be at the GRC Summit 5 March?. Posted by Brian Barnier.
Breach at Target: Fixing a hole with a whole. Posted by Brian Barnier.
NEW! Participate in Discussions Via Email. 

You can now respond to discussions by simply replying to the email alert. Just enable this feature in discussions on this topic. Learn more

Discussions: 100 total

Must be a Topic member to contribute
View All »
Hello all, just wondered if anyone in the group will be attending the GRC Summit in Boston next week. I'll be there the morning of the 5 as the opening keynote and panel, unfortunately, will miss the rest (how much depends on how much snow!). If you will ...
Brian Barnier | 2/26/2014 1:46:55 PM | COMMENTS(4)
From ISACA Now blog http://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=374
Brian Barnier | 2/24/2014 9:28:14 PM | COMMENTS(1)
  Requesting some advice on what should be included in a Risk Profile and just wanted to see if anyone had any templates out there similar to what I am looking for here. I am looking to put together a Risk Profile for a large application development orga...
Michael411 | 1/15/2014 5:14:20 PM | COMMENTS(4)
Do we have a clear space for begginers, especially new members of ISACA to understand all about Risk Management, Compliance and Controls? It will be good to have if not available already. There are many people coming and asking about basics of Risk Mana...
VIMAL PRASHANTH | 1/8/2014 7:02:14 PM | COMMENTS(4)
Hi All, I'd like to get your recommendation of the best risk management books in 2013.
Ayman Galal | 1/6/2014 6:00:11 AM | COMMENTS(6)
Dear professionals, Attach do you find a post related with, information security predictions for 2014. I hope this can be helpful for all of you. English access: (Translation is not totally reliable. I apologize for this issue.) http://translate.google....
Jeimy387 | 12/4/2013 1:24:38 PM | COMMENTS(2)

Documents & Publications: 89 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 23 days ago
ICQs and Audit Programs
Posted by ISACA 13 days ago
Books
Posted by ISACA 14 days ago
Posted by ISACA 23 days ago
Books
Posted by ISACA 27 days ago

Events & Online Learning: 8 total

14 Oct 2013
ISACA International Event
Boston, MA, USA
6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
11 Aug 2014
ISACA International Event
Seattle, WA, USA

Journal Articles: 233 total

Volume 2, 2014
by Ketan Dholakia, CISM, CRISC, CISSP
Get to know your network.
Volume 2, 2014
by Tommie Singleton, CISA, CGEIT, CPA
Entities that maintain large databases of individuals and their PII should be prepared for a data breach by doing due diligence, as defined by cybersecurity professionals.
Volume 2, 2014
by Vimal Mani, CISA, CICA
In November 2013, the ISO and the IEC formally released the long-anticipated updates to ISO/IEC 27001 and 27002.
Volume 1, 2014
by Yo Delmar, CISM, CGEIT, CMC
The integration of security analytics within an overall GRC program is driven by business’s increasing need to know the size, scope and scale of risk in order to give guidance on how it can be best managed.
Volume 1, 2014
by Munir A. Majdalawieh, Ph.D.
The Business Process-centric Risk Management System conceptual model is based on a holistic integrated approach to enterprise risk and consists of six domains and 16 processes.
Volume 1, 2014
by Daksha Bhasker, CISM
The recent proliferation of promising wireless technologies has quickly been followed by torrents of new mobile malware and cyberthreats.

Wikis: 2 total

Blog Posts: 157 total

22 Mar 2014
SGSI Risk Management in LATAM-Argentina
Posted By : GMB_Gustavo Blanco | 0 comments
21 Mar 2014
You are invited to comment on my post in ISACA Now which can be accessed using the following link: Title: From games to government, babies to business--the role of strategyLink: http://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=386 Shahi...
Posted By : SA | 0 comments
19 Mar 2014
At a recent IT event a show of hands was used to provide theback drop for how change is a consistently evolving event. How many of youbelieve that the number one enterprise Network security Threat is external Hacking?Fifty percent of the room. Ok, how man...
Posted By : Jamie L Yancy | 0 comments
"Combatirse a sí mismo es la guerra más difícil; vencerse a sí mismo es la victoria más bella"Friedrich von Logau (1605-1655) Poeta alemán.En estos momentos en que la contratación de un profesional para una empresa debe de ser un tema muy bien planteado, ...
Posted By : Javier | 0 comments
13 Mar 2014
Complying with a multitude of complex regulations, assessing risks of non-compliance with each statute and guideline, implementing controls for every process across multiple lines of business and at every level of an organization can be overwhelming. So m...
Posted By : CraigerGRC | 0 comments
Community of Sponsoring Organizations, essentially the large audit/consulting firms are big proponents of COSO as an ERM framework of choice. However, ERM programs must work with ITRM programs as majority if not almost all enterprises have their key bus...
Posted By : Umesh391 | 0 comments