Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Risk Management

Welcome to the Risk Management topic!

Collaborate, contribute, consume and create knowledge around topics such as Risk Management, Risk Governance, Risk Profile, Governance Risk & Compliance (GRC), & CRISC.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1923 Members
2 Online
19169 Visits

 Recent Discussions

Risk Scenarios Final Value. Posted by Cristina Ledesma.
Risk Scenarios. Posted by JasonY.
MAGERIT v.3. Posted by Juan Carlos Morales.

Community Leader

Ayman Galal

Ayman Galal

Badge: Energizer

Brian Barnier

Brian Barnier

Badge: Energizer

KenDoughty

KenDoughty

Badge: Lively

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 123 total

Must be a Topic member to contribute
View All »
I have seen the materials about Risk Scenarios (pdf and toolkit) quickly to have some understanding of what are the contents of them but I cannot see the final calculatio of risk, I mean something as we always have seen as Risk = Impact x Occurence Probab...
Cristina Ledesma | 10/19/2014 3:52:18 PM | COMMENTS(4)
I have been reading a lot about High Reliability Organizations (HRO) lately and would like to know if any group members belong to a HRO. It appears from my reading that organizational culture play a big role in the success of a HRO. I am curious to hear...
Joseph496 | 10/19/2014 3:39:18 PM | COMMENTS(2)
"ISACA today issued new guidance providing six steps to using risk scenarios for improved risk management. The guide also offers 60 customizable scenarios across 20 categories. Organizations can tailor these for their use. Toolkit and Scenarios are free t...
JasonY | 10/19/2014 3:33:18 PM | COMMENTS(5)
Con la aparición del nuevo COBIT 5 se puso mayor foco en la maximización de la creación de valor a partir de TI para el Negocio mediante el cumplimiento simultáneo de 3 objetivos de gobierno: - Maximización de Beneficios - Optimización de Recursos - ...
Franco.IT-GRC | 10/14/2014 2:34:59 PM | COMMENTS(0)
We are looking for an option to help us to manage documentation, templates and risk matrix. The colleagues have an suggestion about an open source software alternative to implement IT Enterprise Risk Manager?
Sergio.Pimenta | 10/9/2014 1:25:00 PM | COMMENTS(3)
Hello all, these articles from the ISACA Now blog and IDG Connect illustrate how we can use the 5+2 step approach to get ahead of future shellshocks. At the NY Metro Joint Security Conference yesterday, we used a sports comparison -- we talked about h...
Brian Barnier | 10/8/2014 11:03:17 AM | COMMENTS(0)

Documents & Publications: 93 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 203 days ago
Books
Posted by ISACA 25 days ago
Books
Posted by ISACA 25 days ago
Books
Posted by ISACA 25 days ago

Events & Online Learning: 15 total

14 Oct 2013
ISACA International Event
Boston, MA, USA
6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
11 Aug 2014
ISACA International Event
Seattle, WA, USA

Journal Articles: 241 total

Volume 5, 2014
by Jonathan Copley, CISA and Upesh Parekh, CISA
A resilient service is one that is capable of withstanding major and minor disruptions caused by natural and man-made sources.
Volume 5, 2014
by Zhiwei Fu, Ph.D., CISA, CGEIT, CRISC, CFE, PMP, John W. Lainhart IV, CISA, CISM, CGEIT, CRISC, CIPP/G, CIPP/US, and Alan Stubbs, MAS
Fraud is an undeniable reality and has recently become more pervasive and persistent as a result of the downturn in the economy.
Volume 5, 2014
by Thomas Borton, CISA, CISM, CRISC, CISSP
Get to know your network.
Volume 4, 2014
by Pascal Lélé, Ph.D., Frank Bezzina, Ph.D., Ronald Zhao, Ph.D., Simon Grima, Ph.D., Robert W. Klein, Ph.D. and Paul Kattuman, Ph.D.
The new jobs created as a result of compliance with Basel III will address one of the G20 governments’ main objectives—job creation and unemployment reduction.
Volume 4, 2014
by Robert E Stroud, CGEIT, CRISC
Get to know your network.
Volume 4, 2014
by Jaewon Lee, CISA, CGEIT, CRISC, CIA, CRMA
As enterprises increasingly rely on IT to succeed, effective IT risk management has become an essential component of IT governance.

Wikis: 2 total

Blog Posts: 101 total

8 Sep 2014
Posted By : masarker | 3 comments
My self-study is a combination of CISA 2009 and CISA 2014. The profit of knowledge gained through career experience is not enough to understand job practice area. In today's condition, the auditing process needs attention! Auditing and Auditors: A...
Posted By : Shanthamurthy926 | 0 comments
20 Aug 2014
Is there any body out there?
Posted By : IanD | 0 comments
  Rob Stroud is the New York based Vice President of Strategy and Innovation at CA Technologies and is the current President for the 2014-15 administrative term.  I caught up with Rob in Australia when he...
Posted By : Rob Hanson | 1 comments
There is an organizational mandate to log some risks in the project plan. When that status review is called for, you are asked about that pesky risk tracker. You have an excel sheet which lists some risks because you are supposed to do so. Most of the tim...
Posted By : Balamukund Sripathi | 0 comments
As an IT-security specialist i read a lot of standards, guides, frameworks and drafts on all matters of information security. When the EU Data Protection Regulation draft was first published in January 2012, i was eager to see what visions the EU h...
Posted By : Gaffri | 0 comments