Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Risk Management

Welcome to the Risk Management topic!

Collaborate, contribute, consume and create knowledge around topics such as Risk Management, Risk Governance, Risk Profile, Governance Risk & Compliance (GRC), & CRISC.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
2047 Members
7 Online
20073 Visits

Community Leader

Brian Barnier

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 139 total

Must be a Topic member to contribute
View All »
Hi All, I've been asked by a colleague about information security Threat Taxomonies (or lists) to assist him with the risk identification process. He already has the ISF IRAM2 documentation (Appendix F). Have provided additional references to: NIST S...
Ross Peachey | 3/24/2015 7:54:45 AM | COMMENTS(0)
My company is looking to expand our Vendor Risk Management program and in order to build a business case, I need to gather some benchmark data on other companies' programs. This is for internal use only and no company-specific data is required and no attr...
Tera075 | 2/24/2015 2:50:47 AM | COMMENTS(13)
NEW!! Last piece of my IoT Security series: Privacy and Humanity Elements for the IoT / IoE: #InfoSec #CyberSecurity #IoT #IoE #CISO #CSO #CTO #CIO #CEO #Privacy http://blog.norsecorp.com/2015/02/17/privacy-and-humanity-elements-for-the-iot-ioe/
Michael S. Oberlaender | 2/18/2015 4:15:20 PM | COMMENTS(0)
Can anyone suggest or share a template that they use for managing Vendor inventory?
Dipesh744 | 2/7/2015 7:45:41 AM | COMMENTS(2)
NEW!! Here's the next one of my IoT / IoE Security series (continued from last one): http://blog.norsecorp.com/2015/02/04/mandatory-security-design-considerations-for-the-iot-ioe/
Michael S. Oberlaender | 2/5/2015 11:19:46 AM | COMMENTS(1)
Hello all, for those of you who follow North American football, try this for your football party with ISACA friends or chapter event... http://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=480
Brian Barnier | 1/27/2015 6:06:13 PM | COMMENTS(0)

Documents & Publications: 95 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 360 days ago
Books
Posted by ISACA 51 days ago
Research
Posted by ISACA 71 days ago

Events & Online Learning: 14 total

14 Oct 2013
ISACA International Event
Boston, MA, USA
6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
11 Aug 2014
ISACA International Event
Seattle, WA, USA

Journal Articles: 258 total

Volume 2, 2015
by Rich Karlgaard | Reviewed by Dino Ippoliti, CISA, CISM
The soft edge is composed of five pillars and each of them is analyzed in a dedicated chapter that guides readers to answer crucial questions.
Volume 2, 2015
by David Vohradsky, CGEIT, CRISC
With increases in the regulatory regime, increasing technology complexity and pressures on cost, organisations are seeking productivity improvements in the evaluation of the performance of internal controls.
Volume 2, 2015
by Marcelo Hector Gonzalez, CISA, CRISC, and Jana Djurica
There are a number of definitions of Internet of Things (IoT), with all of them having slightly different meanings.
Volume 2, 2015
by Fredric Greene, CISSP
Selected processes from the COBIT 5 framework can improve the effectiveness of enterprise security in an organization.
Volume 2, 2015
by Vasant Raval, DBA, CISA, ACMA
While entrepreneurship has always been a key segment of the economy, there has been a huge surge in this sector since the 1990s.
Volume 2, 2015
by Rodney T. Stamler, Hans J. Marschdorf, Mario Possamai | Reviewed by Upesh Parekh, CISA
It is a common myth that regulators and law enforcement agencies can protect organizations from fraud.

Wikis: 2 total

Blog Posts: 75 total

Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments
I saw Garry at the Sydney Chapter’s successful Strategic Planning event in July 2014.  He was animated and gregarious during the evening’s cocktail event and it felt good to see him again and catch...
Posted By : Rob Hanson | 0 comments
It is Friday morning, the week before Christmas and all through Parliament House, not a creature was stirring, not even a mouse.  Well not quite, but the Parliamentary Triangle has taken a relaxed and ...
Posted By : Rob Hanson | 1 comments
If you are still using excel for your governance, risk and compliance Maclear eGRC SuiteTM have put together a whitepaper to help you understand the benefits of automation and what to look for when selecting your solution. IT GRC Whitepaper includes: 1...
Posted By : SHAMU2015 | 0 comments
13 Nov 2014
You are invited to comment on my post in ISACA Now which can be accessed using the following link: Title: From games to government, babies to business--the role of strategyLink: http://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=386 Shahi...
Posted By : SA | 0 comments
Dear Community Members,We have established the Topic “Strategic Planning/Alignment” which I believe might be of interest to you. We would like to benefit from your experience and knowledge. Some of you are already members of the topic (which you will find...
Posted By : SA | 0 comments