Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Risk Management

Welcome to the Risk Management topic!

Collaborate, contribute, consume and create knowledge around topics such as Risk Management, Risk Governance, Risk Profile, Governance Risk & Compliance (GRC), & CRISC.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
2029 Members
0 Online
19953 Visits

Community Leader

Brian Barnier

Brian Barnier

Badge: Energizer

KenDoughty

KenDoughty

Badge: Lively

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 138 total

Must be a Topic member to contribute
View All »
My company is looking to expand our Vendor Risk Management program and in order to build a business case, I need to gather some benchmark data on other companies' programs. This is for internal use only and no company-specific data is required and no attr...
Tera075 | 2/24/2015 2:50:47 AM | COMMENTS(13)
NEW!! Last piece of my IoT Security series: Privacy and Humanity Elements for the IoT / IoE: #InfoSec #CyberSecurity #IoT #IoE #CISO #CSO #CTO #CIO #CEO #Privacy http://blog.norsecorp.com/2015/02/17/privacy-and-humanity-elements-for-the-iot-ioe/
Michael S. Oberlaender | 2/18/2015 4:15:20 PM | COMMENTS(0)
Can anyone suggest or share a template that they use for managing Vendor inventory?
Dipesh744 | 2/7/2015 7:45:41 AM | COMMENTS(2)
NEW!! Here's the next one of my IoT / IoE Security series (continued from last one): http://blog.norsecorp.com/2015/02/04/mandatory-security-design-considerations-for-the-iot-ioe/
Michael S. Oberlaender | 2/5/2015 11:19:46 AM | COMMENTS(1)
Hello all, for those of you who follow North American football, try this for your football party with ISACA friends or chapter event... http://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=480
Brian Barnier | 1/27/2015 6:06:13 PM | COMMENTS(0)
Please find my latest article here: http://blog.norsecorp.com/2015/01/26/iot-ioe-if-it-has-an-ip-address-it-can-be-hacked/
Michael S. Oberlaender | 1/27/2015 12:22:29 PM | COMMENTS(1)

Documents & Publications: 95 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 334 days ago
Books
Posted by ISACA 25 days ago
Research
Posted by ISACA 45 days ago

Events & Online Learning: 14 total

14 Oct 2013
ISACA International Event
Boston, MA, USA
6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
11 Aug 2014
ISACA International Event
Seattle, WA, USA

Journal Articles: 256 total

Volume 2, 2015
by Vasant Raval, DBA, CISA, ACMA
While entrepreneurship has always been a key segment of the economy, there has been a huge surge in this sector since the 1990s.
Volume 2, 2015
by David Vohradsky, CGEIT, CRISC
With increases in the regulatory regime, increasing technology complexity and pressures on cost, organisations are seeking productivity improvements in the evaluation of the performance of internal controls.
Volume 2, 2015
by Marcelo Hector Gonzalez, CISA, CRISC, and Jana Djurica
There are a number of definitions of Internet of Things (IoT), with all of them having slightly different meanings.
Volume 2, 2015
by Fredric Greene, CISSP
Selected processes from the COBIT 5 framework can improve the effectiveness of enterprise security in an organization.
Volume 1, 2015
by Ed Gelbstein, Ph.D.
An information security practitioner preparing a ROSI calculation needs to prepare it in such a way to ensure that it leads to the requested resources and preserves the practitioner’s credibility.
Volume 1, 2015
by Yuri Bobbert
Hackers and negative social media hypes have proven able to bring proud organizations to their knees, yet many information and communications technology (ICT) security managers lack a strategy to anticipate and overcome such unpredictable challenges.

Wikis: 2 total

Blog Posts: 75 total

Data Privacy in today's world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon.  Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of se...
Posted By : Mayank | 0 comments
I saw Garry at the Sydney Chapter’s successful Strategic Planning event in July 2014.  He was animated and gregarious during the evening’s cocktail event and it felt good to see him again and catch...
Posted By : Rob Hanson | 0 comments
It is Friday morning, the week before Christmas and all through Parliament House, not a creature was stirring, not even a mouse.  Well not quite, but the Parliamentary Triangle has taken a relaxed and ...
Posted By : Rob Hanson | 1 comments
If you are still using excel for your governance, risk and compliance Maclear eGRC SuiteTM have put together a whitepaper to help you understand the benefits of automation and what to look for when selecting your solution. IT GRC Whitepaper includes: 1...
Posted By : Shanthamurthy926 | 0 comments
13 Nov 2014
You are invited to comment on my post in ISACA Now which can be accessed using the following link: Title: From games to government, babies to business--the role of strategyLink: http://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=386 Shahi...
Posted By : SA | 0 comments
Dear Community Members,We have established the Topic “Strategic Planning/Alignment” which I believe might be of interest to you. We would like to benefit from your experience and knowledge. Some of you are already members of the topic (which you will find...
Posted By : SA | 0 comments