Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Security Trends

Welcome to the Security Trends topic!

Collaborate, contribute, consume and create knowledge about today’s top security trends, help to identify security issues that are relevant and emerging as well as issues that need more guidance.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
655 Members
3 Online
8299 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 65 total

Must be a Topic member to contribute
View All »
Most often, cyber security professionals make fun of Microsoft products until few years ago. Its due to the reason that its been considered one of the  notoriously full of dangerous bugs, and Microsoft was considered difficult to work with when it came to...
rasoolirfan | 3/21/2017 1:49:07 AM | COMMENTS(0)
Interesting article yesterday about what Google is trying as an alternative to passwords. While well intended, it raises privacy concerns and can be argued to trade privacy for security. Thoughts?
Theodore817 | 2/22/2017 12:05:44 AM | COMMENTS(3)
PrivacyImpact Assessment Questionnaire The following questionnaire hasbeen designed to assist the privacy impact assessment facilitator. PrivacyPrinciples# 1 –Organizational Responsibility for Personal Information# 2 –Identifying the Purpose for Personal ...
Mark E.S. Bernard | 1/30/2017 7:23:10 PM | COMMENTS(5)
There are a significant number of fake profiles on LinkedIn with the tactics being used continually changing.  This is a good article on some signs to look for.   Usually there are things that don't add up when you dig a little deeper. https://www.linkedi...
Phil Green | 1/9/2016 7:16:05 AM | COMMENTS(1)
CyberSecurity 11 Essential practices • Governance• Risk Management• Compliance Management• Vulnerability Management• Communication  Management• Awareness Training• Access and Identity• Asset Management• Document Control• Records Management• Internal /Exte...
Mark E.S. Bernard | 12/31/2015 7:21:02 PM | COMMENTS(1)
Top 10 Predictions for 2016 •More government and commercial organizations are going to be breached.•More publicly traded organizations are going to miss shareholder expectations due to breaches.•More Chief Executive Officers are going to be fired and som...
Mark E.S. Bernard | 12/30/2015 9:23:02 AM | COMMENTS(1)

Documents & Publications: 33 total

Must be a Topic member to contribute
View All »
Posted by ISACA 387 days ago
Posted by ISACA 553 days ago
Posted by ISACA 639 days ago

Events & Online Learning: 7 total

Journal Articles: 13 total

Volume 4, 2016
by Daniel Schatz, CISM, CCSK, CISSP, CSyP, CVSE, ISO 27001 LA/LI, MCITP-EA
The topic of information security has evolved to one of the top concerns among policymakers and corporations. Leaders demand answers from their support structures as to how such risk can be effectively managed.
Volume 3, 2016
While mobile devices have enhanced productivity, these devices compete for limited attention span and may make it more difficult to gain sufficient attention for security awareness.
Volume 2, 2016
by Henry Santiago
From January to 9 April 2015, the number of attacks on debit cards used at automated teller machines (ATMs) reached the highest level for that time frame in the last 20 years.
Volume 1, 2016
by C. Warren Axelrod, Ph.D., CISM, CISSP
Information security professionals continue to struggle with acquiring and understanding the most relevant and useful data in order to anticipate threats, guard against attacks and determine forensically what happened after a hack occurs.
Volume 3, 2015
by Sivarama Subramanian, CISM and Devaraj Munuswamy, CEH
In the current world of IT, “cloud” is a buzzword heard everywhere. Many organizations are moving to cloud computing because of its scalability, on-demand service offerings over the Internet, virtualization and cost efficiency.
Volume 3, 2015
by Daniel Mellado, Luis Enrique Sanchez, Eduardo Fernandez-Medina and Mario Piattini | Reviewed by A. Krista Kivisild, CISA, CA, CPA
With new technology supporting all areas of life, management increasingly needs to evaluate the areas of risk and concern that they need to be aware of and address within the business.

Wikis: 3 total

Blog Posts: 4 total

Must be a Topic member to view blog posts
Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments
The PCI Council has announced some new information on the upcoming version of PCI - Version 3.2.  Find out the latest here: http:/
Posted By : Stewart141 | 0 comments
13 Nov 2014
Posted By : masarker | 4 comments
On March 1st,  I was invited to speak at the CampIT conference on Enterprise Risk/Security Management at Rosemont Convention Center. Before me there were two speakers. The first presenter spent an hour presenting the story from the trenches of technolog...
Posted By : appolloconsulting | 2 comments