Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Students

Welcome to the online student community! This community was created so that students can engage each other and discuss topics such as ISACA student groups, benefits of student membership, networking opportunities, resume help, study tips, etc.). Begin by introducing yourself in the discussion below or begin a new discussion.

All students are welcome to join, including those who are not currently ISACA student members. If interested in joining student membership please visit join ISACA or email [email protected] with questions.

 
This Topic Has:
91 Members
0 Online
3989 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 20 total

Must be a Topic member to contribute
View All »
Hi Everyone, In order to make everyone feel comfortable with posting discussions to a group of strangers, let’s get to know each other a little better.  Please introduce yourself.  You may choose to keep it short and simple or , if you are feeling up to ...
Maggie171 | 5/5/2017 11:45:32 AM | COMMENTS(12)
Hi allI wish to pursue a Masters degree in Information Security and related areas ( specifically from USA or UK). I invite guidance on universities for the same. Colleges can be ranked on the basis of course and curriculum,content,professors,research and ...
Mahak569 | 11/24/2016 5:46:04 AM | COMMENTS(0)
I posted this in the Young Professionals site but I am interested in people's experience with ISACA being involved at Universities.  When I was at college (JMU) I remember some organizations, some business fraternities, but ISACA was not represented.  Cur...
crosbypa | 12/16/2015 10:54:26 AM | COMMENTS(5)
Tonight (Nov 3), the National Capital Area Chapter in Washington, DC will be holding it's second student event ever.  The first event was attended by over 100 students and was a tremendous success.  We hope to have a similar turn out for this event.  Ha...
JasonY | 9/16/2015 8:51:12 AM | COMMENTS(6)
Hope you don't mind me posting in this groupabout this year's ISACA Ireland conference, which is focusing on placingbusiness first. Wewould like this conference to be as successful as last year's, which was trulyinternational with 24 speakers from 12 coun...
Neil_Curran | 6/17/2015 4:33:12 AM | COMMENTS(0)
As student members, what do you find to be some of the most beneficial aspects of your membership?  What will make you convert to a full membership upon graduating?  Or what are the reasons you may not renew your membership?
JasonY | 9/8/2014 5:50:11 AM | COMMENTS(2)

Documents & Publications: 19 total

Must be a Topic member to contribute
View All »
Posted by ISACA 16 days ago
Books
Posted by ISACA 527 days ago
Books
Posted by ISACA 925 days ago

Events & Online Learning: 4 total

16 Aug 2017
ISACA International Event
Grapevine, Texas, US
2017 GRC Conference - 16-18 August , Grapevine, TX. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 17 total

Volume 3, 2017
by Jane Whitgift, CISM, MBCS
Get to know your network.
Volume 5, 2016
by Daksha Bhasker, CISM, CISSP
When women are in leadership positions in significant numbers, “the bottom line improves—from financial success to the quality and scope of decision making.”
Volume 6, 2015
by Ivo Ivanovs and Sintija Deruma
Cyberspace is a virtual environment. Today, it does not matter which device is used for connecting to the Internet.
Volume 6, 2014
by Vasant Raval, DBA, CISA, ACMA
Over the past two decades, the demand for information systems (IS) knowledge workers has outpaced the supply.
Volume 1, 2014
by Jason Andress, Ph.D., CISM, CISSP, GPEN, ISSAP
A commonly posed question among people looking to enter the information security field is, “How do I get into information security?”
Volume 4, 2013
by Kerry Anderson, CISA, CISM, CRISC, CGEIT, CCSK, CFE, CISSP, CSSLP, ISSAP, ISSMP
An information security practitioner must acquire core competencies to develop a holistic perspective to effectively manage security within today’s global and highly interconnected world.

Wikis: 2 total

Blog Posts: 8 total

Liechtensteins Teilnahme an der 'European Cybersecurity Challenge' in DüsseldorfEdit articleUm was geht es genau?Die European Cybersecurity Challenge ist ein Wettbewerb für Nachwuchskräfte aus dem Bereich IT / InfoSec die sich für Cybersecurity interessie...
Posted By : Peter Huerlimann | 0 comments
Hi there, About some 6 years ago, I was sitting in a dead end job and always I felt I could do better. I had done everything I knew and I did my job well enough but I found myself to have hit the ceiling as far as my career was concerned in that particula...
Posted By : Edward491 | 3 comments
Let us have positive inspirational slogans for every situation. Last week I started the project meeting like this: I don't know you are all so good at tuning the website. The performance is now is wonderful. I could witness reduction of stress, anxiety an...
Posted By : Jayakumar Sundaram | 1 comments
  Rob Stroud is the New York based Vice President of Strategy and Innovation at CA Technologies and is the current President for the 2014-15 administrative term.  I caught up with Rob in Australia when he visited Canberra in June 2014...
Posted By : Rob Hanson | 2 comments
13 Nov 2014
Posted By : masarker | 4 comments
The role of CIO is fast changing from that of a technology leader to a business leader. CIOs are becoming more business oriented than ever before. It has become necessary for CIO to become permanent features on board meetings or in some cases permanent b...