Find resources and connect with members on topics that interest you. Browse more than 100 topics or view the featured ones.

 

Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

 

 

Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center.
Learn More.


Document

COBIT Focus:Which Screws Have to Tighten?

Download

Posted by ISACA Yesterday | 0 comments

Document

CSX Europe brochure

Download

Posted by ISACA 5 days ago | 0 comments

Document

CSX North America conference brochure

Download

Posted by ISACA 6 days ago | 0 comments

Journal Article

Boosting Cyber Security With Data Governance and Enterprise Data Management

The relationship between cyber security and the regulatory requirements for data governance, data stewardship and enterprise data management is set to strengthen.

Download

Guy Pearce 6 days ago | 0 comments

Journal Article

Breach Your Castle for Better Security

Asymmetric warfare is “the application of dissimilar strategies, tactics, capabilities and approaches used to circumvent or negate an opponent’s strengths while exploiting his weaknesses.”

Download

Danelle Au 6 days ago | 0 comments

You must log in to view Knowledge Center Topic updates.

LogIn