IT Professional Networking and Knowledge Center 

 

Where networking and knowledge intersect

ISACA's IT Professional Networking and Knowledge Center is a meeting place for IT professionals who share common professional interests. Participants can consume information, exchange expertise and experience, and build new understanding through collaboration. A wide range of disciplines and practices powers this global professional community, making it a truly unique and holistic resource.

Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center.
Learn More.

COBIT 5.0: A Business Framework for
the Governance and Management of Enterprise IT

COBIT 5 builds and expands on COBIT 4.1 by integrating major frameworks, standards and resources, including Val IT and Risk IT.
Learn | Collaborate | Members-Only Collaborate

COBIT 4.1: The globally accepted IT governance framework
Minimize IT-related risks and maximize the benefits of technology.
Learn | Collaborate | Members-Only CollaborateControls Collaboration


 
   

Furthering Industry-leading Knowledge and Practices

Drive Value from IT Investments

Identify, Govern and Effectively Manage IT Risk

ISACA develops products and services that further industry-leading knowledge and practices for IT and information systems, and provides research deliverables on today’s hottest topics to help keep you ahead of the competition.

Ensure that IT-enabled investments deliver value with Val IT. This framework covers value governance, portfolio management, and investment management processes.

Effectively address all IT-related business risks with Risk IT. This framework covers risk governance, evaluation and response processes and activities.

Learn | Download Learn | Collaborate | Download Learn | Collaborate | Download

 

ISACA Supports Faculty and Students IT Assurance Framework Business Model for Information Security

Faculty can access the model curricula and teaching materials and participate in the Academic Advocate program. Student groups and student membership are provided.

A single source for ISACA assurance professionals and CISAs, integrating standards, guidelines, tools and techniques for conducting assurance work.

Explore how the The Business Model for Information Security helps integrate security and business activities using a systemic approach to information security management.

 

Learn | Collaborate | Download Learn | Collaborate | Download Learn | Collaborate | Download

Employment Connections

Search jobs online by geography, certification, experience level and other factors. Members can also post resumes/CVs and receive
emails when new jobs are posted. A new career advice section is also available.  

Personal Online Library

Explore our most popular benefit! The eLibrary is a searchable collection of content from most ISACA published books and more than 350 additional titles – all available free to ISACA members.

Glossary

Use this glossary to assist you in studying for certification examinations or simply learning new definitions and phrases.

Start Your Career Now Download Your Books Now Access the Glossary Now

Journal Article

Maturity Security Information Governance: Applied to the Telecom Segment in Brazil

Information security is a primary concern that pervades all organizations and comprises confidentiality, integrity and availability.

Download

Kleuber Tormim, COBIT Foundation, Green IT, ISO 20000, ISO 27000, ITIL-Expert, Vitor Tormin Nishi, COBIT Foundation, ITIL-F, ISO 27002 and Mauricio Rocha Lyra, Ph.D., COBIT Foundation, CTFL, ISO 20000, ITIL, MCSO, OCUP, PMP, RUP 3 hours ago | 0 comments

Journal Article

Security in the Payment Card Industry: The Importance of Data Integrity

In July 2015, CVS became the latest company to fall victim to an apparent breach, this one involving credit card data obtained via its web site for ordering and processing photos.

Download

Mark Johnston 3 hours ago | 0 comments

Journal Article

IS Audit Basics: Trust, but Verify

“Trust, but verify” is a Russian proverb that became more widely known when then-US President Ronald Reagan used it in the 1980s.

Download

Ed Gelbstein, Ph.D. 8 hours ago | 0 comments

Journal Article

IS Audit Basics: Is There Such a Thing as a Bad IS Auditor? Part 1

Auditors are human (some auditees may challenge this!). As such, they are unique individuals and imperfect in one way or another.

Download

Ed Gelbstein, Ph.D. 8 hours ago | 0 comments

Journal Article

The Browser Hacker’s Handbook

To understand the vulnerabilities in web browsers and how to strengthen them, it is necessary to learn the methods of infiltrating and wreaking havoc on browsers.

Download

Wade Alcorn, Christian Frichot and Michele Orru | Reviewed by Ibe Etea, CISA, CRISC, CA, CFE, CIA, CRMA Yesterday | 0 comments

You must log in to view Knowledge Center Topic updates.

LogIn