ISACA Conducted a survey on advanced persistent threats (APT) in 2012, which identified a lack of guidance in the market surrounding the APT. APT is significantly different than traditional threats and requires different tools to manage them. ISACA is working to create security guidance on APT for members, bringing the business perspective to security professionals so that they can consider the entire risk picture in their attempts to protect their information assets. This publication is scheduled for release in Q4 2013.
Cloud Vision White Paper Series
- Vendor Management in the Cloud— This research publication will include an accompanying service level agreement toolkit and is scheduled to be available in the third quarter of 2013.
COBIT 5: Enabling Information
A detailed reference guide for the Information enabler for the governance and management of enterprise IT (GEIT). This guide will further explain the Information Model (based on the COBIT 5 generic enabler model) and provide examples of fully elaborated information entities. This guide should be considered the "information" equivalent of COBIT 5: Enabling Processes. It is scheduled to be available in the third quarter of 2013.
COBIT 5 for Assurance
This publication creates an information assurance view of COBIT 5, to provide guidance for ISACA’s information assurance constituents. It should be considered as the assurance equivalent of COBIT 5 for Information Security. It is scheduled to be available in the second quarter of 2013.
COBIT 5 for Risk
This development project will create an information risk view of COBIT 5, which will serve as the information risk specific guidance as it relates to COBIT for ISACA’s information risk constituents. The guide should be considered the risk focused equivalent of the ‘COBIT 5 for Information Security’ publication within the COBIT 5 family of products. The product is scheduled to be issued in the third quarter of 2013.
Configuration Management Using COBIT 5
This book will provide practical guidance about implementing and managing configuration management using COBIT 5 as a foundation. It will describe the most common risk, threats, controls and best practices to maximize benefits and reduce associated risk. A good portion of the book will be dedicated to the configuration management database concept, including how to build an effective database, interaction with other IT processes, configuration item lifecycle management and security controls. It is scheduled to be available in fourth quarter 2013.
Privacy and Big Data White Paper
Assurance and privacy professionals are increasingly concerned with the collection and use of big data as they witness the growing amount of data collection and the surmounting use of this data empowered by powerful computers and limitless storage. This whitepaper will address the privacy risks and controls associated with big data. It is scheduled to be available in third quarter 2013.
Risk Scenarios for COBIT 5 for Risk
This professional guide will provide practical guidance on how to use COBIT 5 for Risk to solve for current business issues. Specific risk scenarios, along with other pragmatic application methods, will be demonstrated. It is scheduled to be available in fourth quarter 2013.
Transforming Cybersecurity With COBIT 5
This book will assist security professionals in using COBIT 5 for Information Security to solve for the identified challenges that exist with cybersecurity. It is scheduled to be available second quarter 2013, and is the third publication in a three-part cybersecurity series.
Vendor Management Book
This book will focus on helping readers understand the lifecycle of contractual relationships with third parties, how to address challenges and risk and understanding the financial impact of poor vendor management. It will also provide sample contracts and SLAs to further illustrate the material. It is scheduled to be available third quarter 2013.