Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Governance of Enterprise IT

Welcome to the Governance of Enterprise IT topic!

Collaborate, contribute, consume and create knowledge around IT governance in topics such as implementations, acquisitions, IT transformation and portfolio management.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1253 Members
2 Online
13014 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 105 total

Must be a Topic member to contribute
View All »
Hi.  Looking to implement a GRC tool - some of them are very expensive and I don't have the budget for it.  Looking for tool that is comprehensive - risk register, control tracking, dashboards, policies... Heard of Eramba.  Has anyone used it and would re...
jklevisay | 10/26/2017 7:55:03 AM | COMMENTS(2)
I'm in the process of helping an organization select an IT governance framework. What would you say the one thing that makes COBIT better than other governance frameworks?
david ho | 9/28/2017 10:05:57 AM | COMMENTS(7)
With so much interest in Cyber Security, organizations are focused on perimeter security such as strong firewalls and educating staff about phishing emails. But I continue to read and hear about internal threats. There is also a lot of interest in Big Dat...
david ho | 5/30/2017 9:37:06 AM | COMMENTS(1)
Hi all, Our organization has recently taken on formalizing a 3rd party risk program. This includes in scope Vendor Management/Supplier Governance. Currently, the organization makes purchases for technology, partnerships, etc. and our concern are around...
Chris860 | 4/6/2017 12:42:14 PM | COMMENTS(3)
How communication between IT AND Business will minimize failed initiatives and control raising of IT COST
Feroz349 | 2/18/2017 5:30:59 AM | COMMENTS(0)
What are the components GEIT framework
Feroz349 | 2/17/2017 3:39:36 AM | COMMENTS(0)

Documents & Publications: 151 total

Must be a Topic member to contribute
View All »
Downloads
Posted by FarmService 1416 days ago
Downloads
Posted by FarmService 2502 days ago
Books
Posted by ISACA 720 days ago
Books
Posted by ISACA 772 days ago
Books
Posted by ISACA 835 days ago

Events & Online Learning: 5 total

16 Mar 2015
ISACA International Event
Orlando, FL, USA
1 Aug 2016
ISACA International Event
Chicago, IL, USA
4 Jun 2018
ISACA International Event
Philadelphia, PA, USA
13 Aug 2018
ISACA International Event
Nashville, Tennessee, US
2018 GRC Conference - 13-15 August , Nashville, TN. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 101 total

Volume 1, 2018
by Ofir Eitan, CISM and Aviv Srour
Cyberincident response is no different than any other type of warfare. It requires strategy, tactics, planning, technology, psychology and intelligence.
Volume 6, 2017
by Daniel Gnana, CISA, ISO/IEC 27001:2013 LA, PRINCE2
The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC)’s ISO/IEC 27001:2013 standard has defined the requirements for an information security management system (ISMS).
Volume 6, 2017
by Guy Pearce
The modern GRC landscape has a significant impact on how an enterprise-scale big data project would be undertaken today.
Volume 6, 2017
by Ravikumar Ramachandran, CISA, CRISC, CISM, CGEIT, COBIT Assessor and Implementer, CAP, CEH, CFA, CFE, CHFI, CIA, CISSP-ISSAP, CRMA, ECSA, FCMA, ITIL Expert and Practitioner, PMP, SSCP
The word “big” in big data should not be confused with sheer size. It is a term given to large data sets containing a variety of data types.
Volume 5, 2017
by T. Sean Kelly
Certain steps can be taken to build a strong respect for and practice of security into the cultural fabric of any organization, across all departments and areas of the business.
Volume 5, 2017
by Noman Sultan, Ph.D., CISM, CGEIT, CITP
It is extremely important that organizations invest in their leadership capabilities because leaders play an integral role in motivating, inspiring and influencing talent management.

Wikis: 3 total

Blog Posts: 123 total

21 Feb 2018
We are happy to announce that  on Feb//2018  the ISACA awareness session  was held in Baghdad.This the first time to speak about ISACA Value in Iraq.Professional from government and private sector were excited to hear about ISACA value and they started to...
Posted By : Ali099 | 1 comments
Ransomware is a form of malware and is engineered to infect your personal computer and restrict access in some way, while demanding payment or ransom  to remove the restriction. First identified in 1989  under the name of PC Cyborg, today there are over 2...
Posted By : Robert658 | 2 comments
Have you experienced ransomware attack so far and, if yes, what did you do to resolve? I set up Twitter poll here: https://twitter.com/DPleskonjic/status/953608717399941120 It lasts for seven days. Thank you for taking part in the poll.
Posted By : Dragan Pleskonjic | 2 comments
My personal thoughts after listening to C-level executives at the CxO Roundtable Series sponsored by Intel, IBM, HyTrust & ReedSmith. For an invite, please reach out to me. Data Protection under the GDPR For past few months, I’ve been helping to org...
Posted By : Thomas152 | 1 comments
I predict that on 1 July 2018, I will be calmly eating a barbecue sandwich, talking with friends and possibly, I will burn a copy of the RFC2246: TLS version 1.0 standard for entertainment value.  Those will less effective Vendor, Network, Systems, Applic...
Posted By : Don Turnblade | 0 comments
https://www.linkedin.com/learning/it-security-careers-and-certifications-first-steps?trk=voyager_feed_cymbii_learning
Posted By : TafadzwaPadare | 1 comments