Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Cloud Computing

Welcome to the Cloud Computing!

Collaborate, contribute, consume and create knowledge around cloud computing topics such as data security, virtualization, authentication, and vendor selection.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1523 Members
0 Online
0 Visits

Community Leader

Marc Vael

Marc Vael

Title: Chief Audit Executive


 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 95 total

Must be a Topic member to contribute
View All »
Good day! I have some thoughts about the feasibility of Cloud Computing audit. Certain controls required auditor to review the SLAs So what if certain clause is not in their SLA. It's too late to change the SLA isn't it. Highlighting the issue is one thin...
Danny Soh | 5/24/2017 10:45:28 AM | COMMENTS(4)
what is the difference between Private, Public and Hybrid cloud? explain with examples.
Ramakrishna593 | 2/22/2017 9:29:52 PM | COMMENTS(5)
Good framework to manage Cloud data and thereby build security policies around it - https://www.securosis.com/blog/data-security-lifecycle-2.0
Shamik | 2/22/2017 5:38:03 AM | COMMENTS(3)
Pretty comprehensive database : https://paasfinder.org/filter Wish there were similar websites for IssS and SaaS.
Shamik | 1/25/2017 7:09:32 PM | COMMENTS(1)
To control cost, organization ( esp. small ones ) are actively considering hosting in Public Cloud.   Useful article on this topic - http://www.cloud-council.org/deliverables/migrating-applications-to-public-cloud-services-roadmap-for-success.htm
Shamik | 12/8/2016 10:08:48 AM | COMMENTS(0)
Considering IoTs will increase by billions and thereby increase security risks, a good way to mitigate it is a Sound Cloud Architecture for IoTs.  Check out - http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-iot.htm
Shamik | 12/8/2016 10:05:33 AM | COMMENTS(0)

Documents & Publications: 79 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 1447 days ago
Posted by ISACA 696 days ago
Posted by ISACA 784 days ago
Posted by ISACA 789 days ago

Events & Online Learning: 7 total

21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.
16 Aug 2017
ISACA International Event
Grapevine, Texas, US
2017 GRC Conference - 16-18 August , Grapevine, TX. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 60 total

Volume 3, 2017
by ISACA | Reviewed by Diana Hamono
The book is a useful resource for managers in all parts of an organization that is considering transitioning some, or all, of its current IT services onto cloud-based services and who want to understand the security implications of doing so.
Volume 3, 2017
by ISACA | Reviewed by Diana M. Hamono, CISA, CGEIT, COBIT 5 Foundation
This book is a useful resource for those involved in establishing a secure cloud computing environment in their organization.
Volume 3, 2017
by Sunil Bakshi, CISA, CRISC, CISM, CGEIT, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP
What are threats associated with the use of the Internet of Things (IoT) and what approach should one have in implementing security for IoT?
Volume 3, 2017
by Steven J. Ross, CISA, CISSP, MBCP
At each stage in the evolution of information security, there has been a problem—access control, viruses, hackers, data leakage, to name a few—that has seemed insuperable.
Volume 2, 2017
by Awais Ahmed, CISA, CIA
In addition to broadband services, developing countries are also embracing innovations such as cloud computing to improve business and service deliveries in different areas.
Volume 1, 2017
by Cheryl Ritts, MSIS
Many enterprises are quick to leap into cloud relationships. Very often, they do so without any analysis—formal or informal—of the value they expect to get in return.

Wikis: 5 total

Blog Posts: 12 total

Let us have positive inspirational slogans for every situation. Last week I started the project meeting like this: I don't know you are all so good at tuning the website. The performance is now is wonderful. I could witness reduction of stress, anxiety an...
Posted By : Jayakumar Sundaram | 1 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
13 Nov 2014
Posted By : masarker | 4 comments
Do you consider moving into the cloud? Cloud customers need assurance that providers are following sound security practices. The importance of the governance and risk management issues related with the move of assets into the cloud computing should be cle...
Posted By : Patrick Soenen | 0 comments
Private, public, community or hybrid cloud computing enables an enterprises’ IT enabled investments to meet business stakeholder requirements, sustain and extend enterprise strategy, create sustainable competitive advantages (unique selling plusses), meas...
Just curious to know or have some insight for Cloud Computing and how does it align with ISACA stanadards.
Posted By : Phani Sastry | 0 comments