Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Cloud Computing

Welcome to the Cloud Computing!

Collaborate, contribute, consume and create knowledge around cloud computing topics such as data security, virtualization, authentication, and vendor selection.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1541 Members
2 Online
15473 Visits

Community Leader

Marc Vael

Marc Vael

Title: Chief Information Security Officer

Badge: Energizer


 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 98 total

Must be a Topic member to contribute
View All »
Greetings to All, I wish to move into Cloud Computing eventually ending up in the Security/Architecture area. This is not work related at this stage. It is at my own pace,for my personal self - development. My question to you is what is the most concise...
MAnjay | 11/13/2017 6:13:12 AM | COMMENTS(7)
Traditional means of full packet capture using span ports is not possible on AWS. My colleague found this paper on SANS Web site: https://www.sans.org/reading-room/whitepapers/detection/packet-capture-aws-37905. It says (citation): "Companies using AW...
Dragan Pleskonjic | 11/10/2017 5:25:55 AM | COMMENTS(0)
I would like to know thoughts from members using Barracuda Essentials for Office 365. Thanks in advance
DK19 | 11/2/2017 6:03:48 AM | COMMENTS(0)
Good day! I have some thoughts about the feasibility of Cloud Computing audit. Certain controls required auditor to review the SLAs So what if certain clause is not in their SLA. It's too late to change the SLA isn't it. Highlighting the issue is one thin...
Danny Soh | 5/24/2017 10:45:28 AM | COMMENTS(4)
what is the difference between Private, Public and Hybrid cloud? explain with examples.
Ramakrishna593 | 2/22/2017 9:29:52 PM | COMMENTS(5)
Good framework to manage Cloud data and thereby build security policies around it - https://www.securosis.com/blog/data-security-lifecycle-2.0
Shamik | 2/22/2017 5:38:03 AM | COMMENTS(3)

Documents & Publications: 79 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 1541 days ago
Posted by ISACA 790 days ago
Posted by ISACA 878 days ago
Posted by ISACA 883 days ago

Events & Online Learning: 3 total

16 Aug 2017
ISACA International Event
Grapevine, Texas, US
2018 GRC Conference - 13-15 August , Nashville, TN. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 62 total

Volume 5, 2017
by Steven J. Ross, CISA, CISSP, MBCP
This is the dawn of the multi-modal era; data center staff must adjust or be left behind. And so must security professionals.
Volume 5, 2017
by Vasant Raval, DBA, CISA, ACMA, and Don Lux, MSITM
Cloud services have grown dramatically in the recent past and continue to increase in popularity. Between 2015 and 2020, cloud computing is predicted to achieve an annual growth rate of 19 percent.
Volume 3, 2017
by ISACA | Reviewed by Diana Hamono
The book is a useful resource for managers in all parts of an organization that is considering transitioning some, or all, of its current IT services onto cloud-based services and who want to understand the security implications of doing so.
Volume 3, 2017
by ISACA | Reviewed by Diana M. Hamono, CISA, CGEIT, COBIT 5 Foundation
This book is a useful resource for those involved in establishing a secure cloud computing environment in their organization.
Volume 3, 2017
by Sunil Bakshi, CISA, CRISC, CISM, CGEIT, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP
What are threats associated with the use of the Internet of Things (IoT) and what approach should one have in implementing security for IoT?
Volume 3, 2017
by Steven J. Ross, CISA, CISSP, MBCP
At each stage in the evolution of information security, there has been a problem—access control, viruses, hackers, data leakage, to name a few—that has seemed insuperable.

Wikis: 5 total

Blog Posts: 12 total

Let us have positive inspirational slogans for every situation. Last week I started the project meeting like this: I don't know you are all so good at tuning the website. The performance is now is wonderful. I could witness reduction of stress, anxiety an...
Posted By : Jayakumar Sundaram | 1 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
13 Nov 2014
Posted By : masarker | 4 comments
Do you consider moving into the cloud? Cloud customers need assurance that providers are following sound security practices. The importance of the governance and risk management issues related with the move of assets into the cloud computing should be cle...
Posted By : Patrick Soenen | 0 comments
Private, public, community or hybrid cloud computing enables an enterprises’ IT enabled investments to meet business stakeholder requirements, sustain and extend enterprise strategy, create sustainable competitive advantages (unique selling plusses), meas...
Just curious to know or have some insight for Cloud Computing and how does it align with ISACA stanadards.
Posted By : Phani Sastry | 0 comments