Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Risk Management

Welcome to the Risk Management topic!

Collaborate, contribute, consume and create knowledge around topics such as Risk Management, Risk Governance, Risk Profile, Governance Risk & Compliance (GRC), & CRISC.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
2699 Members
6 Online
25047 Visits

Community Leader

Brian Barnier

Brian Barnier

Badge: Energizer

Mohamed Tawfik

Mohamed Tawfik

Title: Financial Controller Sector - General Manager

Points: 294

Badge: Lively

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 189 total

Must be a Topic member to contribute
View All »
Is bitcoin a bubble or something to stay for long time? If bitcoin is bubble, when it will burst? Have your say in poll I created on Twitter.  Follow this link:https://twitter.com/DPleskonjic/status/939420646269947911. Thanks
Dragan Pleskonjic | 12/10/2017 9:51:42 AM | COMMENTS(0)
Hi members, I institutionalized a Risk Mgmt Comittee in my organization. The comittee is made up of our COO, CIO, Director of Risk and Compliance and a few others. We will meet quarterly. I am wondering if any of you could share some non confidential meet...
danic1979 | 12/9/2017 3:46:26 AM | COMMENTS(2)
I also posted this question in Service Management but have not heard anything yet. My team runs Risk and Compliance efforts.  We had moved to JIRA to run one program as a "project" and sending out "issues" to assignees for them to either answer audit que...
AgVball | 9/6/2017 7:12:13 AM | COMMENTS(4)
We are about to embark on a project to install a GRC solution.  Are there any existing checklists to help with requirements?  Did you use a consulting team to help you create your requirements and guide you through the process?
AgVball | 8/25/2017 5:45:12 AM | COMMENTS(26)
Please can people tell me which risk management frameworks and TOOLS do they use?I.e. NIST, COBIT etc. Thanks in advance
JayMIET927 | 8/24/2017 7:19:31 AM | COMMENTS(12)
Hello all, ISACA's content, such as Risk IT and COBIT are created primarily for you. Yet, wouldn't it be nice to have a way to engage more senior business and IT people? After I was part of the team that created Risk IT, I penned The Operational Ris...
Brian Barnier | 8/8/2017 5:12:55 AM | COMMENTS(3)

Documents & Publications: 67 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 1351 days ago
Books
Posted by ISACA 644 days ago
Books
Posted by ISACA 749 days ago
Books
Posted by ISACA 759 days ago

Events & Online Learning: 9 total

16 Mar 2015
ISACA International Event
Orlando, FL, USA
1 Aug 2016
ISACA International Event
Chicago, IL, USA
16 Aug 2017
ISACA International Event
Grapevine, Texas, US
2018 GRC Conference - 13-15 August , Nashville, TN. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 211 total

Volume 3, 2107
by Jayakumar Sundaram, CISA, ISO 27001 LA
The SoA is a continuously updated and controlled document that provides an overview of information security implementation.
Volume 6, 2106
by Venkatasubramanian Ramakrishnan, CISM, CRISC, CHFI
Bayesian networks can capture the complex interdependencies among risk factors and can effectively combine data with expert judgment.
Volume 6, 2017
by Robert Putrus, CISM, CFE, CMC, PE, PMP
This article presents a risk-based management approach to third-party data security risk and compliance through the development of a third-party risk register.
Volume 6, 2017
by Guy Pearce
The modern GRC landscape has a significant impact on how an enterprise-scale big data project would be undertaken today.
Volume 6, 2017
by Sandra Herrygers, Gaurav Kumar and Jeff Schaeffer
According to research from IBM Security and the Ponemon Institute, the average total cost per company, per event of a data breach is US $3.62 million.
Volume 6, 2017
by Ability Takuva, CISA
In enterprise risk management, three lines of defense have been defined with separate responsibilities that enable effective risk management against any threat.

Wikis: 2 total

Blog Posts: 137 total

Globally, many organizations are spending millions of dollars protecting their businesses and its enabling infrastructure, but are they really secure? We shall discuss answer to this question in a little while. We need to understand core basics before we ...
Posted By : SudireddyRamreddy | 1 comments
Hello fellow members COBIT 5 is an excellent guide to developing ICT Governance Frameworks. Many organisations have well documented Frameworks but find it challenging when it comes to implementation. The objective of this post is to start a debate o...
Posted By : Thansen Singh | 1 comments
Information Security and Privacy is hot issue at present time. Number of security breaches is rapidly increasing.  In case of late detection, costs of breaches are skyrocketing. In the same time Artificial Intelligence (AI), Machine Learning (ML) are fast...
Posted By : Dragan Pleskonjic | 0 comments
Is it possible to use crowd-sourced security intelligence to predict future events? For this exercise, experimental web site Security Predictions http://securitypredictions.xyz/ has been built to harness the ‘wisdom of crowds’....
Posted By : Dragan Pleskonjic | 0 comments
30 Nov 2017
I predict that on 1 July 2018, I will be calmly eating a barbecuesandwich, talking with friends and possibly, I will burn a copy of the RFC2246: TLS version 1.0 standard for entertainment value.  Those will lesseffective Vendor, Network, Systems, Applicat...
Posted By : Don Turnblade | 0 comments
My previous blog under name "Dragan on Security" was at location: http://conwex.info/blog/. It was active from August 28, 2005 to October 3, 2012. By beginning of 2017 it is moved to new location http://www.dragan-pleskonjic.com/blog/. With possibility to...
Posted By : Dragan Pleskonjic | 0 comments