Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Security Trends

Welcome to the Security Trends topic!

Collaborate, contribute, consume and create knowledge about today’s top security trends, help to identify security issues that are relevant and emerging as well as issues that need more guidance.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
692 Members
2 Online
8639 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 73 total

Must be a Topic member to contribute
View All »
Is it possible to use crowd-sourced security intelligence to predict future events? For this exercise, experimental web site Security Predictions http://securitypredictions.xyz/ has been built to harness the ‘wisdom of crowds’.  As first experiment, let's...
Dragan Pleskonjic | 11/30/2017 1:00:42 PM | COMMENTS(4)
Should we trust analysts’ reports and predictions? If yes,which one, especially in regard to security related trends?
Dragan Pleskonjic | 11/29/2017 3:09:14 PM | COMMENTS(0)
Is it possible to conduct a software integrity checks on in-scope components upon start-up or at least once per day? Is there any tools available? Can we do it manually?
Chris Sivaprakash Kumanan | 10/26/2017 12:32:35 PM | COMMENTS(2)
CyberSecurity 11 Essential practices • Governance• Risk Management• Compliance Management• Vulnerability Management• Communication  Management• Awareness Training• Access and Identity• Asset Management• Document Control• Records Management• Internal /Exte...
Mark E.S. Bernard | 7/6/2017 12:24:06 PM | COMMENTS(3)
Hi, Recently I am carrying out a research on ISMS standards and frameworks. The primary aim of my research is to explore the factors influencing the adoption of Information Security Management Systems (ISMS) standards and frameworks. I would like to invi...
KAI720 | 6/29/2017 4:11:28 AM | COMMENTS(2)
There are many cybersecurity frameworks; from NIST CSF to ISO 27001 and CobIT, etc. I am trying to get a poll of what framework other companies are implementing /have implemented.  I believe if we answer the following questions(my answers are immediately ...
rbrenis | 6/27/2017 12:13:00 PM | COMMENTS(0)

Documents & Publications: 33 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 645 days ago
Books
Posted by ISACA 812 days ago
Posted by ISACA 898 days ago

Events & Online Learning: 4 total

Journal Articles: 16 total

Volume 4, 2017
by Sudhakar Sathiyamurthy, CISA, CRISC, CGEIT, CIPP, ITIL Expert
The trustworthiness of various risk assessment methods in pursuit of risk-based decisions is largely questioned in the marketplace.
Volume 3, 2017
by Danelle Au
Asymmetric warfare is “the application of dissimilar strategies, tactics, capabilities and approaches used to circumvent or negate an opponent’s strengths while exploiting his weaknesses.”
Volume 3, 2017
by Steven J. Ross, CISA, CISSP, MBCP
At each stage in the evolution of information security, there has been a problem—access control, viruses, hackers, data leakage, to name a few—that has seemed insuperable.
Volume 4, 2016
by Daniel Schatz, CISM, CCSK, CISSP, CSyP, CVSE, ISO 27001 LA/LI, MCITP-EA
The topic of information security has evolved to one of the top concerns among policymakers and corporations. Leaders demand answers from their support structures as to how such risk can be effectively managed.
Volume 3, 2016
by Kerry A. Anderson, CISA, CISM, CGEIT, CRISC, CCSK, CFE, CISSP, CSSLP, ISSAP, ISSMP
While mobile devices have enhanced productivity, these devices compete for limited attention span and may make it more difficult to gain sufficient attention for security awareness.
Volume 2, 2016
by Henry Santiago
From January to 9 April 2015, the number of attacks on debit cards used at automated teller machines (ATMs) reached the highest level for that time frame in the last 20 years.

Wikis: 3 total

Blog Posts: 8 total

Is bitcoin a bubble or something to stay for long time? If bitcoin is bubble, when it will burst? Have your say in poll I created on Twitter.  Follow this link:https://twitter.com/DPleskonjic/status/939420646269947911. Thanks.
Posted By : Dragan Pleskonjic | 1 comments
Information Security and Privacy is hot issue at present time. Number of security breaches is rapidly increasing.  In case of late detection, costs of breaches are skyrocketing. In the same time Artificial Intelligence (AI), Machine Learning (ML) are fast...
Posted By : Dragan Pleskonjic | 0 comments
Is it possible to use crowd-sourced security intelligence to predict future events? For this exercise, experimental web site Security Predictions http://securitypredictions.xyz/ has been built to harness the ‘wisdom of crowds’....
Posted By : Dragan Pleskonjic | 0 comments
My previous blog under name "Dragan on Security" was at location: http://conwex.info/blog/. It was active from August 28, 2005 to October 3, 2012. By beginning of 2017 it is moved to new location http://www.dragan-pleskonjic.com/blog/. With possibility to...
Posted By : Dragan Pleskonjic | 0 comments
The PCI Council has announced some new information on the upcoming version of PCI - Version 3.2.  Find out the latest here: http:/www.lbmcinformationsecurity.com/blog
Posted By : Stewart141 | 1 comments
Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments