Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Security Trends

Welcome to the Security Trends topic!

Collaborate, contribute, consume and create knowledge about today’s top security trends, help to identify security issues that are relevant and emerging as well as issues that need more guidance.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
722 Members
0 Online
0 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 73 total

Must be a Topic member to contribute
View All »
Is it possible to use crowd-sourced security intelligence to predict future events? For this exercise, experimental web site Security Predictions has been built to harness the ‘wisdom of crowds’.  As first experiment, let's...
Dragan Pleskonjic | 1/14/2018 5:49:48 AM | COMMENTS(6)
Should we trust analysts’ reports and predictions? If yes,which one, especially in regard to security related trends?
Dragan Pleskonjic | 1/13/2018 1:23:24 AM | COMMENTS(0)
Is it possible to conduct a software integrity checks on in-scope components upon start-up or at least once per day? Is there any tools available? Can we do it manually?
Chris Sivaprakash Kumanan | 10/26/2017 12:32:35 PM | COMMENTS(2)
CyberSecurity 11 Essential practices • Governance• Risk Management• Compliance Management• Vulnerability Management• Communication  Management• Awareness Training• Access and Identity• Asset Management• Document Control• Records Management• Internal /Exte...
Mark E.S. Bernard | 7/6/2017 12:24:06 PM | COMMENTS(3)
Hi, Recently I am carrying out a research on ISMS standards and frameworks. The primary aim of my research is to explore the factors influencing the adoption of Information Security Management Systems (ISMS) standards and frameworks. I would like to invi...
KAI720 | 6/29/2017 4:11:28 AM | COMMENTS(2)
There are many cybersecurity frameworks; from NIST CSF to ISO 27001 and CobIT, etc. I am trying to get a poll of what framework other companies are implementing /have implemented.  I believe if we answer the following questions(my answers are immediately ...
rbrenis | 6/27/2017 12:13:00 PM | COMMENTS(0)

Documents & Publications: 31 total

Must be a Topic member to contribute
View All »
Posted by ISACA 837 days ago
Posted by ISACA 1003 days ago
Posted by ISACA 1089 days ago

Events & Online Learning: 6 total

Journal Articles: 18 total

Volume 3, 2018
by Ed Moyle
When people hear the term “cyberwarfare,” there are a few things that come to mind. The things people visualize tend to be the high-impact, “scare the pants off you” scenarios such as...
Volume 6, 2017
by Mike Kuzminski, CISM, CISSP
In today’s always-connected world, the concept of device connectivity, the Internet of Things (IoT), has already solidified.
Volume 4, 2017
by Sudhakar Sathiyamurthy, CISA, CRISC, CGEIT, CIPP, ITIL Expert
The trustworthiness of various risk assessment methods in pursuit of risk-based decisions is largely questioned in the marketplace.
Volume 3, 2017
by Steven J. Ross, CISA, CISSP, MBCP
At each stage in the evolution of information security, there has been a problem—access control, viruses, hackers, data leakage, to name a few—that has seemed insuperable.
Volume 3, 2017
by Danelle Au
Asymmetric warfare is “the application of dissimilar strategies, tactics, capabilities and approaches used to circumvent or negate an opponent’s strengths while exploiting his weaknesses.”
Volume 4, 2016
by Daniel Schatz, CISM, CCSK, CISSP, CSyP, CVSE, ISO 27001 LA/LI, MCITP-EA
The topic of information security has evolved to one of the top concerns among policymakers and corporations. Leaders demand answers from their support structures as to how such risk can be effectively managed.

Wikis: 3 total

Blog Posts: 9 total

Have you experienced ransomware attack so far and, if yes, what did you do to resolve? I set up Twitter poll here: It lasts for seven days. Thank you for taking part in the poll.
Posted By : Dragan Pleskonjic | 5 comments
Is bitcoin a bubble or something to stay for long time? If bitcoin is bubble, when it will burst? Have your say in poll I created on Twitter.  Follow this link: Thanks.
Posted By : Dragan Pleskonjic | 3 comments
16 Jan 2018
Is it possible to use crowd-sourced security intelligence to predict future events? For this exercise, experimental web site Security Predictions has been built to harness the ‘wisdom of crowds’....
Posted By : Dragan Pleskonjic | 3 comments
Information Security and Privacy is hot issue at present time. Number of security breaches is rapidly increasing.  In case of late detection, costs of breaches are skyrocketing. In the same time Artificial Intelligence (AI), Machine Learning (ML) are fast...
Posted By : Dragan Pleskonjic | 0 comments
My previous blog under name "Dragan on Security" was at location: It was active from August 28, 2005 to October 3, 2012. By beginning of 2017 it is moved to new location With possibility to...
Posted By : Dragan Pleskonjic | 0 comments
The PCI Council has announced some new information on the upcoming version of PCI - Version 3.2.  Find out the latest here: http:/
Posted By : Stewart141 | 1 comments