www.archive-org-2013.com » ORG » I » ISACA

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".

    Archived pages: 1106 . Archive date: 2013-10.

  • Title: Information Technology - Information Security – Information Assurance | ISACA
    Descriptive info: .. ISACA: Serving IT Governance Professionals.. English.. Chinese.. (Simplified).. (Traditional).. Deutsch.. Espanol.. Francais.. Hebrew.. Italiano.. Japanese.. Korean.. Nederlands.. Polski.. Portuguese.. People.. Site Content.. Conversations.. Advanced Search.. ABOUT.. Membership.. CERTIFICATION.. Education.. COBIT.. Knowledge Center.. Journal.. Bookstore.. History.. What We Offer Whom We Serve.. @ISACA Newsletter.. Licensing and Promotion.. ISACA TV.. Press Room.. Volunteering.. Strategy.. IT Governance.. Institute.. Contact Us.. Professional Membership.. Student Membership.. Academic Membership.. Local Chapter Information.. Join Today.. Professional Growth.. Global Community.. Advance Your Career.. What is CISA.. What is CISM.. What is CGEIT.. What is CRISC.. Benefits of CISA.. Benefits of CISM.. Benefits of CGEIT.. Benefits of CRISC.. How to Become.. Certified.. Register for the.. Exam.. Register for the.. Prepare for the Exam.. Taking the Exam.. Apply for Certification.. Maintain Your CISA.. Maintain Your CISM.. Maintain Your CGEIT.. Maintain Your CRISC.. Why Certify.. How to Earn CPE.. Maintain Your Certification.. Write an Exam Question.. US DoD Information.. Exam Registration.. CONFERENCES.. TRAINING.. ONLINE LEARNING.. North America CACS.. Training Week.. Webinars.. North America ISRM.. eLearning Campus.. Virtual Conferences.. EuroCACS / ISRM.. On-Site Training.. Governance, Risk and Control.. Exam Review Courses.. COBIT EDUCATION.. Latin America CACS / ISRM.. Oceania CACS.. Asia-Pacific CACS / ISRM.. INSIGHTS.. Call for Papers.. Browse All Events.. Exhibitors and Sponsors.. COBIT 5 Home.. Product Family.. Training Accreditation.. Licensing.. Join the Conversation.. News.. Recognition.. FAQs.. Browse Knowledge Center topics.. Where networking and knowledge intersect.. BMIS.. (Information Security).. COBIT 5.. |.. COBIT 4.. 1.. ITAF.. (IS Assurance\Audit).. Research.. (Deliverables\Projects).. Risk IT.. (IT Risk Management).. Standards.. (Assurance\Audit\Control).. Val IT.. (Value Delivery).. Featured Resources.. Academia.. Glossary.. eLibrary.. Career Centre.. Legislative Reporting.. Current Issue.. Past Issues.. JOnline.. Author Blog.. CPE Quizzes.. Submit an Article.. Advertise.. COBIT 5 for Risk.. Reverse Deception: Organized Cyber Threat Counter Exploitation.. Search.. Top Sellers.. Security, Audit and Control Features SAP ERP, 3rd Edition.. Wireless Network Security A Beginner's Guide.. CISA Review Manual 2013.. Securing Mobile Devices Using COBIT 5  ...   Boston.. 24-24 Oct 2013.. Webinar: Database Security Leaders v.. Laggards: 2013 IOUG Security Survey.. 21-24 Oct 2013.. Information Security Essentials for IT Auditors-Phoenix.. 7-7 Nov 2013.. Webinar: Five Essential Security and Risk Management Questions to Ask Your Cloud Provider.. 6-8 Nov 2013.. North America ISRM 2013.. More.. Featured Research.. Advanced Persistent Threats: How To Manage The Risk To Your Business.. Configuration Management Using COBIT 5.. Privacy and Big Data.. ITAF: A Professional Practices Framework for IS Audit/Assurance, 2nd Edition.. ISACA Now Blog.. 11 Oct 2013.. How to handle legacy data in an SAP environment.. Many companies have older legacy SAP systems for audit compliance, review and reporting purposes.. 9 Oct 2013.. New Chapter Welcome—Lusaka.. In late August, ISACA welcomed a new chapter—Lusaka—to the association.. With about 100 members, t.. 4 Oct 2013.. Terms and Conditions May Apply.. Even in the midst of Cybersecurity Month, many web users click the AGREE button at the bottom of.. ISACA's Knowledge Center is a networking venue for IT professionals to share common interests.. Converstation.. Build new understanding through collaboration.. PDF-med.. Consume information in the form of hundreds of documents and publications ready to download.. Meet-up.. Connect with colleagues, exchange expertise and engage in Wikis.. Follow us:.. ISACA is.. Membership.. Join a global network of peers, and save on exams, education and books.. Find a Local Chapter.. Volunteer.. Certification.. Earn certification and enhance your professional credibility.. Learn More.. |.. Register for an Exam.. Earn CPE.. The framework for governance and management of enterprise IT.. Download Now.. Discuss.. Online events, conferences, training courses, exam review courses.. View Events.. Online Events.. Sponsorship.. Knowledge Research.. Communities and research publications centered around a wide range of professional topics.. Community.. Visit ISACA TV.. to see what members and leaders are saying.. What goes here?.. 2013 ISACA.. All Rights Reserved.. Site Map.. Terms of Use.. ISACA PRIVACY POLICY – YOUR PRIVACY RIGHTS.. IP Guidelines..

    Original link path: /Pages/default.aspx
    Open archive

  • Title: About ISACA
    Descriptive info: About ISACA.. About ISACA.. As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems.. Previously known as the.. Information Systems Audit and Control Association.. , ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.. IT Governance Institute.. Corporate Social Responsibility Program.. Follow us:.. ISACA was incorporated in 1969 by a small group of individuals who recognized a need for a centralized source of information and guidance in the growing field of auditing controls for computer systems.. Today, ISACA has more than 110,000 constituents worldwide.. View ISACA Fact Sheet.. ISACA provides practical guidance, benchmarks and other effective tools for all enterprises that use information systems.. Through its comprehensive guidance and services, ISACA defines the roles of information systems governance, security, audit and assurance professionals worldwide.. The COBIT, Val IT and Risk IT governance frameworks and the CISA, CISM, CGEIT and CRISC certifications are ISACA brands respected and used by these professionals for the benefit of their enterprises.. ISACA’s greatest asset is its members, and those  ...   work carried out by the ITGI, ISACA addresses the topic through a regular column in, and occasional dedicated issues of, the.. ISACA Journal.. , conference sessions and tracks, and education courses.. @ISACA.. was launched in January 2010 to provide timely information about ISACA, new and updated ISACA offerings, and relevant industry news.. is delivered biweekly via e-mail with full articles housed on the ISACA web site.. ISACA’s press room is a center for news, news releases (including archives), background information, media contacts and instances of ISACA featured in other media.. Additional information and select news releases are also available in 11 languages besides English.. ISACA welcomes your questions and comments.. Please use our web form, providing as much detail as possible, to contact us.. You may also contact ISACA by phone or fax.. Edit.. Quick Links.. I want to.. My Bookmarks.. Saved Searches.. Access press releases and fact sheets.. Learn about ISACA.. Learn about licensing and promotion.. Subscribe to @ISACA.. View ISACA boards and committees.. Visit the IT Governance Institute.. Please.. Login.. to View Your Quick Links.. Videos.. Membership Benefits Today.. Community and Leadership Testimonials.. More »..

    Original link path: /about-isaca/Pages/default.aspx
    Open archive

  • Title: Information Systems - Information Technology - Membership | ISACA
    Descriptive info: Membership for IT Professionals, Students and Educators.. With 110,000 constituents in 180 countries,.. ISACA is internationally recognized as a high-performing organization that addresses global, national and local information systems and business issues.. Membership FAQs.. Code of Professional Ethics.. Member Levels.. Member Get a Member.. Member Tutorials.. For Individuals interested in or employed in IT audit, information security risk and IT governance fields, ISACA professional membership equips you with the resources, training and education you need to expand your professional development opportunities.. learn more.. join now.. Student Membership.. Student membership is for individuals currently enrolled full-time in accredited undergraduate and graduate programs.. Learn about student qualifications to join.. Become a Student Member and connect with industry leaders who can help you reach your career goals.. Academic Advocate  ...   areas.. Become an Academic Advocate and give your students a competitive advantage as you contribute to growing the profession.. Participate in your local chapter where like-minded people get together to network and share ideas.. ISACA has more than 190 worldwide chapters, each offering unique opportunities to share professional expertise from diverse business communities.. Join Now.. Explore the many benefits of ISACA membership with globally recognized certifications, highly relevant research publications and an active worldwide community of IT and business professionals.. Become a member.. Explore certification opportunities.. How to volunteer.. Learn about member levels.. Learn about student membership.. Understand the value of membership.. View member benefits.. Already A Member?.. Access MY ISACA to confirm your renewal status.. confirm member status.. Experience ISACA:.. My ISACA Tutorial.. Watch Now..

    Original link path: /membership/Pages/default.aspx
    Open archive
  •  

  • Title: IT Certification - Audit - Security - Governance - Risk | ISACA
    Descriptive info: ISACA Certification: IT Audit, Security, Governance and Risk.. Earn an ISACA certification and enhance your professional credibility.. A CISA, CISM, CGEIT or CRISC after your name confirms to employers that you possess the experience and knowledge to meet the challenges of the modern enterprise.. Certification.. Why Certify?.. CISA: Certified Information Systems Auditor.. CISM: Certified Information Security Manager.. CGEIT: Certified in the Governance of Enterprise IT.. CRISC: Certified in Risk and Information Systems Control.. How to Report and Earn CPE.. Exam Locations.. Member Savings.. CPE Reporting FAQs.. Get recognized as an expert in your profession.. With a globally recognized ISACA certification, you hold the power to move ahead in your career, increase your earning potential and add value to any enterprise.. ISACA offers the following certifications:.. Certified Information Systems Auditor.. (CISA).. The.. CISA.. certification is world-renowned as the.. standard of achievement for those who audit, control, monitor and assess an organization’s information technology and business systems.. The recent quarterly.. IT Skills and Certifications Pay Index.. (ITSCPI) from Foote Partners ranked CISA among the most sought-after and highest-paying IT certifications.. Certified Information Security Manager.. (CISM).. The management-focused.. CISM.. is the globally.. accepted standard for individuals who design,.. build and manage enterprise information security.. programs.. CISM is the leading credential for.. information security managers.. (ITSCPI) from Foote Partners ranked CISM among the most  ...   the business.. IT Skills.. and Certifications Pay Index.. (ITSCPI) from Foote Partners.. ranked CRISC among the most sought-after.. Play CRISC Certification Video.. CRISC Certification Video.. Maintain your certification.. by participating in continuing professional education programs.. Each certification is governed by a board that sets policy to ensure that each member maintains an adequate level of current knowledge and proficiency in their respected field.. ISACA is focused on the continual growth and success of our certification programs.. To achieve constant relevance, ISACA elicits the support of practitioners from around the world to help.. write questions for the certification exams and review materials.. As an item writer, you’ll have the opportunity to earn CPE hours and honorariums.. 2013 ISACA Certification Exam Brochure.. (1.. 1M).. ROI for Your Enterprise Through ISACA Certification.. (158K).. For information on ISACA’s hardship exam fee program, email.. certification@isaca.. org.. Earn CPE credits.. Write an exam question.. ISACA Certification News.. ISACA addresses security skills deficit.. InfoWorld article: CGEIT and CISM are among highest-paying certs.. CGEIT and CISM are among highest-paying certs.. CRISC wins SC Magazine Award for Best Professional Certification Program.. Eight Emerging IT Certifications For 2013.. Verify a Certification.. Certification Type:.. Choose one.. CISM.. Certification Number:.. Last/Family Name:.. Submit.. Announcing.. COBIT 5 Certified Assessor Program.. Take your mastery of COBIT to a high level.. The Value of ISACA Credentials..

    Original link path: /CERTIFICATION/Pages/default.aspx
    Open archive

  • Title: IT Training - Information Assurance Conferences - IT Audit Seminars | ISACA
    Descriptive info: IT Professional Education, Conferences and Training.. Take your career to a higher level.. The best place to get direction is from people who have been in your place.. That’s why ISACA offers educational events that meet the needs of all IT professionals.. Education.. Conferences.. Online Learning.. Training.. COBIT Education.. Sponsorship and Exhibit Opportunities.. Call for Papers.. With the flexibility of online learning, you can continue your professional education at a time convenient to you.. Choose from a variety of online courses, including preparation for certification exams and COBIT training.. Plus, participate in virtual conferences and webinars.. Conferences Training Week.. ISACA is dedicated to offering the most dynamic and inclusive conferences and Training Weeks.. These exciting events, held around the world, keep you abreast of the latest advances in the IT profession and provide valuable networking opportunities.. ISACA conferences are where new technology and practical application converge.. Check often for event announcements.. More About Conferences.. More About Training Week.. At the rate technology moves, even the most seasoned IT professionals need training to remain current.. ISACA provides a variety of COBIT training options designed to give you the skills you need to ensure IT is effectively aligned with your business  ...   Choose the topic, location and course length, and benefit from one-on-one customer service from a member of the ISACA staff.. Exhibitor Sponsorship Opportunities.. At ISACA conferences, IT audit/assurance, governance, control, and security professionals converge to meet with exhibitors and sponsors at Exhibitor Educational Sessions, exhibition halls, meal events and other opportunities.. ISACA is always looking for new and innovative presentations.. If you would like to present at any of the upcoming conferences, you will need to submit a Session Proposal Form.. Check back often to see what new opportunities are available.. Find COBIT educational opportunities.. Find sponsor and exhibit opportunities.. Register for INSIGHTS.. Register for the next Webinar.. Educational Events.. 11-14 Nov 2013.. Taking the Next Step: Advancing Your IT Auditing Skills-Dallas.. 7-8 Dec 2013.. CISA Exam Cram Course.. 9-12 Dec 2013.. Training Week Las Vegas.. Network Security Auditing-Houston.. 3-6 Feb 2014.. An Introduction to Privacy and Data Protection-Las Angeles.. 17-20 Mar 2014.. 14-17 Apr 2014.. Cloud Computing: Seeing through the Clouds - What the IT Auditor Needs to Know-Houston.. 21-24 Apr 2014.. Information Security Essentials for IT Auditors-NYC.. 5-8 May 2014.. Healthcare Information Technology-San-Diego.. 19-22 May 2014.. Taking the Next Step: Advancing Your IT Auditing Skills-Atlanta.. Free CPE Credits..

    Original link path: /Education/Pages/default.aspx
    Open archive

  • Title: COBIT 5 - A Business Framework for the Governance and Management of Enterprise IT | ISACA
    Descriptive info: COBIT 5: A Business Framework for the Governance and Management of Enterprise IT.. COBIT 5 is the latest edition of ISACA’s globally accepted framework,.. providing an end-to-end business view of the governance of enterprise IT that reflects the central role of information and technology in creating value for enterprises.. The principles, practices, analytical tools and models found in COBIT 5 embody thought leadership and guidance from business, IT and governance experts around the world.. PRODUCT.. FAMILY.. TRAINING.. ACCREDITATION.. LICENSING.. JOIN THE.. CONVERSATION.. NEWS.. Announcing COBIT 5 for Risk!.. Learn More.. Overview.. COBIT 5 is the only business framework for the governance and management of enterprise IT.. This evolutionary version incorporates the latest thinking in enterprise governance and management techniques, and provides globally accepted principles, practices, analytical tools and models to help increase the trust in, and value from, information systems.. COBIT 5 builds and expands on COBIT 4.. 1 by integrating other major frameworks, standards and resources, including ISACA’s Val IT and Risk IT, Information Technology Infrastructure Library (ITIL®) and related standards from the International Organization for Standardization (ISO).. Benefits.. COBIT 5 helps enterprises of all sizes:.. Maintain high-quality information to support business decisions.. Achieve strategic goals and realize business benefits through the effective and innovative use of IT.. Achieve operational excellence through reliable, efficient application of technology.. Maintain IT-related risk at an acceptable level.. Optimize the cost of IT services and technology.. Support compliance with relevant laws, regulations, contractual agreements and policies.. Webinar: A COBIT 5 Overview.. Webinar: 5 Essential Facts About COBIT.. COBIT Focus.. —Access the latest COBIT case studies; view the current issue or subscribe free.. Download COBIT 5 publications..  ...   or in the public sector, can benefit from COBIT 5.. Based on 5 Principles.. COBIT 5 is based on five key principles for governance and management of enterprise IT:.. Principle 1: Meeting Stakeholder Needs.. Principle 2: Covering the Enterprise End-to- End.. Principle 3: Applying a Single, Integrated Framework.. Principle 4: Enabling a Holistic Approach.. Principle 5: Separating Governance From Management.. Addresses 7 Enablers.. The COBIT 5 framework describes seven categories of enablers:.. Principles, policies and frameworks.. are the vehicle to translate the desired behavior into practical guidance for day-to-day management.. Processes.. describe an organized set of practices and activities to achieve certain objectives and produce a set of outputs in support of achieving overall IT-related goals.. Organizational structures.. are the key decision-making entities in an enterprise.. Culture, ethics and behavior.. of individuals and of the enterprise are very often underestimated as a success factor in governance and management activities.. Information.. is required for keeping the organization running and well governed, but at the operational level, information is very often the key product of the enterprise itself.. Services, infrastructure and applications.. include the infrastructure, technology and applications that provide the enterprise with information technology processing and services.. People, skills and competencies.. are required for successful completion of all activities, and for making correct decisions and taking corrective actions.. Looking for COBIT 4.. 1?.. 1 remains available for your continued use.. COBIT 5 consolidates and integrates the COBIT 4.. 1, Val IT 2.. 0 and Risk IT frameworks,.. and also draws significantly from the Business Model for Information Security (BMIS) and ITAF.. Learn More about COBIT 4.. Comparing COBIT 4.. 1.. with COBIT 5.. 0..

    Original link path: /cobit/pages/default.aspx
    Open archive

  • Title: Information Technology - Professional Networking - Knowledge Center | ISACA
    Descriptive info: IT Professional Networking and Knowledge Center.. Where.. networking and knowledge intersect.. ISACA's IT Professional Networking and Knowledge Center is a meeting place for IT professionals who share common professional interests.. Participants can consume information, exchange expertise and experience, and build new understanding through collaboration.. A wide range of disciplines and practices powers this global professional community, making it a truly unique and holistic resource.. Find Resources.. Connect.. with.. members.. on topics that interest you.. Featured Topics.. Browse Over 100 Topics.. Search Topics.. My Topics.. Young Professionals.. Big Data.. Risk Management.. Audit Tools and Techniques.. Privacy/Data Protection.. CyberSecurity.. Suggest a New Topic.. Sort by Category.. Sort Alphabetically.. 1 Controls Collaboration.. Applications.. Oracle.. Oracle E-Business Suite.. PeopleSoft.. SAP.. SharePoint.. Audit.. Audit Guidelines.. Audit Standards.. Business Processes.. Business Analytics/Intelligence.. Business Process Management.. Change Management.. Performance Measurement.. Project/Program/Portfolio Management (P3M).. Strategic Planning/Alignment.. Career Management.. Students.. Cloud Computing/Virtualization.. Cloud Computing.. Virtualization.. COBIT (4.. 1 and earlier) - Use it Effectively.. 1 and earlier) Implementation.. COBIT 5 - Implementation.. COBIT 5 - Use It Effectively.. Controls and Monitoring.. Application Controls.. Application Security.. Compliance.. Continuous Monitoring/Auditing.. Controls Monitoring.. Country.. India.. Databases.. Enterprise Data Management.. Oracle Database.. SQL Server.. Exam Communities.. CGEIT Exam Study Community 2013.. CISA Exam Study Community 2013.. CISM Exam Study Community 2013.. CRISC Exam Study Community 2013.. Fraud and Computer Crime.. Computer Crime.. Forensics.. Fraud.. Governance and Management.. Business Continuity-Disaster Recovery Planning.. Enterprise Architecture.. Governance of Enterprise IT.. Green IT.. Value Delivery.. Industry.. Casinos and Gambling.. Healthcare.. Information Security.. Access Control.. Identity Management.. Information Security Management.. Information Security Policies/Procedures.. Intrusion Prevention/Detection.. Network Security.. Physical Security.. Security Tools.. Security Trends.. IT Service Management.. Incident Management.. ITIL.. Service Management.. Mobile/Wireless.. Mobile Computing.. Wireless.. Operating Systems.. HP Non-Stop (Tandem).. OS/400.. Unix-like.. Windows.. z/OS-OS/390.. Regulations.. Basel.. HIPAA.. J-SOX.. PCI DSS.. Sarbanes-Oxley (SOX).. Solvency II.. Risk.. Risk Assessment.. IFRS.. ISAE 3402.. ISO/IEC 20000.. ISO/IEC 27000 Series.. ISO/IEC 38500.. Quality Standards.. XBRL.. Financial Reporting Compliance.. Frameworks.. AI - Acquire and Implement.. AI1.. 1 - Definition and Maintenance of Business Functional and Technical Requirements.. 2 - Risk Analysis Report.. 3 - Feasibility Study and Formulation of Alternative Courses of Action.. 4 - Requirements and Feasibility Decision and Approval.. AI2.. 1 - High-level Design.. 10 - Application Software Maintenance.. 2 - Detailed Design.. 3 - Application Control and Auditability.. 4 - Application Security and Availability.. 5 - Configuration and Implementation of Acquired Application Software.. 6 - Major Upgrades to Existing Systems.. 7 - Development of Application Software.. 8 - Software Quality Assurance.. 9 - Applications Requirements Management.. AI3.. 1 - Technological Infrastructure Acquisition Plan.. 2 - Infrastructure Resource Protection and Availability.. 3 - Infrastructure Maintenance.. 4 - Feasibility Test Environment.. AI4.. 1 - Planning for Operational Solutions.. 2 - Knowledge Transfer to Business Management.. 3 - Knowledge Transfer to End Users.. 4 - Knowledge Transfer to Operations and Support Staff.. AI5.. 1 Procurement Control.. 2 - Supplier Contract Management.. 3 - Supplier Selection.. 4 - IT Resources Acquisition.. AI6.. 1 - Change Standards and Procedures.. 2 - Impact Assessment, Prioritisation and Authorisation.. 3 - Emergency Changes.. 4 - Change Status Tracking and Reporting.. 5 - Change Closure and Documentation.. AI7.. 1 - Training.. 2 - Test Plan.. 3 - Implementation Plan.. 4 - Test Environment.. 5 - System and Data Conversion.. 6 - Testing of Changes.. 7 - Final Acceptance Test.. 8 - Promotion to Production.. 9 - Post-implementation Review.. PO - Plan and Organize.. PO1.. 1 - IT Value Management.. 2 - Business-IT Alignment.. 3 - Assessment of Current Capability and Performance.. 4 - IT Strategic Plan.. 5 - IT Tactical Plans.. 6 - IT Portfolio Management.. PO10.. 1 - Programme Management Framework.. 10 - Project Quality Plan.. 11 - Project Change Control.. 12 - Project Planning of Assurance Methods.. 13 - Project Performance Measurement, Reporting and Monitoring.. 14 - Project Closure.. 2 - Project Management Framework.. 3 - Project Management Approach.. 4 - Stakeholder Commitment.. 5 - Project Scope Statement.. 6 - Project Phase Initiation.. 7 - Integrated Project Plan.. 8 - Project Resources.. 9 - Project Risk Management.. PO2.. 1 - Enterprise Information Architecture Model.. 2 - Enterprise Data Dictionary and Data Syntax Rules.. 3 - Data Classification Scheme.. 4 - Integrity Management.. PO3.. 1 - Technological Direction Planning.. 2 - Technology Infrastructure Plan.. 3 - Monitor Future Trends and Regulations.. 4 - Technology Standards.. 5 - IT Architecture Board.. PO4.. 1 - IT Process Framework.. 10 - Supervision.. 11 - Segregation of Duties.. 12 - IT Staffing.. 13 - Key IT Personnel.. 14 - Contracted Staff Policies and Procedures.. 15 - Relationships.. 2 -  ...   - Monitor and Evaluate.. ME1.. 1 - Monitoring Approach.. 2 - Definition and Collection of Monitoring Data.. 3 - Monitoring Method.. 4 - Performance Assessment.. 5 - Board and Executive Reporting.. 6 - Remedial Actions.. ME2.. 1 - Monitoring of Internal Control Framework.. 2 - Supervisory Review.. 3 - Control Exceptions.. 4 - Control Self-assessment.. 5 - Assurance of Internal Control.. 6 - Internal Control at Third Parties.. 7 - Remedial Actions.. ME3.. 1 - Identification of External Legal, Regulatory and Contractual Compliance Requirements.. 2 - Optimisation of Response to External Requirements.. 3 - Evaluation of Compliance With External Requirements.. 4 - Positive Assurance of Compliance.. 5 - Integrated Reporting.. ME4.. 1 - Establishment of an IT Governance Framework.. 2 - Strategic Alignment.. 3 - Value Delivery.. 4 - Resource Management.. 5 - Risk Management.. 6 - Performance Measurement.. 7 - Independent Assurance.. AC1 - Source Data Preparation and Authorisation.. AC2 - Source Data Collection and Entry.. AC3 - Accuracy, Completeness and Authenticity Checks.. AC4 - Processing Integrity and Validity.. AC5 - Output Review, Reconciliation and Error Handling.. AC6 - Transaction Authentication and Integrity.. Process Controls.. PC1 - Process Goals and Objectives.. PC2 - Process Ownership.. PC3 - Process Repeatability.. PC4 - Roles and Responsibilities.. PC5 - Policy, Plans and Procedures.. PC6 - Process Performance Improvement.. sign in.. to see your topics.. Knowledge Center.. Browse All Topics.. COBIT (IT Governance Control).. Risk IT.. Val IT (IT Value Delivery).. BMIS (Business Model For Information Security).. ITAF (IS Assurance/Audit).. ISACA Now.. NEW!.. Knowledge Center Video Tutorials.. Learn about all the information and capabilities each Knowledge Center topic has to offer.. View these tutorials.. for the variety of ways to engage and get the most out of your member community.. 0: A Business Framework for.. the Governance and Management of Enterprise IT.. builds and expands on COBIT 4.. 1 by integrating major frameworks, standards and resources, including Val IT and Risk IT.. Collaborate.. Members-Only Collaborate.. 1: The globally accepted IT governance framework.. Minimize IT-related risks and maximize the benefits of technology.. Controls Collaboration.. Furthering Industry-leading Knowledge and Practices.. Drive Value from IT Investments.. Identify, Govern and Effectively Manage IT Risk.. ISACA develops products and services that further industry-leading knowledge and practices for IT and information systems, and provides research deliverables on today’s hottest topics to help keep you ahead of the competition.. Ensure that IT-enabled investments deliver value with Val IT.. This framework covers value governance, portfolio management, and investment management processes.. Effectively address all IT-related business risks with Risk IT.. This framework covers risk governance, evaluation and response processes and activities.. Download.. ISACA Sets Professional Standards.. IT Assurance Framework.. Business Model for Information Security.. The development and dissemination of both the IT Audit and Assurance Standards and Standards for IS Control Professionals are a cornerstone of ISACA’s professional contribution to our community.. A single source for ISACA assurance professionals and CISAs, integrating standards, guidelines, tools and techniques for conducting assurance work.. Explore how the The Business Model for Information Security helps integrate security and business activities using a systemic approach to information security management.. Employment Connections.. Search jobs online by geography, certification, experience level and other factors.. Members can also post resumes/CVs and receive.. emails when new jobs are posted.. A new career advice section is also available.. Personal Online Library.. Explore our most popular benefit!.. The eLibrary is a searchable collection of content from most ISACA published books and more than 350 additional titles – all available free to ISACA members.. Use this glossary to assist you in studying for certification examinations or simply learning new definitions and phrases.. Start Your Career Now.. Download Your Books Now.. Access the Glossary Now.. What's New.. My Topic Updates.. Document.. 2013 North America ISRM Brochure.. Posted by ISACA 2 days ago | 0 comments.. Securing Sensitive Personal Data or Information Under India’s IT Act Using COBIT 5.. RBI Guidelines Mapping With COBIT 5.. Posted by ISACA 3 days ago | 0 comments.. Academic Membership application.. Posted by James Aquino 9 days ago | 0 comments.. Student Membership Application.. Posted by ISACA 9 days ago | 0 comments.. You must log in to view Knowledge Center Topic updates.. LogIn.. Access IT audit and assurance tools.. Become a topic leader.. Explore licensing and promotion opportunities.. How to Volunteer.. Knowledge Center Help and Info.. Learn more about COBIT 5.. View current research projects.. 11 October 2013.. We know that as data ages it become less valuable, and this is especially true for legacy data.. How.. Marc Vael Discusses the Value of the Knowledge Center..

    Original link path: /Knowledge-Center/Pages/default.aspx
    Open archive

  • Title: Information Technology Articles - Information Technology News | ISACA
    Descriptive info: The Source for IT Governance Professionals.. This award-winning bimonthly publication delivers practical, professional knowledge through peer-reviewed articles focused on topics critical to IT audit, governance, security and risk professionals.. Journal.. Journal Author Blog.. Current Digital Journal.. Journal Mobile Apps.. Journal Apps Available.. The ISACA Journal App is now available for.. Android devices.. and the.. Kindle Fire.. , in addition to.. Apple.. devices.. Visit your device’s marketplace and search.. “ISACA Journal”.. to download the free app from your Android smartphone, Kindle Fire, iPhone or iPad.. Volume 5, 2013 - Integrated Business Solutions.. Members.. Features.. Quiz 150.. Based on Volume 3, 2013.. Comments.. Standards, Guidelines, Tools and Techniques.. ISACA Member and Certification Holder Compliance.. An up-to-date listing of the current IT Audit and Assurance Standards, Guidelines, and Tools and Techniques.. Emo, Ergo Sum.. Steven J.. Ross, CISA, CISSP, MBCP.. To a very real extent, information security exists because people bought things.. Managing Data With a Streamlined Solution.. Paul Selway and John Schulte.. Known for teaching the latest educational technology and how it can be used in the classroom to effectively engage students in learning, BestPrep’s back-end systems needed to reflect the same technological savvy.. Where the Rubber Meets the Road.. Vasant Raval, DBA, CISA, ACMA.. Ethics is a practical social activity, not a utopian concept to be contemplated in the abstract.. JOnline: Embed With SFIA—Secrets From  ...   Enterprise.. Volume 1, 2012.. Critical Resource Management.. Volume 6, 2011.. Emerging and Evolving IT Risk.. Editorial Calendar.. Volume 1, Jan/Feb.. Data Privacy.. Data protection laws and regulations globally.. Changes in data privacy law.. Enterprise’s responsibility around privacy.. Effect of mobile on privacy.. Privacy and data security in the cloud.. Full Editorial Calendar.. Regular Columns.. Information Security Matters.. Information Ethics.. IS Audit Basics.. Five Questions With.. HelpSource Q A.. CPE Quiz.. Crossword Puzzle.. For Authors.. For Advertisers.. Drafts Due.. Insertion Due.. Art Due.. Mail Date.. 19 Sep 13.. 20 Nov 13.. 27 Nov 13.. 2 Jan 14.. Featured Author Blog.. 7 October 2013.. By Simon Roller, CISA, CISP, DPSM, FBCS CITP.. SFIA: The Role of Autonomy in Process Adoption.. I was recently involved in an organizational skills assessment where we assessed approximately 300 IT staff using the Skills Framework for the Information Age (SFIA).. We used SFIA to identify the sk.. Subscribe.. Members receive a subscription to the.. ®.. as one of the many benefits of ISACA Membership.. Non-members may subscribe by.. downloading a request form.. Translated Articles.. Uma abordagem da COBIT à conformidade e eliminação defensável.. Computação In-Memory — Evolução, oportunidades e riscos.. Cómo convertirse de un practicante a un profesional de la seguridad de la información.. Buluta Geçerken BT Güvenliği ile ilgili Sorumluluklar Değişiyor.. Büyük Veri Ne Demektir ve BT Denetimi ile İlgisi Nedir?..

    Original link path: /Journal/Pages/default.aspx
    Open archive

  • Title: History of ISACA
    Descriptive info: History of ISACA.. ISACA was incorporated by individuals who recognized a need for a centralized source of information and guidance in the growing field of auditing controls for computer systems.. History.. Bylaws and Articles of Incorporation.. Chinese (Simplified).. Chinese (Traditional).. More Translated Material.. Overview.. ISACA got its start in 1967, when a small group of individuals with similar jobs—auditing controls in the computer systems that were becoming increasingly critical to the operations of their organizations—sat down to discuss the need for a centralized source of information and guidance in the field.. In 1969, the group formalized, incorporating as the EDP Auditors Association.. In 1976 the association formed an education foundation to undertake large-scale research efforts to expand the knowledge and value of the IT governance and control field.. Previously known as the Information Systems Audit and Control Association.. Today, ISACA’s constituency—more than 110,000 strong worldwide—is characterized by its diversity.. Constituents live and work in more than 180 countries and cover a variety of professional IT-related positions—to name just a few, IS auditor, consultant, educator, IS security professional, regulator, chief information officer and internal auditor.. Some are new to the field, others are at middle management levels and still others are in the most senior ranks.. They work in nearly all industry categories, including financial and banking, public accounting, government and  ...   IS control standards are followed by practitioners worldwide.. Its research pinpoints professional issues challenging its constituents.. Its Certified Information Systems Auditor (CISA) certification is recognized globally and has been earned by more than 103,000 professionals since inception.. The Certified Information Security Manager (CISM) certification uniquely targets the information security management audience and has been earned by more than 22,500 professionals.. The Certified in the Governance of Enterprise IT (CGEIT) designation promotes the advancement of professionals who wish to be recognized for their IT governance-related experience and knowledge and has been earned by more than 5,600 professionals.. The Certified in Risk and Information Systems Control (CRISC) designation for those who identify and manage risks through the development, implementation and maintenance of information systems controls has been earned by more than 16,800 professionals.. ISACA publishes a leading technical journal in the information control field, the.. It hosts a series of international conferences focusing on both technical and managerial topics pertinent to the IS assurance, control, security and IT governance professions.. Together, ISACA and its affiliated IT Governance Institute lead the information technology control community and serve its practitioners by providing the elements needed by IT professionals in an ever-changing worldwide environment.. For more information on the association's products and services, email.. membership@isaca.. Annual Reports.. 2012 Annual Report.. 2011 Annual Report.. 2010 Annual Report..

    Original link path: /About-ISACA/History/Pages/default.aspx
    Open archive

  • Title: IT Governance - IT Certification - Serving IT Professionals | ISACA
    Descriptive info: Membership, Guidance and Certification for IT Professionals.. For more than 40 years, ISACA has been a pace-setting global organization for information governance, control, security and audit professionals.. What We Offer Whom We Serve.. Membership and Community.. Professional Recognition.. Guidance and Practices.. Professional Development.. As a nonprofit, global membership association for IT and information systems professionals, ISACA is committed to providing its diverse constituency of more than 110,000 worldwide with the tools they need to achieve individual and organizational success.. The benefits offered through our globally accepted research, certifications and community collaboration result in greater trust in, and value from, information systems.. Through more than 200 chapters established in more than 80 countries, ISACA provides its members with education, resource sharing, advocacy, professional networking, and a host of other benefits on a local level.. ISACA’s constituency is characterized by its diversity.. The global community of ISACA members and certified cover a variety of professional IT-related positions—some of which include IS auditor, consultant, educator, IS security professional, risk professional, chief information officer and internal auditor.. ISACA constituents work in nearly all industry categories, including financial and banking, public accounting, government and the public sector, utilities and manufacturing.. Members rely on ISACA for resources that enhance their skills, expand their professional knowledge and connect them with a vibrant community of peers.. ISACA membership and its certification programs are globally accepted and recognized.. In fact, independent studies continue to demonstrate that holding an ISACA designation enhances professional recognition, credibility and earning potential.. ISACA members have direct access to research, certifications and products that align systems and strategy.. They are connected to a global professional community and have the opportunity to contribute directly to advancing the profession and developing its body of knowledge.. With the complexity of information systems, increased risks, and the need for compliance, it is more important than ever that organizations recruit and retain employees who  ...   ISACA developed and maintains the internationally recognized COBIT.. ®.. , Val IT™ and Risk IT frameworks, helping IT professionals and enterprise leaders fulfill their IT governance responsibilities while delivering value to the business.. In addition to the frameworks, ISACA offers publications that provide guidance on a wide range of topics, including how to implement the frameworks.. ISACA works with members who are subject matter experts to review and comment on exposure drafts from regulators and standards-setting bodies to provide the IT community with the most relevant research deliverables.. In a profession as ever-changing as IT, professional development is a necessity.. ISACA is recognized as a highly respected and sought-after resource for professional education and development.. Connecting IT professionals across a variety of industries, geography and professions, ISACA is dedicated to providing products and services that bring value to our members.. We provide the relevant tools to promote growth, innovation and trust.. Our belief in the strength of our industry experts helps drive personal and organizational success, which is the core of our members, volunteers and committees.. ISACA offers educational events that meet the needs of all IT professionals.. From face-to-face conferences, including its flagship International Conference and the global Computer Audit, Control and Security (CACS) conferences, and Training Weeks, to e-Learning and On-site Training, ISACA is committed to providing its members and constituents with the resources they need to keep their professional skills and knowledge up-to-date.. “The reason I have stayed a member of ISACA is that it continues to provide value to me as a professional.. There are entry-level value opportunities, content that provides value initially.. But the more I grow, I find that the more I can derive value personally and professionally from ISACA.. It's a fairly large organization that’s almost limitless in it's opportunities to help me as an information systems professional.. ”.. — Max Blecher, South Africa.. Visit the Knowledge Center..

    Original link path: /About-ISACA/What-We-Offer-Whom-We-Serve/Pages/default.aspx
    Open archive

  • Title: @ISACA Newsletter - Information Technology News | ISACA
    Descriptive info: @ISACA Newsletter.. is a biweekly publication available from this page and delivered via email to ISACA members and subscribers.. This electronic newsletter features timely industry and ISACA news, as well as features and updates relevant to our readers.. All ISACA members are automatically subscribed to.. Nonmembers may subscribe by using the link below.. Subscribe to.. Most Recent Newsletters.. @ISACA Volume 21: 9 October 2013.. @ISACA Volume 20: 25 September 2013.. @ISACA Volume 19:  ...   Volume 16: 31 July 2013.. @ISACA Volume 15: 17 July 2013.. @ISACA Volume 14: 3 July 2013.. @ISACA Volume 13: 19 June 2013.. @ISACA Volume 12: 5 June 2013.. View.. Archives.. @ISACA Downloads.. @ISACA Volume 21, 2013.. @ISACA Volume 20, 2013.. @ISACA Volume 19, 2013.. @ISACA Volume 18, 2013.. @ISACA Volume 17, 2013.. @ISACA Volume 16, 2013.. @ISACA Volume 15, 2013.. @ISACA Volume 14, 2013.. @ISACA Volume 13, 2013.. @ISACA Volume 12, 2013..

    Original link path: /About-ISACA/-ISACA-Newsletter/Pages/default.aspx
    Open archive



  •  


    Archived pages: 1106