COBIT 5

COBIT 5: A Business Framework for the Governance and Management of Enterprise IT COBIT 5 is the latest edition of ISACA’s globally accepted framework, providing an end-to-end business view of

CISA

CISA (Certified Information Systems Auditor) is ISACA's cornerstone certification. Since 1978, the CISA exam has measured excellence in IS auditing, control and security. The CISA certification has been earned by more than 70,000 professionals.

CISM

The Certified Information Security Manager (CISM) certification is a unique management focused certification that has been earned by over 10,000 professionals since its introduction in 2003.

CGEIT

Certified in Governance of Enterprise IT

CRISC

Certified in Risk and Information Systems Control

COBIT

The ITGI’s leading research publication is Control Objectives for Information and related Technology (COBIT®). COBIT is fast becoming the most popular and internationally accepted set of guidance materials for IT

VAL IT

  Enterprise Value: Governance of IT Investments The Val IT publications help those with an interest in value delivery from IT. The series consists of four volumes, available for free download: Enterprise Value: Governance of IT Investments, Getting Started With Value Management (PDF, 560K) Enterprise Value: Governance of IT Investments, The

RISK IT

The Risk IT Framework Risk is a natural part of the business landscape. If left unmanaged, the uncertainty can spread like weeds. If managed effectively, losses can be avoided and benefits obtained. In business today, risk plays a critical role. Almost every business decision requires executives and managers to balance risk and reward. Effectively

http://www.isaca-malta.org/live/components/com_gk2_photoslide/images/thumbm/274535cobit5.JPG http://www.isaca-malta.org/live/components/com_gk2_photoslide/images/thumbm/266545cisa.jpg http://www.isaca-malta.org/live/components/com_gk2_photoslide/images/thumbm/289621cism.jpg http://www.isaca-malta.org/live/components/com_gk2_photoslide/images/thumbm/901986cgeit.jpg http://www.isaca-malta.org/live/components/com_gk2_photoslide/images/thumbm/444103crisc.jpg http://www.isaca-malta.org/live/components/com_gk2_photoslide/images/thumbm/412478COBITlogo.jpg http://www.isaca-malta.org/live/components/com_gk2_photoslide/images/thumbm/455828valit.jpg http://www.isaca-malta.org/live/components/com_gk2_photoslide/images/thumbm/738396riskit.jpg

A Free Template From Joomlashack

A Free Template From Joomlashack

ISACA MALTA CHAPTER on LinkedIn

Upcoming Chapter Events

Mailing List

Subsribe

Unsubscribe

Home
Welcome to the ISACA® MALTA CHAPTER
ISACA JOURNAL 4 of 2009 PDF Print E-mail
Wednesday, 08 July 2009 17:53
The 4th edition of ISACA Journal for 2009 has been issued. ISACA members will be receiving this edition in their mail in the next few days. In the meantime members can also access the Journal online HERE.
 
New JOnline articles recently added on ISACA website PDF Print E-mail
Tuesday, 02 June 2009 08:30
Read more...
 
ISACA eLibrary – Exclusive Member Benefit – On–demand access to a collection of ISACA published books and more PDF Print E-mail
Monday, 25 May 2009 07:37

 

ISACA eLibrary is a comprehensive collection of content from nearly all ISACA/ITGI published books and over 250 additional titles – all available free-of-charge as a benefit of your ISACA membership investment.

Today's dynamic business climate commands you to know and do more, often demanding immediate knowledge and expertise. ISACA eLibrary gives you on-demand access to a goldmine of readily usable information.

Read more...
 
E-symposium: Web Application Security: Intelligent Choices PDF Print E-mail
Tuesday, 12 May 2009 07:31


Web application security is critical to all organizations as hacker attacks are actively targeting Web applications. IT professionals need to be aware of the strategies, tools and techniques available to mitigate this risk. In the May e-symposium, you will learn how to build web application security programs, identify the most common web application vulnerabilities and determine which tools and techniques are most appropriate for your organization. For a complete program overview and to register, please go to http://isaca.brighttalk.com.

 
News from Maltese Media - Man Admits Stealing Usernames & Passwords PDF Print E-mail
Monday, 11 May 2009 19:27

News item featured on Dive and Times Of Malta

A 25-year-old man was placed under probation for 18 months today after a court heard how he used to access people’s internet accounts to download films. Read more on Dive HERE and Times Of Malta HERE.

 
<< Start < Prev 21 22 23 24 25 26 Next > End >>

 
Joomla 1.5 Templates by Joomlashack