COBIT 5: A Business Framework for the Governance and Management of Enterprise IT COBIT 5 is the latest edition of ISACA’s globally accepted framework, providing an end-to-end business view of


CISA (Certified Information Systems Auditor) is ISACA's cornerstone certification. Since 1978, the CISA exam has measured excellence in IS auditing, control and security. The CISA certification has been earned by more than 70,000 professionals.


The Certified Information Security Manager (CISM) certification is a unique management focused certification that has been earned by over 10,000 professionals since its introduction in 2003.


Certified in Governance of Enterprise IT


Certified in Risk and Information Systems Control


The ITGI’s leading research publication is Control Objectives for Information and related Technology (COBIT®). COBIT is fast becoming the most popular and internationally accepted set of guidance materials for IT


  Enterprise Value: Governance of IT Investments The Val IT publications help those with an interest in value delivery from IT. The series consists of four volumes, available for free download: Enterprise Value: Governance of IT Investments, Getting Started With Value Management (PDF, 560K) Enterprise Value: Governance of IT Investments, The


The Risk IT Framework Risk is a natural part of the business landscape. If left unmanaged, the uncertainty can spread like weeds. If managed effectively, losses can be avoided and benefits obtained. In business today, risk plays a critical role. Almost every business decision requires executives and managers to balance risk and reward. Effectively

A Free Template From Joomlashack

A Free Template From Joomlashack


Upcoming Chapter Events

Mailing List



The Malta Chapter achieves the website GOLD Award for 2010 PDF Print E-mail
Wednesday, 11 May 2011 08:13
ISACA has awarded the Malta Chapter website with the GOLD award for 2010. Summer R. Cole, Membership Services  Coordinator at ISACA said "On behalf of the ISACA International Chapter Support Committee, I am pleased  to extend our congratulations to the Malta Chapter for having an outstanding web site! Your chapter has been awarded  a gold-level award. You should be very  proud of the hard work your chapter put forth in the design, content and  management of your chapter web site to earn this recognition." Every year,  the Chapter Support  Committee reviews all of the chapter web sites that link from the  ISACA International web site ( A list of all 2010 winners, can be found on the chapter awards  page (  
Creating a Culture of Security PDF Print E-mail
Monday, 02 May 2011 21:34

No security policies, standards, guidelines or procedures can foresee all of the circumstances in which they are to be interpreted. Therefore, if stakeholders are not grounded in a culture of security, there is potential for improper actions.

Security should not be considered adverse to mission achievement; where that is so, there is clear evidence that security is a weak part of the overall culture of the enterprise and allows security to be seen as prohibition rather than enablement. Among the rationales for a culture of security is the alignment of security with the enterprise as a whole.

The culture determines what an enterprise actually does about security (or any other objective) and not what it says that it intends to do. An effective security culture supports the protection of information while also supporting the broader aims of the enterprise. To sustain a security culture, it is critical to understand whether it was created in a purposeful manner or by “accident.”

A culture of security is not an end in itself, but a pathway to achieve and maintain other objectives, such as proper use of information. The greatest benefit of a culture of security is the effect it has on other dynamic interconnections within an enterprise. It leads to greater internal and external trust, consistency of results, easier compliance with laws and regulations and greater value in the enterprise as whole.

Creating a Culture of Security discusses how to achieve a meaningful, intentional security culture. It provides information on the benefits of, and inhibitors to, a culture of security. It discusses positive and negative reinforcement strategies and the steps to take to achieve the right balance in a security culture program.


Educational Session - An Introduction to Computer Contracts PDF Print E-mail
Tuesday, 01 March 2011 11:44

An evening educational session organised by ISACA Malta Chapter.

Title – An Introduction to Computer Contracts

Speakers -  Dr Antonio Ghio & Dr Paul Gonzi

Date – Thursday 17th March 2011

Time – 17:00 to 19:00

Place – Radisson Blu Resort, St Julians

A Demonstration of the Top Web Security Threats by Sandro Gauci PDF Print E-mail
Wednesday, 02 February 2011 14:57

An evening educational session organised by ISACA Malta Chapter.

Title – A Demonstration of the Top Web Security Threats

Date – Wednesday 16th February 2011

Time – 17:00 to 19:00

Place – Radisson Blu Resort, St Julians

ISACA MALTA CHAPTER Members are invited to attend this educational event free of charge.  They in turn, can be accompanied by a colleague / non-member to attend also free of charge.

Reduced fee: €15 – for members of the Malta Institute of Accountants, the Malta Institute of Management, the IEEE, and the British Computer Society.

Fee for all other attendees:  €20

This talk will be delivered by Mr Sandro Gauci.

Download this file (sandrogauci-webapp2.pdf)Presentation Slides[ ]1124 Kb
Eurocacs 2011 PDF Print E-mail
Tuesday, 18 January 2011 09:33

Get the knowledge you need to stay one step ahead
of the competition and keep up with changing professional trends.

20-23 March 2011 | Manchester, United Kingdom

ISACA’s EuroCACS is the hot-topic event for IT audit/assurance, security, control and governance professionals in the region, covering issues such as: governance concerns for ERP, how to make IT audit more relevant, wireless network security, cloud computing, and security concerns for service-oriented architecture.


<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Joomla 1.5 Templates by Joomlashack