COBIT 5: A Business Framework for the Governance and Management of Enterprise IT COBIT 5 is the latest edition of ISACA’s globally accepted framework, providing an end-to-end business view of


CISA (Certified Information Systems Auditor) is ISACA's cornerstone certification. Since 1978, the CISA exam has measured excellence in IS auditing, control and security. The CISA certification has been earned by more than 70,000 professionals.


The Certified Information Security Manager (CISM) certification is a unique management focused certification that has been earned by over 10,000 professionals since its introduction in 2003.


Certified in Governance of Enterprise IT


Certified in Risk and Information Systems Control


The ITGI’s leading research publication is Control Objectives for Information and related Technology (COBIT®). COBIT is fast becoming the most popular and internationally accepted set of guidance materials for IT


  Enterprise Value: Governance of IT Investments The Val IT publications help those with an interest in value delivery from IT. The series consists of four volumes, available for free download: Enterprise Value: Governance of IT Investments, Getting Started With Value Management (PDF, 560K) Enterprise Value: Governance of IT Investments, The


The Risk IT Framework Risk is a natural part of the business landscape. If left unmanaged, the uncertainty can spread like weeds. If managed effectively, losses can be avoided and benefits obtained. In business today, risk plays a critical role. Almost every business decision requires executives and managers to balance risk and reward. Effectively

A Free Template From Joomlashack

A Free Template From Joomlashack

Annual General Meeting 2011 Notice PDF Print E-mail
Friday, 17 June 2011 14:21
The Annual General Meeting (AGM) of the ISACA Malta Chapter will be held on Thursday 7 July 2011 at the Radisson Blu Resort in St Julians. The AGM will start at 6:00pm. Refreshments will be served after the AGM.

Attendance to the AGM is open only to current paid-up ISACA members and admission is free. In view of the importance of the Agenda as set out below, your attendance is highly solicited.

The Agenda for the AGM is as follows:

1          Address from The President

2          Report by the Secretary

3          Report by the Treasurer

4          Dissolution of the Board

5          Nominations and Election of Board Members for 2011/2012

6          Matters Arising

The Board has authorised the procedures for the nominations and election set up by the Nominations & Election Committee, which is formed by Anthony Formosa (Chairman), Gian Carlo Millo and Ivo Galea (Members). The procedures and nomination forms are being attached below.

The Nominations & Election Committee is inviting members to send their nominations for the Chapter Board 2011/2012 as per same procedures and using the enclosed form. The nominations may either be sent by email to This e-mail address is being protected from spambots. You need JavaScript enabled to view it  or handed to one of the members of the Nominations & Election Committee. Nominations will continue to be received until 48 hours prior to the AGM, i.e. by 6:00pm on Tuesday 5 July 2011. In the event that you have sent in your nomination by email, please remember to bring the original document with you to the AGM and hand it to a member of the Nominations & Election Committee.
Standard of Good Practice for Information Security - 2011 PDF Print E-mail
Thursday, 09 June 2011 11:23

More details

The Malta Chapter achieves the website GOLD Award for 2010 PDF Print E-mail
Wednesday, 11 May 2011 08:13
ISACA has awarded the Malta Chapter website with the GOLD award for 2010. Summer R. Cole, Membership Services  Coordinator at ISACA said "On behalf of the ISACA International Chapter Support Committee, I am pleased  to extend our congratulations to the Malta Chapter for having an outstanding web site! Your chapter has been awarded  a gold-level award. You should be very  proud of the hard work your chapter put forth in the design, content and  management of your chapter web site to earn this recognition." Every year,  the Chapter Support  Committee reviews all of the chapter web sites that link from the  ISACA International web site ( A list of all 2010 winners, can be found on the chapter awards  page (  
Creating a Culture of Security PDF Print E-mail
Monday, 02 May 2011 21:34

No security policies, standards, guidelines or procedures can foresee all of the circumstances in which they are to be interpreted. Therefore, if stakeholders are not grounded in a culture of security, there is potential for improper actions.

Security should not be considered adverse to mission achievement; where that is so, there is clear evidence that security is a weak part of the overall culture of the enterprise and allows security to be seen as prohibition rather than enablement. Among the rationales for a culture of security is the alignment of security with the enterprise as a whole.

The culture determines what an enterprise actually does about security (or any other objective) and not what it says that it intends to do. An effective security culture supports the protection of information while also supporting the broader aims of the enterprise. To sustain a security culture, it is critical to understand whether it was created in a purposeful manner or by “accident.”

A culture of security is not an end in itself, but a pathway to achieve and maintain other objectives, such as proper use of information. The greatest benefit of a culture of security is the effect it has on other dynamic interconnections within an enterprise. It leads to greater internal and external trust, consistency of results, easier compliance with laws and regulations and greater value in the enterprise as whole.

Creating a Culture of Security discusses how to achieve a meaningful, intentional security culture. It provides information on the benefits of, and inhibitors to, a culture of security. It discusses positive and negative reinforcement strategies and the steps to take to achieve the right balance in a security culture program.


Educational Session - An Introduction to Computer Contracts PDF Print E-mail
Tuesday, 01 March 2011 11:44

An evening educational session organised by ISACA Malta Chapter.

Title – An Introduction to Computer Contracts

Speakers -  Dr Antonio Ghio & Dr Paul Gonzi

Date – Thursday 17th March 2011

Time – 17:00 to 19:00

Place – Radisson Blu Resort, St Julians

<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Joomla 1.5 Templates by Joomlashack