• img

    The CISA certification is world-renowned as the standard of achievement for those who audit...
    Read more

  • img

    The management-focused CISM is the globally accepted standard for individuals...
    Read more

  • img

    CRISC (pronounced “see-risk”) is the only certification that positions IT professionals for...
    Read more

  • img

    CGEIT recognizes a range of professionals for their knowledge and application of enterprise IT...
    Read more

  • COBIT 5 is the latest edition of ISACA’s globally accepted framework, providing an end-to-end business view of the governance of enterprise IT that reflects the central role of information and technology in creating value for enterprises.

    Benefits
    COBIT 5 helps enterprises of all sizes:
    • Maintain high-quality information to support business decisions
    • Achieve strategic goals and realize business benefits through the effective and innovative use of IT
    • Achieve operational excellence through reliable, efficient application of technology
    • Maintain IT-related risk at an acceptable level

    Read more
  • The scope of the Val IT framework is also fully covered within the scope of the COBIT 5 framework. You are invited to review the COBIT 5 framework first and, if more guidance on value is needed, reference the Val IT publications for more detail.

    A new governance framework, and supporting publications addressing the governance of IT-enabled business investments, Val IT consists of a set of guiding principles. A number of processes conforming to those principles that are further defined as a set of key management practices.

    The Val IT framework is supported by publications and operational tools and provides guidance to:
    • Define the relationship between IT and the business and those functions...

    Read more
  • The scope of the Risk IT framework is also fully covered within the scope of the COBIT 5 framework. You are invited to review the COBIT 5 framework first and, if more guidance on risk is needed, reference the Risk IT publications for more detail.

    Risk IT provides an end-to-end, comprehensive view of all risks related to the use of IT and a similarly thorough treatment of risk management, from the tone and culture at the top, to operational issues.

    Risk is a natural part of the business landscape.
    If left unmanaged, the uncertainty can spread like weeds.
    If managed effectively, losses can be avoided and benefits obtained.

    In business today, risk plays...

    Read more

ISACA Award

Very Large Chapter Growth Award


The ISACA International Chapter Support Committee recognizes the vital role that chapters play in attracting new members. Starting this year, ISACA’s Chapter Support Committee is recognizing top contenders for the Chapter Growth Award, in addition to the winner.

Read More

Education

IT Professional Education, Conferences and Training


Take your career to a higher level. The best place to get direction is from people who have been in your place. That’s why ISACA offers educational events that meet the needs of all IT professionals.

Learn More about our education programs

Online Learning

With the flexibility of online learning, you can continue your professional education at a time convenient to you. Choose from a variety of online courses, including preparation for certification exams and COBIT training. Plus, participate in virtual conferences and webinars.

Learn More

ISACA Journal

The Source for IT Governance Professionals

This award-winning bimonthly publication delivers practical, professional knowledge through peer-reviewed articles focused on topics critical to IT audit, governance, security and risk professionals.

Current Issue Journal Journal in Apps

InControl Magazine

Read our chapter mangazine

Chapter News

  • ISACA UAE CHAPTER EXCELLENCE AWARDS 2014

    The morning of 15th March 2014 witnessed first edition of the Annual ISACA UAE CHAPTER EXCELLENCE AWARDS 2014. 

    The large number of industry professional’s  presence on the  day was a  testimony to the importance that our professional attach to promoting and recognizing Excellence in...
    Read more

Events

  • Dubai Dinner CPE Double Bonanza - Two CPE Session (4 CPE Hour) - Auditing effectiveness of ISO20K an

    Date: 15 Dec 2014 to 23 Dec 2014

    Date 15th Dec 2104 - Grand Excelsior Hotel Bur Dubai

    Session 1 -Auditing Effectiveness of ISO 20000:2011

     Auditing the Effectiveness of ISO 20000:2011 and the major differences between ISO 20000:2005 andISO 20000: 2011 The topic will cover application and implementation of service management systems (SMS) based on the requirements in ISO/IEC 200001:2011. Also enlist differences from its predecessor.

    Session 2 - Identify all foreseeable Internal and External Risks to Personal Information

    A fundamentally new Data-Centric approach to Security. Are you able to discover all instances of sensitive data, visualize the risk, and map the common source of proliferation so data can be secured at its Source and throughout its lifecycle?

    The strategy and vision begins with providing visualization of where sensitive data resides and how at risk it is.  This would result in an application that is built on the intelligent data platform and will leverage the various functions in the platform.

     

  • Challenges in relations to internal and external risks to personal information

    Date: 04 Nov 2014 to 04 Nov 2014

    Identify all foreseeable Internal and External Risks to Personal Information

  • ISACA UAE Chapter IFTAR Event - Dubai

    Date: 24 Jul 2014 to 24 Jul 2014

    ISACA UAE Chapter IFTAR Event - Dubai

ISAFE

I-SAFE Conference


With a grand success history of our ISAFE regional conference in previous SIX years, ISACA UAE Chapter is planning again this year ISAFE 13 Regional Conference on 30th & 31st October 2013. This conference will be attended by professionals in the field of Audit, Assurance, Security, Information Technology, Governance etc. Professionals from various industries and government institutions are also expected to attend the conference. Leading and eminent speakers in the areas of IT Security, Audit and Assurance would be delivering the speech at the conference.

Read More