Trust in, and Value from, Information Systems

Who We Are

We are the Kongu Engineering College student group of ISACA, the pioneer in setting information system standards and benchmarks for enterprises worldwide.


ISACA is an independent, nonprofit, global association that engages in the development, adoption and use of globally accepted information system (IS) knowledge and practices. Previously known as the Information Systems Audit and Control Association®, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.


ISACA got its start in 1967, when a small group of individuals auditing controls in the computer systems that were becoming increasingly critical to the operations of their organizations realized the need for a centralized source of information and guidance in the field. In 1969, the group formalized, incorporating as the EDP Auditors Association.


Today, ISACA’s constituency—more than 140,000 strong worldwide—is characterized by its diversity. Constituents live and work in more than 180 countries and cover a variety of professional IT-related positions—to name just a few, IS auditor, consultant, educator, IS security professional, regulator, chief information officer and internal auditor from nearly all industry categories.

Local Chapter

Our Coimbatore Chapter was established in 1997 and has played a significant role in bridging the international professional organization with the local community. We connect professional members of the chapter with ISACAs 190+ chapters worldwide for professional networking, resource sharing, access for technical know-how and several other benefits.

What we do

Our mission is to make people cyberaware and help them stay safe online.

Human beings are said to be the weakest link in the cybersecurity chain. Statistics has shown that almost 85% of the cyber attacks ever occured have succeeded because of human ignorance. We aim to equip people with the knowledge to defend themselves against possible cyber attacks.

For students

We, KEC ISACA, conduct sessions for the students wherein they get to interact with cybersecurity professionals and get an idea about what their job entails. We also actively encourage and guide students to take up a career in cybersecurity.

Social Media

The various social media handles of KEC ISACA spread awareness about the best practices and recent cyberattacks through retweets and write-ups. We also release adivsories containing steps for safeguarding systems against the latest malware.


The KEC ISACA blog that has regular updates in the form of extensive write-ups on the latest cyberattacks and malware. It is an amalgamation of the best posts from all over the internet. It also features infographics for students and common people alike.

Youtube Channel

The youtube channel of KEC ISACA has three streams: a fortnightly roundup of the latest cybersecurity news, a bird's eye view of the noteworthy cybersecurity incidents throught the history and advisories for people, in both ,English and Tamil alike.

CRS Program

There are talks about a tie-up between Kongu Community Radio Station and KEC ISACA for a program that benefits the local community by showing them the cyberhygiene that has to be practiced to stay safe online. Stay tuned for the same!

Extra Mile

The KEC ISACA team strives with the single objective of making people more cyberaware. We conduct various activities that help us realise our dream such as helping people report cybercrime and teach people about the cyberlaws in our country.

Certification: IT Audit, Security, Governance and Risk

ISACA provides various certificates that are recognised worldwide.

Possession of a ISACA certification enhances one's profeesional credibility. It confirms to your employers that you possess the knowledge and experience to meet the challenges of a modern enterprise.

Certified Information Systems Auditor (CISA)

The CISA certification is world-renowned as the standard of achievement for those who audit, control, monitor and assess an organization’s information technology and business systems. The recent quarterly IT Skills and Certifications Pay Index (ITSCPI) from Foote Partners ranked CISA among the most sought-after and highest-paying IT certifications.

Certified in Risk and Information Systems Control (CRISC)

CRISC (pronounced “see-risk”) is the only certification that positions IT professionals for future career growth by linking IT risk management to enterprise risk management, and positioning them to become strategic partners to the business. The recent quarterly IT Skills and Certifications Pay Index (ITSCPI) from Foote Partners ranked CRISC among the most sought-after and highest-paying IT certifications.

Certified Information Security Manager (CISM)

The management-focused CISM is the globally accepted standard for individuals who design, build and manage enterprise information security programs. CISM is the leading credential for information security managers. The recent quarterly IT Skills and Certifications Pay Index (ITSCPI) from Foote Partners ranked CISM among the most sought-after and highest-paying IT certifications.

Certified in the Governance of Enterprise IT (CGEIT)

CGEIT recognizes a range of professionals for their knowledge and application of enterprise IT governance principles and practices. CGEIT provides you the credibility to discuss critical issues around governance and strategic alignment based on your recognized skills, knowledge and business experience. The recent quarterly IT Skills and Certifications Pay Index (ITSCPI) from Foote Partners ranked CGEIT among the most sought-after and highest-paying IT certifications.


Engineers, Pioneers of social change.

Vijay Anand D

Faculty Advisor

kalyana Sarvanan A

Faculty Advisor

Surya K


Kaviya K


Rajkumar K k


Sarveshwaran N


KanaSindhu A P

Public Relations

Keertha Dharini P K

Public Relations

Kishore E S

Human Resources

IndraPranesh P

Human Resources

sarath S

Website & Blog

Ajay Krishna R

Website & Blog

Passwords are like underwear; you don't let people see it, you should change it often, and you shouldn't share it with strangers.

Chris Pirillo Founder and CEO LockerGnome, Inc.,

If you spend more on coffee than on IT security, you will be hacked.What's more, you deserve to be hacked.

Richard Clarke White House Cybersecurity Advisor

The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.

Gene Spafford Leading Computer Security Expert

Keep In Touch

Suggestions and criticism are welcome.
Plain old hello would be nice too :)

Faculty Advisor: D Vijay Anand +919942013143
Faculty Advisor: A Kalayana Saravanan +919843688811
President: Surya K +919487131550