ISACA is an independent, nonprofit, global association that engages in the development, adoption and use of globally accepted information system (IS) knowledge and practices. Previously known as the Information Systems Audit and Control Association®, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.
ISACA got its start in 1967, when a small group of individuals auditing controls in the computer systems that were becoming increasingly critical to the operations of their organizations realized the need for a centralized source of information and guidance in the field. In 1969, the group formalized, incorporating as the EDP Auditors Association.
Today, ISACA’s constituency—more than 140,000 strong worldwide—is characterized by its diversity. Constituents live and work in more than 180 countries and cover a variety of professional IT-related positions—to name just a few, IS auditor, consultant, educator, IS security professional, regulator, chief information officer and internal auditor from nearly all industry categories.
Our Coimbatore Chapter was established in 1997 and has played a significant role in bridging the international professional organization with the local community. We connect professional members of the chapter with ISACAs 190+ chapters worldwide for professional networking, resource sharing, access for technical know-how and several other benefits.
Human beings are said to be the weakest link in the cybersecurity chain. Statistics has shown that almost 85% of the cyber attacks ever occured have succeeded because of human ignorance. We aim to equip people with the knowledge to defend themselves against possible cyber attacks.
We, KEC ISACA, conduct sessions for the students wherein they get to interact with cybersecurity professionals and get an idea about what their job entails. We also actively encourage and guide students to take up a career in cybersecurity.
The various social media handles of KEC ISACA spread awareness about the best practices and recent cyberattacks through retweets and write-ups. We also release adivsories containing steps for safeguarding systems against the latest malware.
The KEC ISACA blog that has regular updates in the form of extensive write-ups on the latest cyberattacks and malware. It is an amalgamation of the best posts from all over the internet. It also features infographics for students and common people alike.
The youtube channel of KEC ISACA has three streams: a fortnightly roundup of the latest cybersecurity news, a bird's eye view of the noteworthy cybersecurity incidents throught the history and advisories for people, in both ,English and Tamil alike.
There are talks about a tie-up between Kongu Community Radio Station and KEC ISACA for a program that benefits the local community by showing them the cyberhygiene that has to be practiced to stay safe online. Stay tuned for the same!
The KEC ISACA team strives with the single objective of making people more cyberaware. We conduct various activities that help us realise our dream such as helping people report cybercrime and teach people about the cyberlaws in our country.
Possession of a ISACA certification enhances one's profeesional credibility. It confirms to your employers that you possess the knowledge and experience to meet the challenges of a modern enterprise.
The CISA certification is world-renowned as the standard of achievement for those who audit, control, monitor and assess an organization’s information technology and business systems. The recent quarterly IT Skills and Certifications Pay Index (ITSCPI) from Foote Partners ranked CISA among the most sought-after and highest-paying IT certifications.
CRISC (pronounced “see-risk”) is the only certification that positions IT professionals for future career growth by linking IT risk management to enterprise risk management, and positioning them to become strategic partners to the business. The recent quarterly IT Skills and Certifications Pay Index (ITSCPI) from Foote Partners ranked CRISC among the most sought-after and highest-paying IT certifications.
The management-focused CISM is the globally accepted standard for individuals who design, build and manage enterprise information security programs. CISM is the leading credential for information security managers. The recent quarterly IT Skills and Certifications Pay Index (ITSCPI) from Foote Partners ranked CISM among the most sought-after and highest-paying IT certifications.
CGEIT recognizes a range of professionals for their knowledge and application of enterprise IT governance principles and practices. CGEIT provides you the credibility to discuss critical issues around governance and strategic alignment based on your recognized skills, knowledge and business experience. The recent quarterly IT Skills and Certifications Pay Index (ITSCPI) from Foote Partners ranked CGEIT among the most sought-after and highest-paying IT certifications.
Passwords are like underwear; you don't let people see it, you should change it often, and you shouldn't share it with strangers.
If you spend more on coffee than on IT security, you will be hacked.What's more, you deserve to be hacked.
The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.
Faculty Advisor: D Vijay Anand +919942013143 email@example.com
Faculty Advisor: A Kalayana Saravanan +919843688811 firstname.lastname@example.org
President: Surya K +919487131550 email@example.com