Mobil Cihazlarda Tutulan Hassas Verilere Kolaylıkla Erişilebilir. Ek Güvenlik için Mobil Cihazlardaki Veriyi Şifreleyin.
Mobil cihazlarda hassas veri tutmak tehlikeli olabilir. Cihazın kaybolması ya da çalınması halinde şifrelenmemiş verilere kolaylıkla erişilebilir. Mobil cihazınızda hassas verileri tutmak istiyorsanız ve buna yetkiniz varsa, cihazı parola ile koruma altına alın ve bilgilerinizi şifreleyin.

Güvenlik Tüyoları, ISACA Istanbul Öğrenci Grubu Araştırma Topluluğunun çalışmasıdır.
  • ISACA Istanbul Aralık Ayı Etkinliği


Turkey is the first country that mandates COBIT framework compliance in its regulations.

In May 2006, the Banking Regulation and Supervision Agency of Turkey (BRSA) mandated that all banks operating in Turkey must adopt COBIT’s best practices when managing IT-related processes. COBIT was the selected framework because its control objectives are internationally recognized and considered to be effective at controlling IT-related processes. Upon this adoption, many organizations soon realized that the use of COBIT provided many additional benefits, including more controlled IT processes that are integrated with business processes.

ISACA Purpose and Promise – Istanbul Chapter

About Us

The Istanbul Chapter was formed on March 10th, 2009 to serve Turkey’s  tremendous demand for guidance on directing their IT for optimal advantage, reducing IT-related risks and increasing confidence in the information provided by IT . Professionals in Istanbul are also increasingly using COBIT. COBIT, developed by the IT Governance Institute, is the globally accepted framework that executives are using to ensure that their information technology is helping them achieve their goals and objectives.

“The main objective of our ISACA chapter is to support the use of the government-mandated IT controls and to provide opportunities for members to share their knowledge and gain additional expertise. ISACA Istanbul feels it is important to provide the tools necessary to support this objective through education, qualification and expertise and thus achieve a sustainable structure.

ISACA got its start in 1967, when a small group of individuals with similar jobs—auditing controls in the computer systems that were becoming increasingly critical to the operations of their organizations—sat down to discuss the need for a centralized source of information and guidance in the field. In 1969, the group formalized, incorporating as the EDP Auditors Association. In 1976 the association formed an education foundation to undertake large-scale research efforts to expand the knowledge and value in the IT governance and control field. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

ISACA’s Certified Information Systems Auditor (CISA) certification is recognized globally and has been earned by more than 109,000 professionals since its inception. The Certified Information Security Manager (CISM) certification uniquely targets the information security management audience and has been earned by more than 25,000 professionals. The Certified in the Governance of Enterprise IT (CGEIT) designation promotes the advancement of professionals who wish to be recognized for their IT governance-related experience and knowledge and has been earned by more than 6,000 professionals. The Certified in Risk and Information Systems Control (CRISC) designation is for those who identify and manage risks through the development, implementation and maintenance of information systems controls has been earned by more than 17,000 professionals globally.