www.isaca.org Open in urlscan Pro
2606:4700::6811:fdcb  Public Scan

Submitted URL: https://click.em.isaca.org/?qs=eb24a1569ef20fe7325b5d52159eb7d1cd144aaedd087bf54c40b722e70e8f4bfe323e5e0df2e6de313adfe4ee76...
Effective URL: https://www.isaca.org/isaca-digital-videos/podcasts/the-cyber-standard-podcast--episode-4?utm_source=sfmc&utm_medium=e...
Submission: On July 01 via api from OM — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

ISACA_logo_RGB
 * Credentialing
 * Membership
 * Enterprise
 * PARTNERSHIPS
 * Training & Events
 * Resources

 * 
 * Join
    * PROFESSIONAL JOIN
    * RECENT GRAD JOIN
    * STUDENT JOIN

 * About Us
    * ABOUT US HOME
    * WHO WE ARE
    * NEWSROOM
    * PARTICIPATE & VOLUNTEER
    * LEADERSHIP & GOVERNANCE
    * ADVOCACY
    * ISACA FOUNDATION
    * CONTACT US
    * CODE OF PROFESSIONAL ETHICS

 * CAREERS
    * Career Center
    * Careers at ISACA

 * SUPPORT
 * Store
   
   Total
   
   View Cart Checkout
   
   No items have been added to your cart yet
   
   Browse Search
 * Cart (0)
   
   
 * Sign In

 * MEMBERSHIP
 * CERTIFICATIONS
 * CERTIFICATES
 * CPE CERTIFICATES
 * Engage
 * LEARNING ACCESS
 * RESOURCES
 * ORDER HISTORY
 * Redeemable Products
 * Sign Out



 * Sign In
 * Create an Account

 * CERTIFICATIONS
   * CISA—Certified Information Systems Auditor
   * CISM—Certified Information Security Manager
   * CRISC—Certified in Risk and Information Systems Control
   * CDPSE—Certified Data Privacy Solutions Engineer
   * CGEIT—Certified in the Governance of Enterprise IT
   * CCOA—Certified Cybersecurity Operations Analyst
   * CET—Certified in Emerging Technology Certification
   * ITCA—Information Technology Certified Associate
   * CSX-P—CSX Cybersecurity Practitioner Certification
   * View More

 * CERTIFICATES
   * CCAK—Certificate in Cloud Auditing Knowledge
   * COBIT
     * COBIT 2019 Foundation
     * COBIT 2019 Design & Implementation
     * Implementing the NIST Cybersecurity Framework using COBIT 2019
     * COBIT 5 Certificates
   * Cybersecurity Audit
   * Cybersecurity Fundamentals
   * Digital Trust Ecosystem Framework Foundation Certificate
   * Emerging Technology
     * AI Fundamentals
     * Blockchain Fundamentals
     * Cloud Fundamentals
     * IoT Fundamentals
   * Information Technology
     * Computing Fundamentals
     * Data Science Fundamentals
     * Networks and Infrastructure Fundamentals
     * Software Development Fundamentals
   * IT Audit Fundamentals
   * IT Risk Fundamentals
   * View More

 * WHICH CERTIFICATION IS RIGHT FOR YOU?

 * RENEW A CERTIFICATION

 * MAINTAIN A CERTIFICATION

 * VERIFY A CERTIFICATION

 * DIGITAL BADGES

 * Which Exam Prep is Right for You?
 * TRAIN YOUR WAY WITH OFFICIAL ISACA EXAM PREP
 * BUILD YOUR TEAM'S PERFORMANCE WITH CUSTOMIZED TRAINING

 * BECOME A MEMBER
   * Browse Chapters
   * Find Your Membership Type
   * Member Benefits

 * ENGAGE ONLINE COMMUNITY

 * GET INVOLVED
   * Advocacy
   * Author an Article
   * Chapter Events Calendar
   * ISACA Awards
   * SheLeadsTech
   * Speak at Conferences
   * Volunteer
   * Write an Exam Question

 * MAXIMIZE YOUR MEMBERSHIP
   * Career Center
   * Discounts & Savings
   * Free CPE
   * Free Resource Previews
   * Member-Exclusive Speaker Series
   * Mentorship

 * Personalize Your Experience
 * UPDATE YOUR PROFILE

 * CMMI PERFORMANCE IMPROVEMENT SOLUTIONS
   * CMMI Performance Solutions
   * CMMI Cybermaturity Platform
   * Voluntary Improvement Program

 * ENTERPRISE TRAINING & CREDENTIALS
   * ISACA Credentials
   * CMMI Training

 * CMMI APPRAISALS (PARS)

 * ENTERPRISE SUPPORT

 * CONTACT US

 * Empower Your Team to Power Business Growth
 * CUSTOMIZE YOUR IT TEAM TRAINING

 * BECOME A TRAINING PARTNER

 * BECOME A CMMI PARTNER

 * BECOME AN ACADEMIC OR WORKFORCE PARTNER

 * BECOME A SPONSOR

 * FIND A TRAINING PARTNER
   * Certification Training Partners
     * Certification Training Partners
     * Americas
     * Asia and Oceania
     * China
     * EMEA
   * COBIT Training Partners
   * Academic & Workforce Partners
   * CMMI Performance Improvement Partners

 * Over 100,000 People Were Trained by ISACA in 2022
 * BECOME A PARTNER TO CAPITALIZE ON THIS HIGH DEMAND

 * CONFERENCES
   * CMMI Conference
   * GRC Conference
   * ISACA Europe Conference
   * ISACA North America Conference
   * ISACA Virtual Conference

 * CHAPTER EVENTS

 * Training Week

 * TRAIN YOUR WAY
   * All Training Types
   * Online Review Courses
   * Webinars
   * Virtual Summits

 * GROUP/ENTERPRISE TRAINING

 * TRAINING FROM AN ACCREDITED PARTNER

 * TRAINING BY TOPIC
   * All Training Topics
   * Artificial Intelligence
   * Cybersecurity
   * IT Audit
   * Certification Exam Preparation
   * COBIT

 * CPE ON-DEMAND

 * Ready to Take Your AI Knowledge to the Next Level?
 * BROWSE ISACA’S NEW AI TRAINING COURSES

 * DIGITAL TRUST

 * ISACA JOURNAL

 * INSIGHTS & EXPERTISE

 * NEWS & TRENDS

 * ENGAGE ONLINE COMMUNITIES

 * COBIT

 * RESOURCES BY TOPIC
   * Artificial Intelligence
   * Cybersecurity
   * Emerging Technology
   * Governance
   * IT Audit
   * IT Risk
   * Privacy

 * FRAMEWORKS, STANDARDS AND MODELS

 * ISACA NOW BLOG

 * ISACA VIDEOS

 * ISACA PODCAST

 * GLOSSARY

 * Announcing ISACA’s Digital Trust Ecosystem Framework and Portfolio
 * 
 * Advance Digital Trust

 * Credentialing
   * CREDENTIALING
   * CERTIFICATIONS
     * CERTIFICATIONS
     * CISA—Certified Information Systems Auditor
     * CISM—Certified Information Security Manager
     * CRISC—Certified in Risk and Information Systems Control
     * CDPSE—Certified Data Privacy Solutions Engineer
     * CGEIT—Certified in the Governance of Enterprise IT
     * CCOA—Certified Cybersecurity Operations Analyst
     * CET—Certified in Emerging Technology Certification
     * ITCA—Information Technology Certified Associate
     * CSX-P—CSX Cybersecurity Practitioner Certification
   * CERTIFICATES
     * CERTIFICATES
     * CCAK—Certificate in Cloud Auditing Knowledge
     * COBIT
       * COBIT 2019 Foundation
       * COBIT 2019 Design & Implementation
       * Implementing the NIST Cybersecurity Framework using COBIT 2019
       * COBIT 5 Certificates
     * Cybersecurity Audit
     * Cybersecurity Fundamentals
     * Digital Trust Ecosystem Framework Foundation Certificate
     * Emerging Technology
       * AI Fundamentals
       * Blockchain Fundamentals
       * Cloud Fundamentals
       * IoT Fundamentals
     * Information Technology
       * Computing Fundamentals
       * Data Science Fundamentals
       * Networks and Infrastructure Fundamentals
       * Software Development Fundamentals
     * IT Audit Fundamentals
     * IT Risk Fundamentals
   * WHICH CERTIFICATION IS RIGHT FOR YOU?
   * RENEW A CERTIFICATION
   * MAINTAIN A CERTIFICATION
   * VERIFY A CERTIFICATION
   * DIGITAL BADGES
   * TRAIN YOUR WAY WITH OFFICIAL ISACA EXAM PREP
   * BUILD YOUR TEAM'S PERFORMANCE WITH CUSTOMIZED TRAINING
 * Membership
   * MEMBERSHIP
   * BECOME A MEMBER
     * BECOME A MEMBER
     * Browse Chapters
     * Find Your Membership Type
     * Member Benefits
   * ENGAGE ONLINE COMMUNITY
   * MAXIMIZE YOUR MEMBERSHIP
     * MAXIMIZE YOUR MEMBERSHIP
     * Career Center
     * Discounts & Savings
     * Free CPE
     * Free Resource Previews
     * Member-Exclusive Speaker Series
     * Mentorship
   * UPDATE YOUR PROFILE
   * GET INVOLVED
     * GET INVOLVED
     * Advocacy
     * Author an Article
     * Chapter Events Calendar
     * ISACA Awards
     * SheLeadsTech
     * Speak at Conferences
     * Volunteer
     * Write an Exam Question
 * Enterprise
   * ENTERPRISE
   * CMMI PERFORMANCE IMPROVEMENT SOLUTIONS
     * CMMI PERFORMANCE IMPROVEMENT SOLUTIONS
     * CMMI Performance Solutions
     * CMMI Cybermaturity Platform
     * Voluntary Improvement Program
   * CUSTOMIZE YOUR IT TEAM TRAINING
   * ENTERPRISE TRAINING & CREDENTIALS
     * ENTERPRISE TRAINING AND CREDENTIALS
     * ISACA Credentials
     * CMMI Training
   * CMMI APPRAISALS (PARS)
   * ENTERPRISE SUPPORT
   * CONTACT US
 * PARTNERSHIPS
   * PARTNERSHIPS
   * BECOME A TRAINING PARTNER
   * BECOME A CMMI PARTNER
   * BECOME AN ACADEMIC OR WORKFORCE PARTNER
   * BECOME A SPONSOR
   * FIND A TRAINING PARTNER
     * FIND A TRAINING PARTNER
     * Certification Training Partners
       * Certification Training Partners
       * Americas
       * Asia and Oceania
       * China
       * EMEA
     * COBIT Training Partners
     * Academic & Workforce Partners
     * CMMI Performance Improvement Partners
   * BECOME A PARTNER TO CAPITALIZE ON THIS HIGH DEMAND
 * Training & Events
   * TRAINING AND EVENTS
   * CONFERENCES
     * CONFERENCES
     * CMMI Conference
     * GRC Conference
     * ISACA Europe Conference
     * ISACA North America Conference
     * ISACA Virtual Conference
   * CHAPTER EVENTS
   * Training Week
   * TRAIN YOUR WAY
     * TRAIN YOUR WAY
     * All Training Types
     * Online Review Courses
     * Webinars
     * Virtual Summits
   * GROUP/ENTERPRISE TRAINING
   * TRAINING FROM AN ACCREDITED PARTNER
   * TRAINING BY TOPIC
     * Find Training by Topic
     * All Training Topics
     * Artificial Intelligence
     * Cybersecurity
     * IT Audit
     * Certification Exam Preparation
     * COBIT
   * CPE ON-DEMAND
   * BROWSE ISACA’S NEW AI TRAINING COURSES
 * Resources
   * RESOURCES
   * DIGITAL TRUST
   * ISACA JOURNAL
   * INSIGHTS & EXPERTISE
   * NEWS & TRENDS
   * ENGAGE ONLINE COMMUNITIES
   * COBIT
   * RESOURCES BY TOPIC
     * Artificial Intelligence
     * Cybersecurity
     * Emerging Technology
     * Governance
     * IT Audit
     * IT Risk
     * Privacy
   * FRAMEWORKS, STANDARDS AND MODELS
   * ISACA NOW BLOG
   * ISACA VIDEOS
   * ISACA PODCAST
   * GLOSSARY
   * 
   * Advance Digital Trust
 * Join
   * PROFESSIONAL JOIN
   * RECENT GRAD JOIN
   * STUDENT JOIN
 * About Us
   * ABOUT US HOME
   * WHO WE ARE
   * NEWSROOM
   * PARTICIPATE & VOLUNTEER
   * LEADERSHIP & GOVERNANCE
   * ADVOCACY
   * ISACA FOUNDATION
   * CONTACT US
   * CODE OF PROFESSIONAL ETHICS
 * CAREERS
   * Career Center
   * Careers at ISACA
 * SUPPORT
 * Store
 * Cart

Sign In

HOME / ISACA DIGITAL VIDEOS / PODCASTS / THE CYBER STANDARD PODCAST EPISODE 4


ISACA DIGITAL VIDEOS

Experience ISACA through our lens. Explore our educational content, ISACA news
and events, in-depth interviews with experts in cybersecurity, IT audit,
governance and so much more, plus a link to ISACA’s audio podcast—all right
here. Press play and you are on your way.


THE CYBER STANDARD PODCAST | EPISODE 4
18 VIEWS • 9 DAYS AGO


PODCASTS

THE CYBER STANDARD PODCAST | EPISODE 4
18 VIEWS • 9 DAYS AGO

ISACA LIVE: THE AI REALITY--WHERE WE ARE NOW AND WHERE WE NEED TO BE
13 VIEWS • 2 MONTHS AGO

ISACA LIVE | 2024 NORTH AMERICA CONFERENCE PREVIEW WITH AADEEL AKHTAR
21 VIEWS • 2 MONTHS AGO

EFFECTIVE THIRD PARTY RISK MANAGEMENT IN 2024: AI’S IMPACT AND FUTURE TRENDS
22 VIEWS • 3 MONTHS AGO

UNLOCKING STRATEGIC VALUE FROM A BUG BOUNTY PROGRAM
27 VIEWS • 4 MONTHS AGO

THE CYBER STANDARD PODCAST | EPISODE 2
28 VIEWS • 4 MONTHS AGO

THE CYBER STANDARD PODCAST | EPISODE 3
11 VIEWS • 4 MONTHS AGO

ISACA LIVE | SHELEADSTECH - INTERNATIONAL WOMEN’S DAY
17 VIEWS • 4 MONTHS AGO

THE CYBER STANDARD PODCAST - EPISODE 1
2 VIEWS • 5 MONTHS AGO

REFLECTING ON 25 YEARS OF INFORMATION SECURITY MATTERS
28 VIEWS • 5 MONTHS AGO

A VIEW INTO CTEM EXPOSURE MANAGEMENT: REDUCING YOUR ATTACK SURFACE 3X
11 VIEWS • 5 MONTHS AGO

ISACA LIVE | ISACA 2024 VIRTUAL CONFERENCE KEYNOTES PREVIEW
4 VIEWS • 5 MONTHS AGO

ISACA LIVE | DATA PRIVACY PRIORITIES IN 2024
27 VIEWS • 6 MONTHS AGO

LEVERAGING AGILE CONCEPTS FOR NEURODIVERSE AUDITORS
18 VIEWS • LAST YEAR

IMPROVING SECURITY WHILE ENABLING MARKET ACCESS WITH A CCF
24 VIEWS • LAST YEAR

ISSUE MANAGEMENT CONFIDENTIAL: TOOLS AND BEST PRACTICES FOR IMPROVING IT ISSUE
MANAGEMENT
40 VIEWS • LAST YEAR

ISACA PODCAST | MINIMIZING RISK AND AUDIT REQUESTS
25 VIEWS • LAST YEAR

ISACA LIVE: GENERATIVE AI: RISKS, OPPORTUNITIES AND CRITICAL NEXT STEPS
18 VIEWS • LAST YEAR

EXPLORING THE BENEFITS OF NEURODIVERSITY WITHIN CYBERSECURITY
31 VIEWS • LAST YEAR

ISACA LIVE | CMMI MYTHBUSTING: MISCONCEPTIONS VS. REALITIES
119 VIEWS • LAST YEAR

INTERNAL AUDITS THAT CREATE STAKEHOLDER VALUE ADOPTING AN AGILE MINDSET
204 VIEWS • LAST YEAR

STRATEGIES FOR AVOIDING BURNOUT
219 VIEWS • LAST YEAR

THE DANGER OF DISTRACTION IN AUGMENTED REALITY
161 VIEWS • 335 DAYS AGO

MANAGING HUMAN RISK REQUIRES MORE THAN JUST AWARENESS TRAINING
202 VIEWS • 341 DAYS AGO

PREPARING FOR INTERRUPTIONS, DISRUPTIONS AND EMERGENCE EVENTS
401 VIEWS • 348 DAYS AGO

IS AUDIT IN PRACTICE: DATA INTEGRITY ON DEMAND
205 VIEWS • 356 DAYS AGO

PROCESSES OF ENGAGEMENT WITH SCOTT GOULD
241 VIEWS • 1 YEAR AGO

DELIVERING SECURITY VALUE TO PRODUCT TEAMS USING THE POWER OF DATA
160 VIEWS • 1 YEAR AGO

AI ETHICS AND THE ROLE OF IT AUDITORS
502 VIEWS • 1 YEAR AGO

USING A RISK-BASED APPROACH TO PRIORITIZE VULNERABILITY REMEDIATION
324 VIEWS • 1 YEAR AGO

THE TRUE COST OF A DATA BREACH
270 VIEWS • 1 YEAR AGO

2023 IT COMPLIANCE AND RISK BENCHMARK REPORT
241 VIEWS • 1 YEAR AGO

WHAT KIND OF GLASSES ARE YOU WEARING? YOUR VIEW OF RISK MAY BE YOUR BIGGEST RISK
OF ALL
264 VIEWS • 1 YEAR AGO

HOW ORGANIZATIONS CAN CONSISTENTLY REDUCE CYBERRISK
173 VIEWS • 1 YEAR AGO

KEY CONSIDERATIONS FOR CONDUCTING REMOTE IT AUDITS
210 VIEWS • 1 YEAR AGO

UNDERSTANDING AND ASSESSING ORGANIZATION CULTURE
176 VIEWS • 1 YEAR AGO

SEVEN THINGS TO KNOW BEFORE AUTOMATING IT GENERAL CONTROL AUDITS
280 VIEWS • 1 YEAR AGO

INDUSTRY SPOTLIGHT - JULIA KANOUSE
142 VIEWS • 1 YEAR AGO

ISACA LIVE | MEASURING & COMMUNICATING CYBER CAPABILITIES
207 VIEWS • 1 YEAR AGO

WHAT IS YOUR IP ADDRESS CYBERSECURITY IQ? THE ROLE OF IP ADDRESS DATA IN A
DIGITAL WORLD
192 VIEWS • 1 YEAR AGO

ISACA LIVE | THE EQUITY GEM: ACTIONABLE STEPS TO HELP CLOSE THE EQUITY GAP
63 VIEWS • 1 YEAR AGO

CONFERENCE CHATS WITH CHELSEY & ROBYN
129 VIEWS • 1 YEAR AGO

EIGHT CYBERSECURITY TRENDS TO WATCH FOR IN 2023
334 VIEWS • 1 YEAR AGO

MEASURING SECURITY RESILIENCE FROM THE LENS OF THE ADVERSARY COMMUNITY
106 VIEWS • 1 YEAR AGO

THE FUTURE OF TECHNOLOGY RISK: 4 WAYS TO BUILD STAKEHOLDER TRUST IN THE
TECHNOLOGY RISK IMPERATIVE
101 VIEWS • 1 YEAR AGO

RISKY BUSINESS – JON BRANDT
174 VIEWS • 1 YEAR AGO

ADVERTISING INFORMATION SECURITY
155 VIEWS • 1 YEAR AGO

BUILDING DIGITAL TRUST THROUGH ADVOCACY
130 VIEWS • 1 YEAR AGO

RETHINKING IDENTITY GOVERNANCE
236 VIEWS • 1 YEAR AGO

2023: THE YEAR OF RISK
341 VIEWS • 1 YEAR AGO

IMPROVING CYBER RESILIENCE IN AN AGE OF CONTINUOUS ATTACKS
292 VIEWS • 1 YEAR AGO

ISACA LIVE | DIGITAL TRUST PRIORITIES FOR PRIVACY AND EMERGING TECH
344 VIEWS • 1 YEAR AGO

ISACA LIVE - CAREER CHANGING IMPACT OF MENTORSHIP
188 VIEWS • 1 YEAR AGO

INFORMATION PRIVACY CONTRADICTION: INTEREST-BASED POSTURE OF COMPLIANCE AND
VIOLATION
272 VIEWS • 1 YEAR AGO

SHOULD CYBERSECURITY BE SUBJECT TO A SOX-TYPE REGULATION?
280 VIEWS • 1 YEAR AGO

BEWARE THE TRAPS OF DATA GOVERNANCE AND DATA MANAGEMENT PRACTICE
281 VIEWS • 1 YEAR AGO

CONVERGENCE: WHERE NEXT?
169 VIEWS • 1 YEAR AGO

DO DATA GO TO WASTE
163 VIEWS • 1 YEAR AGO

PROTECTING YOUR ENTERPRISE AND DETERRING FRAUD IN A NEW RISK ERA
313 VIEWS • 1 YEAR AGO

THE CIRCLE OF FAILURE: WHY THE CYBER SECURITY INDUSTRY DOESN’T WORK
525 VIEWS • 1 YEAR AGO

TAKING SECURITY STRATEGY TO THE NEXT LEVEL: THE CYBER KILL CHAIN VS. MITRE
ATT&CK
448 VIEWS • 1 YEAR AGO

AUDITEE BUY-IN—A KEY COMPONENT OF EFFECTIVE AUDITS
430 VIEWS • 1 YEAR AGO

BREAKING DOWN THE ESET T2 2022 THREAT REPORT
162 VIEWS • 1 YEAR AGO

ENABLING DIGITAL TRUST THROUGH CANADA’S DIGITAL CHARTER
160 VIEWS • 1 YEAR AGO

IT’S ABOUT (DOWN) TIME
179 VIEWS • 1 YEAR AGO

HOW SOCIAL ENGINEERING BYPASSES TECHNICAL CONTROLS
481 VIEWS • 1 YEAR AGO

WHAT MAKES RISK ASSESSMENTS SO UNPLEASANT AND HOW TO CHANGE THAT
291 VIEWS • 1 YEAR AGO

ISACA CYBERPROS – NAOMI BUCKWALTER
808 VIEWS • 1 YEAR AGO

QUANTIFYING THE QUALITATIVE RISK ASSESSMENT
495 VIEWS • 1 YEAR AGO

INDUSTRY SPOTLIGHT WITH ALI PABRAI
487 VIEWS • 1 YEAR AGO

HOW TO MATURE YOUR PRIVACY COMPLIANCE PROGRAM: A CONVERSATION WITH ONETRUST DPO
LINDA THIELOVA
330 VIEWS • 1 YEAR AGO

MANAGING CYBERSECURITY RISK AS ENTERPRISE RISK
501 VIEWS • 1 YEAR AGO

IMPLEMENTING ARTIFICIAL INTELLIGENCE: CAPABILITIES AND RISK
270 VIEWS • 1 YEAR AGO

AUDIT IN PRACTICE: AUDITING CULTURE
368 VIEWS • 1 YEAR AGO

INCIDENT REPORT & CONTINUOUS CONTROL MONITORING
165 VIEWS • 1 YEAR AGO

ISACA LIVE | ADVANCING DIGITAL TRUST THROUGH IT
190 VIEWS • 1 YEAR AGO

INDUSTRY SPOTLIGHT - LISA YOUNG
306 VIEWS • 1 YEAR AGO

ISACA LIVE | THE DARK FUTURE OF PRIVACY
105 VIEWS • 1 YEAR AGO

FOCO DE LA INDUSTRIA - ARNULFO ESPINOSA DOMINGUEZ, PARTE II
225 VIEWS • 1 YEAR AGO

ETHICAL AI SHIFTING THE CONVERSATION LEFT
98 VIEWS • 1 YEAR AGO

FOCO DE LA INDUSTRIA - ARNULFO ESPINOSA DOMINGUEZ, PARTE I
159 VIEWS • 1 YEAR AGO

WHY (AND HOW TO) DISPOSE OF DIGITAL DATA
236 VIEWS • 1 YEAR AGO

INDUSTRY SPOTLIGHT - JOHANN DETTWEILER, PART II
201 VIEWS • 1 YEAR AGO

INDUSTRY SPOTLIGHT - JOHANN DETTWEILER, PART I
463 VIEWS • 1 YEAR AGO

ACHIEVING EFFECTIVE CLOUD RISK MANAGEMENT
743 VIEWS • 1 YEAR AGO

ADVANCING DIGITAL TRUST THROUGH DATA PRIVACY
413 VIEWS • 1 YEAR AGO

INDUSTRY SPOTLIGHT - DR. BLAKE CURTIS PART II
357 VIEWS • 1 YEAR AGO

INDUSTRY SPOTLIGHT - DR. BLAKE CURTIS, PART I
866 VIEWS • 1 YEAR AGO

INDUSTRY SPOTLIGHT - ARNULFO ESPINOSA DOMINGUEZ, PART II
107 VIEWS • 1 YEAR AGO

CAREER COACH ADVICE: HOW TO LAUNCH YOUR IT AUDIT CAREER
518 VIEWS • 1 YEAR AGO

INDUSTRY SPOTLIGHT - ARNULFO ESPINOSA DOMINGUEZ, PART I
270 VIEWS • 1 YEAR AGO

CURRENT STATE OF CYBERSECURITY IN K12
386 VIEWS • 1 YEAR AGO

INDUSTRY SPOTLIGHT - TODD FITZGERALD
262 VIEWS • 1 YEAR AGO

MANAGING SECURITY ACROSS DISPARATE DATABASE TECHNOLOGIES
323 VIEWS • 1 YEAR AGO

ADVANCING DIGITAL TRUST THROUGH AUDIT AND ASSURANCE
405 VIEWS • 1 YEAR AGO

IMPLEMENTING EMERGING TECHNOLOGIES: AGILE SDLC STILL WORKS
203 VIEWS • 1 YEAR AGO

ISACA LIVE | MANAGING SUPPLY CHAIN RISK WITH RICHARD HOLLIS
305 VIEWS • 1 YEAR AGO

INDUSTRY SPOTLIGHT - PAM NIGRO
245 VIEWS • 1 YEAR AGO

THE IMPACT OF PEOPLE ON THE INFORMATION TECHNOLOGY LANDSCAPE
125 VIEWS • 1 YEAR AGO

GRC FOR INTELLIGENT ECOSYSTEMS (GRCIE): AN INNOVATIVE APPROACH TO WORKFORCE
ENABLEMENT PART II
58 VIEWS • 1 YEAR AGO

GRC FOR INTELLIGENT ECOSYSTEMS (GRCIE): AN INNOVATIVE APPROACH TO WORKFORCE
ENABLEMENT PART I
294 VIEWS • 1 YEAR AGO

SMARTER TESTING = SAFER DIGITAL EXPERIENCES
388 VIEWS • 1 YEAR AGO

DATA RESILIENCE
250 VIEWS • 1 YEAR AGO

TWO PERSPECTIVES ON DATA RESILIENCE: DATA OPERATING MODEL AND DATA CAPABILITIES
128 VIEWS • 1 YEAR AGO

KEY CONSTRUCTS OF A RESILIENT SYSTEM
70 VIEWS • 1 YEAR AGO

DATA CAPABILITY FAILURES
34 VIEWS • 1 YEAR AGO

ATTRIBUTES OF DATA RESILIENCE
73 VIEWS • 1 YEAR AGO

CONSIDERING THE VARIOUS TYPES OF DATA RISKS
65 VIEWS • 1 YEAR AGO

BENEFITS OF DATA RESILIENCE
83 VIEWS • 1 YEAR AGO

ENSURING YOUR ORGANIZATION IS DATA RESILIENT
51 VIEWS • 1 YEAR AGO

DATA RISK ASSESSMENTS AND THE JOURNEY OF DATA RESILIENCE
62 VIEWS • 1 YEAR AGO

CYBER DECISIONS ONLY EXECUTIVES CAN MAKE
257 VIEWS • 1 YEAR AGO

BREAKING DOWN THE ESET T1 2022 THREAT REPORT
270 VIEWS • 1 YEAR AGO

REAL-WORLD DATA RESILIENCE
254 VIEWS • 2 YEARS AGO

WHERE PRIVACY MEETS SECURITY
528 VIEWS • 2 YEARS AGO

HOW TO BUILD A FOLLOWING AROUND YOUR IDEAS
186 VIEWS • 2 YEARS AGO

STUDY YOUR SOCIAL MEDIA ENVIRONMENT
32 VIEWS • 2 YEARS AGO

PRIVACY AND SOCIAL MEDIA
93 VIEWS • 2 YEARS AGO

CYBERSECURITY CERTIFICATION AND MITIGATING RISK
63 VIEWS • 2 YEARS AGO

INDUSTRY SPOTLIGHT: JAN ANISIMOWICZ
233 VIEWS • 2 YEARS AGO

CLIMATE RESILIENCY AND REGULATION
267 VIEWS • 2 YEARS AGO

CYBERSECURITY IN A COVID-19 WORLD: INSIGHTS ON HOW DECISIONS ARE MADE
140 VIEWS • 2 YEARS AGO

INDUSTRY SPOTLIGHT: CAITLIN MCGAW
189 VIEWS • 2 YEARS AGO

INDUSTRY SPOTLIGHT: ED MCCABE
486 VIEWS • 2 YEARS AGO

CYBER (BUSINESS) RECOVERY
581 VIEWS • 2 YEARS AGO

INDUSTRY SPOTLIGHT – NIKI GOMES
208 VIEWS • 2 YEARS AGO

MANAGING DATA PRIVACY RISKS AND COMPLIANCE WITH A DISTRIBUTED WORKFORCE
561 VIEWS • 2 YEARS AGO

CMMC AND CUI: ROCKET FUEL
190 VIEWS • 2 YEARS AGO

A SECURITY AWARENESS PROGRAM FOR PCI-DSS COMPLIANCE
738 VIEWS • 2 YEARS AGO

INDUSTRY SPOTLIGHT - JO STEWART-RATTRAY
299 VIEWS • 2 YEARS AGO

THE TRANSFORMATIVE POWER OF MOBILITY
170 VIEWS • 2 YEARS AGO

INDUSTRY SPOTLIGHT WITH RAVEN DAVID
254 VIEWS • 2 YEARS AGO

PRIVACY FOR SALE
330 VIEWS • 2 YEARS AGO

ENSURING THAT CYBERSECURITY IS EVERYONE’S JOB
349 VIEWS • 2 YEARS AGO

CYBERPROS - ZERO TRUST: HOW TO BEAT ADVERSARIES AT THEIR OWN GAME FEATURING DR.
ZERO TRUST
534 VIEWS • 2 YEARS AGO

RISING STAKES FOR PROTECTING CRITICAL INFRASTRUCTURE TEASER
122 VIEWS • 2 YEARS AGO

RISING STAKES FOR PROTECTING CRITICAL INFRASTRUCTURE TEASER
195 VIEWS • 2 YEARS AGO

BREAKING DOWN THE ESET T3 2021 THREAT REPORT
68 VIEWS • 2 YEARS AGO

BUILDING DIGITAL TRUST IN A FINTECH START UP
303 VIEWS • 2 YEARS AGO

LESSONS LEARNED FROM A YEAR OF REMOTE WORK
365 VIEWS • 2 YEARS AGO

UNPACKING PAKISTAN’S CYBERSECURITY POLICY 2021
337 VIEWS • 2 YEARS AGO

USING XDR AND ZERO TRUST TO COMBAT RANSOMWARE
306 VIEWS • 2 YEARS AGO

WHAT IS ENVIRONMENT, SOCIAL, AND GOVERNANCE (ESG)?
213 VIEWS • 2 YEARS AGO

THE IMPACT OF SOX ON THE INDUSTRY 20 YEARS AGO AND TODAY WITH CINDY BAXTER
453 VIEWS • 2 YEARS AGO

PRIVACY IN THE DARK (DATA)
193 VIEWS • 2 YEARS AGO

CYBERPROS - 2022 INDUSTRY NEWS WRAP
124 VIEWS • 2 YEARS AGO

ISACA CYBER PRO CHATS WITH NAOMI BUCKWALTER
275 VIEWS • 2 YEARS AGO

WHAT WILL IT TAKE TO REACH DEVSECOPS MATURITY?
80 VIEWS • 2 YEARS AGO

THE LOG4SHELL VULNERABILITY: STEPS TO TAKE NOW AND GOOD PRACTICES FOR THE FUTURE
560 VIEWS • 2 YEARS AGO

SECURITY OPERATIONS CHALLENGES IN 2021
193 VIEWS • 2 YEARS AGO

INFORMATION SECURITY PROGRAMS NEED TO BE UBIQUITOUS, PROACTIVE, AND VIGILANT
171 VIEWS • 2 YEARS AGO

HOW INNOVATIVE ENTERPRISES WIN WITH SECURE MACHINE LEARNING
199 VIEWS • 2 YEARS AGO

HCL STATE OF CYBERSECURITY 2021
459 VIEWS • 2 YEARS AGO

ISACA’S NEW CYBERPRO – JON BRANDT
121 VIEWS • 2 YEARS AGO

THE CYBERSECURITY WORKFORCE
362 VIEWS • 2 YEARS AGO

EMERGING TECHNOLOGY - BLOCKCHAIN
498 VIEWS • 2 YEARS AGO

SOCIAL MEDIA HACKING RISK
132 VIEWS • 2 YEARS AGO

DANGERS OF SOCIAL MEDIA
130 VIEWS • 2 YEARS AGO

HOW DO ORGANIZATIONS CONTROL THEIR USE OF SOCIAL MEDIA
75 VIEWS • 2 YEARS AGO

FAKE BUSINESS VS YOUR REPUTATION
36 VIEWS • 2 YEARS AGO

AUDITING RISK BENEFIT ANALYSIS
68 VIEWS • 2 YEARS AGO

CAN YOU MANAGE RISK WITHOUT MEASURING?
99 VIEWS • 2 YEARS AGO

RISK APPETITE & TOLERANCE
445 VIEWS • 2 YEARS AGO

LAW AND REGULATIONS
45 VIEWS • 2 YEARS AGO

RISK QUANTIFICATION
166 VIEWS • 2 YEARS AGO

BOARD STRUCTURE AND COMMUNICATION
84 VIEWS • 2 YEARS AGO

CYBER RISK AS A STRATEGIC RISK
116 VIEWS • 2 YEARS AGO

COMMUNICATING CYBER RISK TO BOARDS
222 VIEWS • 2 YEARS AGO

GAINING EXECUTIVE LEADERSHIP SUPPORT FOR SECURITY CHANGES
126 VIEWS • 2 YEARS AGO

BACKGROUND ON THE CMMC MODEL
64 VIEWS • 2 YEARS AGO

SETTING UP AN SOC FOR SUCCESS
55 VIEWS • 2 YEARS AGO

THE TRANSITION FROM “TRUST BUT VERIFY” TO “ZERO-TRUST”
58 VIEWS • 2 YEARS AGO

MITIGATING APT RISK
31 VIEWS • 2 YEARS AGO

DEFENSE AGAINST APT ATTACKS
81 VIEWS • 2 YEARS AGO

HOW ORGANIZATIONS SHOULD DEAL WITH APTS
61 VIEWS • 2 YEARS AGO

WHY ORGANIZATIONS SHOULD REIMAGINE THEIR CYBERDEFENSES
119 VIEWS • 2 YEARS AGO

GAINING DIGITAL TRUST BY ELIMINATING PRIVACY DARK PATTERNS
531 VIEWS • 2 YEARS AGO

BUILDING CUSTOMER TRUST THROUGH PRIVACY
248 VIEWS • 2 YEARS AGO

PROTECTING AND GOVERNING PERSONAL DATA
180 VIEWS • 2 YEARS AGO

BRINGING TECHNICAL AND LEGAL PRIVACY PROFESSIONALS TOGETHER
289 VIEWS • 2 YEARS AGO

IMPLEMENTING THE NEEDED PRIVACY CONTROLS
255 VIEWS • 2 YEARS AGO

A SEAT AT THE TABLE FOR PRIVACY
125 VIEWS • 2 YEARS AGO

ISACA LIVE: RISK SCENARIOS
1K VIEWS • 2 YEARS AGO

ISACA LIVE: CRITICAL INFRASTRUCTURE SECURITY
599 VIEWS • 2 YEARS AGO

ISACA JOURNAL TURNS 50!
180 VIEWS • 2 YEARS AGO

ISACA LIVE: THE PRIVACY LANDSCAPE IN 2022
178 VIEWS • 2 YEARS AGO

INTRODUCING ISACA’S STRATEGIC PLAN
688 VIEWS • 2 YEARS AGO

ISACA LIVE: ULTRA EMERGING TECH PART IX–WHAT IS NEXT WITH EMERGING TECHNOLOGY
AND QA
246 VIEWS • 2 YEARS AGO

ISACA LIVE: ULTRA EMERGING TECH PART VIII–WHY SHOULD XR/VR MATTER TO OUR
VIEWERS?
173 VIEWS • 2 YEARS AGO

ISACA LIVE: ULTRA EMERGING TECH PART VII–WHAT IS XR AND VR?
109 VIEWS • 2 YEARS AGO

ISACA LIVE: ULTRA EMERGING TECH PART VI–WHY SHOULD “INTERNET OF BEHAVIORS”
MATTER TO OUR VIEWERS?
44 VIEWS • 2 YEARS AGO

ISACA LIVE: ULTRA EMERGING TECH PART V–WHAT IS INTERNET OF BEHAVIORS?
48 VIEWS • 2 YEARS AGO

ISACA LIVE: ULTRA EMERGING TECH PART IV–WHY SHOULD NANO-TECHNOLOGY MATTER TO OUR
VIEWERS?
39 VIEWS • 2 YEARS AGO

ISACA LIVE: ULTRA EMERGING TECH PART III–WHAT IS NANO-TECHNOLOGY?
33 VIEWS • 2 YEARS AGO

ISACA LIVE: ULTRA EMERGING TECH PART II–WHY SHOULD QUANTUM COMPUTING MATTER TO
OUR VIEWERS?
35 VIEWS • 2 YEARS AGO

ISACA LIVE: ULTRA EMERGING TECH PART I–WHAT IS QUANTUM COMPUTING?
59 VIEWS • 2 YEARS AGO

ISACA LIVE: ULTRA EMERGING TECH (FULL VERSION)
346 VIEWS • 2 YEARS AGO

ISACA LIVE: EMERGING TECH - CLOUD (SHORT VERSION)
115 VIEWS • 2 YEARS AGO

ISACA LIVE: EMERGING TECH - CLOUD
228 VIEWS • 2 YEARS AGO

ISACA LIVE: STATE OF CYBERSECURITY PT. 2
155 VIEWS • 2 YEARS AGO

ISACA LIVE: GLOBAL STRATEGY
224 VIEWS • 2 YEARS AGO

ISACA LIVE EMERGING TECH SESSION - AI
285 VIEWS • 2 YEARS AGO

ISACA’S DIGITAL TRANSFORMATION PART III — THE DIGITAL MEMBER EXPERIENCE
238 VIEWS • 2 YEARS AGO

ISACA LIVE WITH DUSTIN BREWER AND KRISTEN KESSINGER
158 VIEWS • 2 YEARS AGO

ISACA’S DIGITAL TRANSFORMATION PART II — PEOPLE, PROCESS, AND TECHNOLOGY
239 VIEWS • 2 YEARS AGO

ISACA’S DIGITAL TRANSFORMATION PART I —POSITIVE POTENTIAL OF TECHNOLOGY
345 VIEWS • 2 YEARS AGO

INDUSTRY SPOTLIGHT: MARK THOMAS
410 VIEWS • 2 YEARS AGO

US DOD’S CMMC GUIDELINES — WHAT YOU NEED TO KNOW
124 VIEWS • 2 YEARS AGO

SECURITY AS A SERVICE
85 VIEWS • 2 YEARS AGO

IT AUDIT IN PRACTICE: SURVIVAL WHEN YOU ARE SMALL-BUSINESS CONTINUITY AND
RESILIENCE
117 VIEWS • 2 YEARS AGO

PRIVACY-PRESERVING ANALYTICS AND SECURE MULTIPARTY COMPUTATION
175 VIEWS • 2 YEARS AGO

WHY SHOULD I LISTEN TO YOU?
73 VIEWS • 2 YEARS AGO

ISACA LIVE WITH DUSTIN BREWER AND KRISTEN KESSINGER (SHORT VERSION)
2 YEARS AGO

CYBERSECURITY ISN’T REAL, RIGHT? WRONG!
182 VIEWS • 2 YEARS AGO

JUST THE FAX ON CYBERSECURITY
127 VIEWS • 3 YEARS AGO

ADVANCED SECURITY FOR SECRET INFORMATION
210 VIEWS • 3 YEARS AGO

Welcome to Episode 4 of "The Cyber Standard Podcast"! Join host Ameet Jugnauth,
Vice President of the London Chapter of ISACA, as he delves into the world of
cybersecurity standardization. In this episode, titled "Becoming a License
Body," Ameet is joined by esteemed guests Bryan Lillie, Strategic Technical Lead
at the UK Cyber Security Council, and Peter Leitch, Co-Founder and Managing
Partner at ANSEC. Together, they explore the intricacies of licensed bodies in
shaping the cyber profession. Don't miss this insightful conversation! Explore
Further: Delve deeper into the subject with additional resources provided in the
episode description.
https://www.isaca.org/about-us/newsroom/press-releases/2023/uk-cyber-security-council-partners-with-isaca-for-audit-and-assurance-pilot-scheme

View More
 * Search
 * Digital Trust
 * Member Benefits
 * ISACA Community
 * Credentialing
 * Podcasts
   * Enterprise Performance
   * ISACA Foundation
   * IT Trends
     
   * Podcasts
   * ISACAVision
   * COBIT
   * Conferences and Events
   * Archive

Search

FILTERS

VIDEO TYPE

 * Archive
 * Cobit
 * Conferences & Events
 * Credentialing
 * Digital Trust
 * Emerging Tech
 * Enterprise Performance
 * ISACA Community
 * ISACA Foundation
 * ISACAvision
 * IT Trends
 * Member Benefits
 * Podcasts

DOMAIN

 * Audit & Assurance
 * Emerging Technology
 * Governance
 * Information Security
 * Information Technology
 * Privacy
 * Risk

CREDENTIALS

 * CDPSE®
 * CERTIFICATE
 * CERTIFICATION
 * CET
 * CGEIT®
 * CISA®
 * CISM®
 * CRISC
 * CSX-P
 * ITCA

SUBJECTS

 * Artificial Intelligence
 * Blockchain
 * Career and Leadership
 * Certification Exam Prep
 * Cloud Computing
 * CMMI
 * COBIT
 * Compliance
 * COVID 19
 * Credentialing Certification
 * Cybersecurity
 * Data Governance
 * Data Science
 * Digital Transformation
 * Digital Trust
 * Emerging Technologies
 * IamISACA
 * Internet of Things
 * ISACA
 * Network Infrastructure
 * Public Affairs
 * Remote Work
 * She Leads Tech
 * Software Development
 * Threats and Controls
 * Vendor Management
 * Young Professionals

LANGUAGE

 * Arabic
 * Brazilian Portuguese
 * Chinese Simplified
 * Chinese Traditional
 * English
 * French
 * German
 * Hebrew
 * Hungarian
 * Italian
 * Japanese
 * Korean
 * Lithuanian
 * Polish
 * Portuguese
 * Romanian
 * Russian
 * Slovenian
 * Spanish
 * Thai
 * Turkish
 * Ukrainian

16 of 597 Results

VIDEO


THE CYBER STANDARD PODCAST | EPISODE 4

Welcome to Episode 4 of "The Cyber Standard Podcast"! Join host Ameet Jugnauth,
Vice President of the London Chapter of ISACA, as he delves into the world of
cybersecurity standardization. In this episode, titled "Becoming a License
Body," Ameet is joined by esteemed guests Bryan Lillie, Strategic Technical Lead
at the UK Cyber Security Council, and Peter Leitch, Co-Founder and Managing
Partner at ANSEC. Together, they explore the intricacies of licensed bodies in
shaping the cyber profession. Don't miss this insightful conversation! Explore
Further: Delve deeper into the subject with additional resources provided in the
episode description.
https://www.isaca.org/about-us/newsroom/press-releases/2023/uk-cyber-security-council-partners-with-isaca-for-audit-and-assurance-pilot-scheme

18 views • 9 days ago

VIDEO


ISACA LIVE: THE AI REALITY--WHERE WE ARE NOW AND WHERE WE NEED TO BE

ISACA's Karen Heslop and Jon Brandt share the results of ISACA's 2024 AI Pulse
Poll, including where organizations are now in terms of policy, training, ethics
and more--and where they need to be. Get the survey results, see how your
organization compares, and learn about the resources ISACA has to help you
navigate your future in an AI world.

13 views • 2 months ago

VIDEO


EXPLORING CISA MOTIVATIONS

CISA-certified professionals share what motivated them to pursue ISACA’s CISA
credential.

13 views • 3 months ago

VIDEO


BENEFITS OF OBTAINING YOUR CISA

From meeting job requirements to more pay to increased standing in their
careers, CISA-holders detail some of the benefits they have gained from earning
the CISA.

16 views • 3 months ago

VIDEO


TIPS ON PREPARING FOR YOUR ISACA CERTIFICATION

ISACA-certified professionals offer tips of how certification candidates can
position themselves for success on exam day.

29 views • 3 months ago

VIDEO


UNLOCKING STRATEGIC VALUE FROM A BUG BOUNTY PROGRAM

Are you curious about how to maximize the strategic value and impact of your bug
bounty program? In this episode, you can learn how Adobe continuously develops
and improves its bounty program to engage security researchers and hackers
globally and improve its security posture from an adversary perspective. In this
ISACA Podcast, Chris McGown, ISACA's Information Security Professional Practices
Principal, chats with Alex Stan, Product Security Engineer and member of the
Product Security Incident Response Team (PSIRT), discusses the value of bug
bounty programs and shares how you can develop a metrics-driven approach to
enhance the internal security testing and detection capabilities of your
organization. Explore Further: Delve deeper into the subject with additional
resources
https://blog.developer.adobe.com/adobe-announces-researcher-hall-of-fame-initiative-for-security-researchers-5e677286dbd6
https://blog.developer.adobe.com/researcher-q-a-aem-solution-architect-by-day-adobe-bug-bounty-hunter-by-night-aed39a4750e4
https://blog.developer.adobe.com/attention-security-researchers-level-up-your-skills-and-join-our-private-bug-bounty-program-2da9d5979d8b
https://blog.developer.adobe.com/adobe-recap-2023-ambassador-world-cup-final-four-df701e1a1b12

27 views • 4 months ago

VIDEO


THE CYBER STANDARD PODCAST | EPISODE 2

Welcome to Episode 2 of "The Cyber Standard Podcast"! Join host Ameet Jugnauth,
Vice President of the London Chapter of ISACA, as he delves into the intricacies
of cybersecurity standardization. In this episode, titled "Audit and Assurance,"
Ameet is joined by esteemed guests Leanne Sperry, Project Manager for Standards
Development at the UK Cyber Security Council, and Mike Hughes, the ISACA
Immediate Past President for ISACA Central UK. Together, they explore key
challenges, lessons learned, and insights from related workshops in the realm of
Audit and Assurance. Don't miss this insightful conversation! Explore Further:
Delve deeper into the subject with additional resources provided in the episode
description.
https://www.isaca.org/about-us/newsroom/press-releases/2023/uk-cyber-security-council-partners-with-isaca-for-audit-and-assurance-pilot-scheme

28 views • 4 months ago

VIDEO


ISACA LIVE | SHELEADSTECH - INTERNATIONAL WOMEN'S DAY

Join Kristine O'Sullivan from ISACA as she celebrates International Women's Day
alongside SheLeadsTech Advisory Council member Anna Murray and Sushila Nair,
Vice President of ISACA's Greater Washington D.C. Chapter.

17 views • 4 months ago

VIDEO


ISACA 2024 NORTH AMERICA CONFERENCE TEASER

Don’t miss out on your chance to earn up to 26 CPE’s. Join us in Phoenix or
online! To register today at
https://www.isaca.org/training-and-events/conferences/isaca-2024-north-america-conference

26 views • 5 months ago

VIDEO


REFLECTING ON 25 YEARS OF INFORMATION SECURITY MATTERS

ISACA recently marked the 25th anniversary of Steve Ross’ ISACA Journal
Information Security Matters column. Over the last quarter century, technology,
security, and the workforce have evolved, while certain challenges remain the
same. In this ISACA Podcast episode, Safia Kazi speaks to Steve about how he
started writing for the Journal, societal shifts in security’s perception, and
how writing skills are invaluable for anyone in the security industry.

28 views • 5 months ago

VIDEO


A VIEW INTO CTEM EXPOSURE MANAGEMENT: REDUCING YOUR ATTACK SURFACE 3X

Organizations can no longer rely on legacy vulnerability management solutions to
protect against even basic attacks. Instead, vulnerability management is just
one small component in a unified continuous threat exposure management (CTEM)
approach to securing an enterprise from malicious intruders and ransomware. In
addition to vulnerability management, security around misconfigurations,
patching, identity, software, external attack surfaces, and more must be
included. In this ISACA Podcast, Nanitor Chief Strategist Derek Melber explains
that an organization can prevent breaches and ransomware by taking an
asset-centric prioritized-security approach that includes all of these security
areas.

11 views • 5 months ago

VIDEO


ISACA LIVE | ISACA 2024 VIRTUAL CONFERENCE KEYNOTES PREVIEW

Our regional conference, 20-22 February, features three remarkable keynotes: RV
Raghu (Asia-Pac, 20 Feb), Mike Echols (Americas, 21 Feb) and Tichaona Zororo
(EMEA, 22 Feb). They are joined by ISACA's Paul Phillips for a preview of their
keynote presentations and the region-focused content at our upcoming event.

4 views • 5 months ago

VIDEO


ISACA LIVE | DATA PRIVACY PRIORITIES IN 2024

Join Lisa McKee and Safia Kazi as they discuss the latest data privacy
challenges, priorities and opportunities, and share insights from ISACA's latest
Privacy in Practice 2024 research report.

27 views • 6 months ago

VIDEO


2023 ACADEMIC SCHOLARSHIP PROGRAM RECAP

Read more about the scholarship program:
https://isaca.secure-platform.com/a/page/oitscholarship/aboutscholarships

11 views • 6 months ago

VIDEO


LEVERAGING AGILE CONCEPTS FOR NEURODIVERSE AUDITORS

In this ISACA Podcast episode, we’ll delve into how leveraging Agile concepts
can mitigate common challenges neurodiverse auditors face in the workplace.
Neurodivergent auditors can bring a fresh and dynamic energy to projects if
given appropriate accommodation. Join us as ISACA's Robin Lyons chats with
Program External Audit IT Program Manager Amanda Tucker as they explore small
changes that can significantly impact not only neurodiverse individuals on your
team but the entire team itself.

18 views • last year

VIDEO


IMPROVING SECURITY WHILE ENABLING MARKET ACCESS WITH A CCF

Software-as-a-Service (SaaS) providers continue to face increasing customer
demand to attain security compliance certifications that demonstrate commitment
to security, privacy, confidentiality, and more. Pursuing every national and
international certification individually results in a repetitive cycle of
ongoing walkthroughs, interviews, testing, and evidence requests (i.e., audits).
A central CCF can be considered a one-stop shop response to the complex alphabet
soup of compliance standards on the market today. In this ISACA Podcast episode,
ISACA's Chris McGowan listens in as James Huang, Global Cloud Compliance Senior
Manager explains why having a central CCF can help various product engineering
teams meet their security compliance needs and understand the level of effort
required for each compliance certification.

24 views • last year
Load More

VIDEO


ISSUE MANAGEMENT CONFIDENTIAL: TOOLS AND BEST PRACTICES FOR IMPROVING IT ISSUE
MANAGEMENT

Effective IT issue management is crucial for organizations to mitigate financial
loss, reputational damage, and operational disruptions. Issue management tools
streamline the process by tracking and resolving issues, while risk rating helps
prioritize responses based on their impact and likelihood. In this ISACA Podcast
episode, ISACA's GRC Professional Practices Principal, Lisa Cook chats with IT
Risk Manager, Eric Peck about why acknowledging and addressing high-risk issues
with a structured approach empowers organizations to protect themselves and
ensure compliance in today's complex regulatory landscape.

40 views • last year

VIDEO


ISACA PODCAST | MINIMIZING RISK AND AUDIT REQUESTS

With the increasing demand for audits and risk assessments, artifact requests
will not be going away anytime soon. However, the burden these activities bring
to the organization can be drastically reduced when audit and risk work
together. In this ISACA Podcast episode, Paul Phillips, Director of Event
Content Development at ISACA, hosts Staff Governance, Risk, and Compliance
Analyst, Benjamin Bartz. Ben takes a deeper dive and elaborates on some of the
must-haves for this partnership to live to its full potential.

25 views • last year

VIDEO


ISACA’S DIGITAL TRUST WORLD DUBLIN 2023: SEE WHAT YOU MISSED AND JOIN US NEXT
YEAR!

ISACA’s Digital Trust World Dublin 2023: See What You Missed and Join Us Next
Year!

18 views • last year

VIDEO


HOW TO PROPEL YOUR IT AUDIT CAREER

IT auditors and audit leaders share insights from their careers and tips for
auditors new to the field and those looking to advance. Watch this video to
learn how to boost your audit career. To learn more, go to
https://www.isaca.org/campaigns/career-pathways

31 views • last year

VIDEO


HOW TO PROPEL YOUR IT AUDIT CAREER

IT auditors and audit leaders share insights from their careers and tips for
auditors new to the field and those looking to advance. Watch this video to
learn how to boost your audit career. To learn more, go to
https://www.isaca.org/campaigns/career-pathways

22 views • last year

VIDEO


ISACA LIVE: GENERATIVE AI: RISKS, OPPORTUNITIES AND CRITICAL NEXT STEPS

AI expert and author Raef Meeuwisse will share insights from ISACA's brand-new
generative AI research and outline the top concerns, opportunities and next
steps organizations should be taking.

18 views • last year

VIDEO


EXPLORING THE BENEFITS OF NEURODIVERSITY WITHIN CYBERSECURITY

Neurodiversity within cybersecurity offers many benefits but requires
organizations and hiring managers re-evaluate hiring practices and job
descriptions typically structured for neurotypical applicants. Join ISACAs
Director of Professional Practices and Innovation as he hosts a conversation
with a company helping to remove barriers and maximize the value neurodiverse
talent bring to cybersecurity.

31 views • last year

VIDEO


ACADEMIC AND WORKFORCE DEVELOPMENT PARTNERSHIP PROGRAM

Learn more about ISACA’s Academic and Workforce Program and how it can benefit
your institution and its students. Our customizable program provides in-demand
skills and credentials to begin a career in IT audit, risk, security,
cybersecurity, governance, or privacy. For more information, please visit
https://www.isaca.org/academic-partnership

39 views • last year

VIDEO


ISACA MEMBER BENEFITS AND COMMUNITY

ISACA CMO Julia Kanouse shares the many ISACA member benefits that strengthen
our community, expand your professional network, help you grow as a thought
leader and earn CPE, and enjoy exclusive discounts Learn more at
https://www.isaca.org/membership/become-a-member/member-benefits.

18 views • last year

VIDEO


ISACA IT AUDIT CAREER PATHWAYS

ISACA provides you with the resources you need to take the next step in your IT
Audit career. Click to learn more,
https://www.isaca.org/campaigns/career-pathways

166 views • last year

VIDEO


ISACA LIVE | CMMI MYTHBUSTING: MISCONCEPTIONS VS. REALITIES

ISACA's COO Simona Rollinson and CMMI Lead Appraisers discuss common
misconceptions around CMMI and what the reality is. Think CMMI is only for large
organizations? Think again. Is CMMI only for government contractors or software
development companies? No! Organizations from all industries across the globe
are using it. Watch for more! For more information, visit:
https://cmmiinstitute.com/

119 views • last year

VIDEO


INTERNAL AUDITS THAT CREATE STAKEHOLDER VALUE ADOPTING AN AGILE MINDSET

Agile Scrum is a lightweight framework that promises to significantly improve
internal audits by creating a mindset that generates stakeholder value through
adaptive solutions for complex auditing problems. This mindset is needed as
organizations face unprecedented changes and pressures in today's business
landscape. Internal audits must keep leaders informed and aware of potential
risks. Such a mindset addresses some of the often-experienced auditing
challenges such as a lack of senior management support, insufficient audit
preparation time, difficult auditees and lack of time needed to write audit
results. Featuring special guest Thomas Bell and hosted by ISACA's Robin Lyons.

204 views • last year

VIDEO


CMMI TECH TALK: USING THE ORGANIZATIONAL BEHAVORIAL TOOLKIT

Learn how to use the CMMI Organizational Behavior Toolkit. For more information,
visit https://cmmiinstitute.com/

106 views • last year

VIDEO


STRATEGIES FOR AVOIDING BURNOUT

Chronic workplace stress can lead to burnout, which poses a significant risk to
the mental health of busy professionals, such as auditors. But how can these
professionals protect themselves from burnout? And how can their employers help
them do so? If you are interested in learning the answers to these questions,
then watch as ISACA’s Robin Lyons and Dr. Elena Klevsky, Assistant Professor of
Accounting at the University of Tampa, discuss strategies for avoiding burnout.
Inspired by the Sustainable Model of Human Energy proposed by Ryan Quinn,
Gretchen Spreitzer and Chak Fu Lam, these strategies focus on managing your
personal energy by increasing resources, decreasing job demands, practicing
skills and tasks, and monitoring energy. Properly implementing these strategies
has the potential to help busy professionals ensure that they have sufficient
resources to meet their job demands, and, therefore, increase the likelihood
that they feel energized instead of exhausted.

219 views • last year

VIDEO


THE DANGER OF DISTRACTION IN AUGMENTED REALITY

While users of technology are becoming more educated in how to avoid
cyberattacks such as phishing, a distracted user might be more prone to missing
signs of social engineering. This project explored whether users immersed in
augmented reality applications were more inclined to fall for an on-screen text
message that prompted familiarity (such as a friend calling in) or urgency (such
as a warning to update software or be subject to an automatic device re-boot
within a certain timeframe). Featuring special guest Sarah Katz and hosted by
ISACA's Collin Beder.

161 views • 335 days ago

VIDEO


MOVE YOUR CAREER FORWARD WITH ISACA’S MEMBER-EXCLUSIVE BENEFITS

Discover how ISACA’s member-exclusive benefits can deliver you the knowledge,
skills and resources you need to ADVANCE YOUR CAREER. And for a limited time,
when you sign up for a 2024 membership, you get the rest of 2023 FREE. That’s
right—join ISACA for 2024 and start your membership today! To JOIN & SAVE,
visit: www.isaca.org/advanced-membership To explore ISACA’s member-exclusive
benefits, visit:
https://www.isaca.org/membership/become-a-member/member-benefits

186 views • 340 days ago

VIDEO


MEMBER GET A MEMBER (MGAM) - TESTIMONIALS

In this video, you will hear firsthand from members on the immense value of
ISACA’s Member Get a Member (MGAM) referral program. Members discuss why they
choose to participate and what they learn in return. The 2023 MGAM program
provides members an opportunity to recruit new members by sharing the benefits
of being part of a 165,000 community of likeminded professionals and earn
cash-based rewards while doing it.

134 views • 340 days ago

VIDEO


MANAGING HUMAN RISK REQUIRES MORE THAN JUST AWARENESS TRAINING

A comprehensive information security awareness program must be in place to
ensure that employees are aware of and educated about the threats they may
encounter at the workplace. The workforce needs to be prepared to know how to
respond to these threats. It all starts with a risk assessment to identity the
most critical of risks that need to be mitigated through preparedness. Making
security a part of the organization’s culture reduces these risks to an
acceptable level. Featuring special guest Chris Madeksho and hosted by ISACA's
Lisa Cook.

202 views • 341 days ago

VIDEO


ISACA COMMUNITY SPOTLIGHT

Want to feel engaged and inspired? Watch our Community Spotlight; a video
highlighting a variety of our initiatives and contributions showcasing who we
are at the core.

196 views • 347 days ago

VIDEO


PREPARING FOR INTERRUPTIONS, DISRUPTIONS AND EMERGENCE EVENTS

This podcast speaks about how an Information Systems (IS) Auditor can prepare
for the Interruptions, Disruptions and the Emergence events that happen to the
business and to technology. Describing the features of Interruptions,
Disruptions and Emergence events and distinguishing the differences between
them, special guest Anantha Sayana outlines how the IS Auditor can prepare,
react, and contribute to all the three. Hosted by ISACA's Hollee Mangrum-Willis.

401 views • 348 days ago

VIDEO


SPOTLIGHTING THE MEMBER-EXCLUSIVE SPEAKER SERIES

ISACA is proud to offer member-exclusive access to series of leadership skill
building webinars in the Member-Exclusive Speaker Series. Led by industry
experts, you can learn how to lead an organization, others and most importantly
– yourself. Not an ISACA member? Join today to register for the next event.

76 views • 349 days ago

VIDEO


3 KEYS TO ENGAGEMENT!

Register now to attend the next Member-Exclusive Speaker Series. Not a member?
Join today to attend and enjoy a variety of member benefits.

83 views • 352 days ago

VIDEO


IS AUDIT IN PRACTICE: DATA INTEGRITY ON DEMAND

On this podcast, ISACA's Hollee Mangrum-Willis and special guest Cindy Baxter
discuss the disparities between American communities and access to electronic
health records. From there, they examine how key data insights from the ISACA
community can help us all be healthier.

205 views • 356 days ago

VIDEO


THE ISACA CERTIFICATION ACRONYM CHALLENGE: NO WRONG ANSWERS!

No matter how you pronounce the acronyms, ISACA's certifications are highly
regarded and in-demand by digital trust professionals and their organizations
around the globe.

571 views • 361 days ago

VIDEO


PROCESSES OF ENGAGEMENT WITH SCOTT GOULD

Scott Gould is the author of 'The Shape of Engagement: The Simple Process Behind
how Engagement Works.' In this podcast, Scott gives a sneak peak at his upcoming
member-exclusive, CPE-eligible event. Scott will discuss the essential
frameworks for understanding and operationalizing engagement and building
enduring connections with your networks and communities.

241 views • 1 year ago

VIDEO


TOGETHER WE ARE STRONGER

In this video short, a soft-spoken professional finds their voice through ISACA.

438 views • 1 year ago

VIDEO


DISCOVER THE VALUE OF AN ISACA MEMBERSHIP

Watch as members share how ISACA’s member-exclusive benefits have helped put
them on the fast track to a more rewarding career. And for a limited time, take
advantage of ISACA’s LARGEST MEMBERSHIP DISCOUNT OF THE YEAR. Become a member
for the second half of 2023 and pay only HALF PRICE. To JOIN & SAVE, visit:
https://www.isaca.org/campaigns/half-year-half-price To explore ISACA’s
member-exclusive benefits, visit:
https://www.isaca.org/membership/become-a-member/member-benefits

611 views • 1 year ago

VIDEO


DELIVERING SECURITY VALUE TO PRODUCT TEAMS USING THE POWER OF DATA

In security, aligning with product teams has never been more important,
especially when outmaneuvering adversaries. To foster a truly productive and
action-oriented cybersecurity culture, security teams must begin addressing
their product engineering counterparts as customers they serve rather than
entities they govern. In this podcast, ISACA’s Chris McGowan listens in as
Adobe’s Manager of Adversary Intelligence Gurpartap “GP” Sandhu provides unique
insight into how he’s bringing intrapreneurship to life in product security
through a key project that delivers actionable data that product teams can use
to enhance their security posture more rapidly. They’ll also discuss how his
team is harnessing strong adversary focus using the power of data and share
advice on how you can stay ahead of adversaries by better predicting their next
move in the ever-changing threat landscape. Tune into this ISACA Podcast to
learn more! Check out more from Adobe, https://www.adobe.com/trust.html For more
ISACA podcasts, www.isaca.org/podcasts

160 views • 1 year ago

VIDEO


ISACA HALL OF FAMERS SHARE THEIR INSPIRATIONS

Recent ISACA Hall of Fame inductees Allan Boardman, Jo Stewart-Rattray, Mike
Hughes, Lily Shue and Robert Parker share what motivated them to make such large
impacts on ISACA and their favorite ISACA memories.

320 views • 1 year ago

VIDEO


LEARN ABOUT THE VALUE OF BECOMING AN ISACA ACCREDITED TRAINING ORGANIZATION

We invite you to view this short video to learn more about the ISACA Accredited
Training Partner Program and how it can help IT Training organizations
differentiate themselves by delivering ISACA’s globally recognized Credentials
and Training. For more information, check out:
https://www.isaca.org/partnerships/become-a-training-partner

251 views • 1 year ago

VIDEO


SHELEADSTECH CHAPTER LIAISON QUARTERLY MEETING, MAY 2023

Recording of SheLeadsTech Chapter Liaison Quarterly Meeting held virtually on 18
May 2023 at 10:00 AM CDT. Please visit the Chapter Leader Exchange via ISACA's
Engage Online Platform to access accompanying slide deck and further discussion.
Please also email info@oneintech.org to access the SheLeadsTech Liaison
Quarterly Report.

33 views • 1 year ago

VIDEO


SHELEADSTECH AMBASSADOR SEMI-ANNUAL MEETING, MAY 2023

Recording of SheLeadsTech Ambassador Semi-Annual Meeting held virtually on 16
May 2023 at 11:00 AM. Please visit the SheLeadsTech community via ISACA's Engage
Online Platform to access accompanying slide deck and further discussion. Please
also email info@oneintech.org to access the SheLeadsTech Ambassador Quarterly
Report.

21 views • 1 year ago

VIDEO


AI ETHICS AND THE ROLE OF IT AUDITORS

We, as a society, have always lived by certain norms that are driven by our
communities. These norms are enforced by rules and regulations, societal
influence and public interactions. But is the same true for artificial
intelligence (AI)? In this podcast we discuss and explore the answers to some of
the key questions related to the rapid adoption of AI, such as: What are the
risks associated with AI and the impact of its increasing adaption within almost
every industry? And, what role should we as IT Auditors should play in this fast
changing technological landscape? Hosted by ISACA's Hollee Mangrum-Willis and
featuring special guest Jai Sisodia.

502 views • 1 year ago

VIDEO


USING A RISK-BASED APPROACH TO PRIORITIZE VULNERABILITY REMEDIATION

Organizations today struggle with vulnerability management. More specifically,
remediating vulnerabilities in a timely manner poses a challenge. With
vulnerability remediation backlogs growing at an alarming rate, what can
organizations do to meet their established remediation timelines and to protect
the organization from cybersecurity threats. Cybersecurity leader Ray Payano
will discuss the exponential increase in published vulnerabilities, the lack of
resources in cybersecurity to perform remediation and balancing remediation with
reduced maintenance windows. These challenges contribute to organizations
struggling with remediation backlogs. Ray will explain how calculating
vulnerability risk can help organizations prioritize their vulnerabilities based
on risk level to help determine the order in which vulnerabilities are
addressed. Hosted by ISACA's Chris McGowan.

324 views • 1 year ago

VIDEO


THE TRUE COST OF A DATA BREACH

Guests Jack Freund and Natalie Jorion discuss the need for additional data for
quantitative risk analyses and methods to derive that data when it does not
exist. They cover how this was done in the past and their updated method for
interpolation of such data from record losses and other firmographic data. They
end with a discussion of the role of model validation and how it can enable
reliable risk management decision making. Hosted by ISACA's Safia Kazi.

270 views • 1 year ago

VIDEO


2023 IT COMPLIANCE AND RISK BENCHMARK REPORT

Are you wondering about the ever-changing landscape of IT compliance and risk
management? Look no further. Hyperproof, a leading SaaS compliance operations
provider, conducts an annual survey of over 1,000 IT risk, compliance, and
security professionals to uncover their top challenges. Tune in to this
exclusive episode to hear about the top five most important statistics uncovered
from the survey and get an overview of how your industry peers are managing IT
risk and compliance programs within their organizations. We’ll cover: ● The top
five findings from the survey ● How your peers are planning to handle
compliance, audit management, and risk management in the midst of this year’s
volatile economy ● What companies are doing differently in response to recent
and highly publicized security breaches to avoid security lapses and compliance
violations Download Hyperproof’s 2023 IT Compliance and Risk Benchmark Report
https://hyperproof.io/it-compliance-benchmarks/

241 views • 1 year ago

VIDEO


WHAT KIND OF GLASSES ARE YOU WEARING? YOUR VIEW OF RISK MAY BE YOUR BIGGEST RISK
OF ALL

The world of business has changed dramatically over the past few years. Our
digital world is more connected than ever, leaving security and technology teams
stretched even thinner. Privacy and data regulations are increasing on a state
and national level, threat actors are learning and evolving, and cybersecurity
has finally become a boardroom priority! Now that you have leadership’s
attention- what will you do? If your answer is “risk management as usual”, that
may be holding you back. Traditional risk management approaches make a lot of
promises, but most of them are myths. Do any of these sound familiar? ● You can
make better-informed decisions by using a single platform. ● You can use
automation to achieve continuous compliance. ● You can implement risk management
by creating a risk register. ● You can use qualitative attributes to measure and
assess risk. In this episode, we’ll assess risk management myths and discuss how
to establish scalable, quantifiable, and always-on risk management for the
future. Hosted by Lisa Cook and featuring special guest Meghan Maneval.

264 views • 1 year ago

VIDEO


THE VALUE OF INTERNAL APPRAISAL TEAM MEMBERS (ATMS) IN MDDAP

Hear the benefits of training your internal staff to become experts on the CMMI
model and participate on your next MDDAP Appraisal.

131 views • 1 year ago

VIDEO


CMMI LEAD APPRAISERS: WHAT THEY DO AND THE VALUE THEY OFFER

Learn what a CMMI Lead Appraiser is, their goals, and the value they can bring
organizations through CMMI and MDDAP appraisals. For more information, go to
https://www.isaca.org/enterprise/performance-improvement-solutions

128 views • 1 year ago

VIDEO


CASE STUDY: HOW INNOVIZE WAS ABLE TO GENERATE HIGHER QUALITY OUTPUTS MORE
RELIABLY

See how Contract Manufacturer Innovize improved organizational performance with
participation in the Case for Quality collaborative community Voluntary
Improvement Program (VIP) using the Medical Device Discovery Appraisal Program
(MDDAP). For more information, go to
https://www.isaca.org/enterprise/performance-improvement-solutions

149 views • 1 year ago

VIDEO


HOW ORGANIZATIONS CAN CONSISTENTLY REDUCE CYBERRISK

Cyber threats are now a “clear and present danger” to most organizations,
companies and governments of the world. A good cyber defense involves many,
intricate layers. You can never have enough layers, just like you can never
remove all the risk. In order for organizations to reduce as much risk as
possible, in a rapidly shifting threat landscape, they must constantly make
improvements. The threat groups are making rapid improvements and increasing
their expertise at a steady rate. They are investing in R&D and Zero-Day
exploits. To offer a good defense, we must make progress at the same rate as the
threat groups or we may fall behind, increasing risks and allowing the cyber
world to become like the “wild-wild west.”

173 views • 1 year ago

VIDEO


KEY CONSIDERATIONS FOR CONDUCTING REMOTE IT AUDITS

Conducting adequate preparation including risk assessments, assessing resource
requirements and ensuring ongoing communication to harness both the benefits and
to address the potential challenges faced when conducting hybrid or fully
virtual audits.

210 views • 1 year ago

VIDEO


UNDERSTANDING AND ASSESSING ORGANIZATION CULTURE

Organizational culture is crucial because it shapes behaviors and attitudes in
the workplace, which can profoundly impact operations and overall success.
However, it is sometimes difficult for CISOs and other infosec managers to fully
understand their culture because they are inside it constantly. In this ISACA
Podcast episode, author and journalist Mark Tarallo chats with ISACA's Safia
Kazi about how infosec managers can assess the organizational culture by using a
culture model to examine the behaviors, relationships, attitudes, values, and
environment that the culture sustains. It also discusses possible ways to lead a
culture change initiative. To read Mark's full ISACA Journal article,
"Understanding, Assessing, Aligning and Transforming Organizational Culture,"
click the link https://www.isaca.org/organizational-culture For more ISACA
Podcasts: https://www.isaca.org/podcasts

176 views • 1 year ago

VIDEO


SEVEN THINGS TO KNOW BEFORE AUTOMATING IT GENERAL CONTROL AUDITS

This podcast is a practical discussion with two IT Internal Auditors, Frans
Geldenhuys and Gustav Silvo, that have automated IT General Controls across
their highly diversified and decentralized group. They will share some of the
pitfalls they have experienced in their automation roll out and advise on how to
avoid or manage these pitfalls with host, Robin Lyons. Check out Frans and
Gustav’s full ISACA Industry News article, “Seven Things to Know Before
Automating IT General Control Audits,”
http://www.isaca.org/automating-it-general-control-audits For more ISACA
Podcasts, https://www.isaca.org/podcasts

280 views • 1 year ago

VIDEO


CMMI TECH TALK: MODEL DEEP DIVE: WORKFORCE EMPOWERMENT (WE) PRACTICE AREA

A deeper look into one of the new Practice Areas in the CMMI Model, Workforce
Empowerment (WE) https://www.isaca.org/cmmi

199 views • 1 year ago

VIDEO


ISACA VOLUNTEER APPRECIATION WEEK 2023

Learn more about the impact made by ISACA volunteers.

283 views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT - JULIA KANOUSE

Get to know Chief Membership and Marketing Officer Julia Kanouse as she sits
down with childhood best friend and ISACA VP Amanda Raible. The duo discuss
everything from leadership to motherhood while competing in Mario Kart! Tune in!

142 views • 1 year ago

VIDEO


ISACA LIVE | MEASURING & COMMUNICATING CYBER CAPABILITIES

There are many standards describing cybersecurity outcomes to achieve and
capabilities to implement, but what does success look like, and how do we know
if we’re doing enough? In this video, Kelly Hood, CDPSE, Cybersecurity Engineer
at Optic Cyber Solution, shares different types of measurements, such as metrics
and performance indicators, to help you understand how and when to use each of
them when measuring your cyber capabilities and communicating the outcomes of
your cybersecurity programs.

207 views • 1 year ago

VIDEO


CMMI TECH TALK: DATA MANAGEMENT PRACTICE AREA OVERVIEW

In this video, you will get a brief overview of one of the new Practice Areas
from the CMMI Model, known as Data Management (DM).
https://cmmiinstitute.com/cmmi/data

139 views • 1 year ago

VIDEO


CMMI TECH TALK: COURSE TAILORING GUIDANCE

In this tech talk we will explore how CMMI classes can be tailored by
instructors based on student needs and instructor preferences according to ISACA
tailoring rules.

68 views • 1 year ago

VIDEO


CMMI TECH TALK: DATA QUALITY PRACTICE AREA OVERVIEW

In this video, you will get a brief overview of one of the new Practice Areas
from the CMMI Model, known as Data Quality (DQ).
https://cmmiinstitute.com/cmmi/data

146 views • 1 year ago

VIDEO


CMMI TECH TALK: LEARNER CENTERED PRINCIPLES

In this CMMI Tech Talk, we’ll summarize the seven Learner Centered Principles
used in CMMI classes.
https://www.isaca.org/enterprise/cmmi-performance-solutions

87 views • 1 year ago

VIDEO


CMMI TECH TALK: WHAT IS A SOLUTION?

In this video, we will explore what the term “solution” means in the context of
a CMMI Practice Area or Practice.
https://www.isaca.org/enterprise/cmmi-performance-solutions

103 views • 1 year ago

VIDEO


WHAT IS YOUR IP ADDRESS CYBERSECURITY IQ? THE ROLE OF IP ADDRESS DATA IN A
DIGITAL WORLD

There are literally thousands of VPN services on the market. Some are undeniably
benign, but others offer a slate of features that are friendly to cyber
criminals. Keeping your network safe from hackers requires you to understand the
VPN market, and make decisions based on your company’s appetite for risk.
Fortunately, by analyzing IP address data associated with these devices,
security professionals can get access to a wealth of VPN contextual data that
helps them distinguish between perfectly legitimate providers and those that
turn a blind eye toward crime. In today’s world, it is vital for security
professionals to know how to leverage IP address data and its contextual
insights to protect enterprise networks.

192 views • 1 year ago

VIDEO


DATA QUALITY PRACTICE AREA OVERVIEW

In this video, you will get a brief overview of one of the new Practice Areas
from the CMMI Model, known as Data Quality (DQ).

19 views • 1 year ago

VIDEO


HOW TO BE AN ISACA VOLUNTEER

Take a tour of ISACA's volunteer program on Engage, and learn how to get
involved. For more information visit https://engage.isaca.org

275 views • 1 year ago

VIDEO


CREATE A SUCCESSFUL CAREER PATH WITH ISACA

ISACA has the resources, credentials and training options to guide IT
professionals in their steps to create a successful, fulfilling career path at
any level.

221 views • 1 year ago

VIDEO


ISACA LIVE | THE EQUITY GEM: ACTIONABLE STEPS TO HELP CLOSE THE EQUITY GAP

In celebration of International Women's Day, themed #EmbraceEquity, Limor
Bergman and Willena Lon will share tips on actionable steps to help close the
equity gap.

63 views • 1 year ago

VIDEO


CMMI TECH TALK: USING CMMI TO IMPROVE AN ISO9001 OR AS9100 QMS

In this CMMI Tech Talk, we are going to explore how CMMI, ISO9001, and AS9100
work together to improve a quality management system.
https://www.isaca.org/enterprise/cmmi-performance-solutions

135 views • 1 year ago

VIDEO


CONFERENCE CHATS WITH CHELSEY & ROBYN

Tune in to listen to ISACA’s very own Chelsey Byrd and Robyn Franko as they
discuss the upcoming fun at ISACA Conference North America 2023: Digital Trust
World.  Listeners will  get some insider information into future conferences and
some laughs as the ladies discuss past, present & future ISACA events!
Additional event information can be found
https://www.isaca.org/training-and-events/isaca-digital-trust-world-conference

129 views • 1 year ago

VIDEO


EIGHT CYBERSECURITY TRENDS TO WATCH FOR IN 2023

With the start of a new year, it is a key time for all organizations, small
through enterprise, to examine their IT infrastructure and review cyber security
policies. With the new digital transformations and an evolving regulatory
landscape, organizations are more prone to cyberattacks. In fact, statistics
released in Nov 2022, show that approximately 52 million data breaches occurred
globally during the second quarter of this year alone. So what do businesses
need to know to be able to try and mitigate these issues?

334 views • 1 year ago

VIDEO


WE ARE ISACA, EPISODE 05

In the fifth episode of We Are ISACA, Joseph Kachiliko from Zambia/UAE and Abbas
Kudrati from India/Australia, chat with Megan Moritz about doing a TedX talk,
writing several books, taking breaks from technology, and the one candy they
cannot live without. (5 Star and Snickers for the wins!) This episode also
feature Sri Srinivasa’s incredible voice acting talents, showcased in English
and his native language, Tamil. Intros & locations: 0:00-1:43 Joseph’s TEDx
talk: 1:44-7:13 Abbas’s best-selling books: 7:14-9:11 Staying connected to
yourself and others: 9:12-11:22 Setting better habits: 11:23-15:05 ISACA student
groups: 15:06-18:25 The importance of mentoring: 18:26-24:21 One candy for the
rest of your life: 24:22-25:54 Voice actor, Sri Srinivasa: 25:55-31:39 Until
next time: 31:40-32:14

156 views • 1 year ago

VIDEO


THE EQUITY GEM: ACTIONABLE STEPS TO HELP CLOSE THE EQUITY GAP

In celebration of International Women's Day, themed #EmbraceEquity, Limor
Bergman and Willena Lon will share tips on actionable steps to help close the
equity gap.

63 views • 1 year ago

VIDEO


MEASURING SECURITY RESILIENCE FROM THE LENS OF THE ADVERSARY COMMUNITY

In a world where adversaries are constantly adapting to improve tactics,
techniques, and procedures (TTPs), it is crucial to understand the unique traits
and goals of various types of adversaries that actively seek to cause harm to an
organization. The personification of these threats will ultimately help measure
resilience against specific threat actors, identify investment and hardening
opportunities, and improve trust with customers. In this podcast, Daniel
Ventura, Manager of Product Security Incident Response Team (PSIRT), shares
insight into Adobe’s approach to adversary personification as well as provides
guidance on how you can better measure the security resilience of your products.
He’ll also talk about Adobe’s bug bounty program which helps his team identify
new trends in adversary interest and defend against real incident response
events.

106 views • 1 year ago

VIDEO


THE FUTURE OF TECHNOLOGY RISK: 4 WAYS TO BUILD STAKEHOLDER TRUST IN THE
TECHNOLOGY RISK IMPERATIVE

Today, the pace of change across industries is quicker than ever before.
Economic, political, and social unrest and a global climate crisis have placed
unprecedented disruption and pressures on organizations looking to navigate a
rapidly changing environment. Firms are being out-innovated and entire
industries are being disrupted in a matter of months or years, as opposed to
decades. Shifting regulations, data as an asset, dynamic customer behavior and
employee expectations of continued flexibility in a more virtual workplace add
to the challenge. Technology risk and compliance needs to adjust to this new
reality. The strategy and value of an organization’s technology risk management
are becoming essential to build and secure stakeholder trust. That means moving
closer to the point where the risk events occur and using preventative,
detective, and automated controls as much as possible. In this podcast, Beth
McKenney, a Principal in the KPMG Technology Risk service network, offers a game
plan for companies to meet these today’s challenges with an eye on building
stakeholder trust. That means having a proactive, rather than a reactive,
approach to risk management.

101 views • 1 year ago

VIDEO


RISKY BUSINESS – JON BRANDT

For the average person, life moves quickly. But for business leaders and anyone
involved in any aspect of IT, the pace at which technology is changing is
overwhelming. Technology can help businesses and individuals do more with less
and increase profit margins. However, technological advances carry tremendous
risk and increase the criticality of risk management. No longer can business and
personal use of technology be viewed in siloes. ISACAs Director of Professional
Practices and Innovation, Jon Brandt, is joined by Ryan Cloutier as they discuss
some of the latest headlines and impact to intellectual property.

174 views • 1 year ago

VIDEO


CCP CMMI EXPLAINER

Cybersecurity is a huge challenge for companies today. Every organization has
unique vulnerabilities. Cyber threats are growing and so are the costs of
failure. ISACA's CMMI Cyber Maturity Platform meets these challenges head on.
For more information, check out
https://www.isaca.org/enterprise/cmmi-cybermaturity-platform

302 views • 1 year ago

VIDEO


CMMI TECH TALK: APPRAISING GOVERNANCE (GOV) AND IMPLEMENTATION INFRASTRUCTURE
(II)

In this tech talk we will explore the role that senior management plays in
supporting performance and process improvement efforts and how the Sustaining
Habit and Persistence Practice Areas are appraised.
https://cmmiinstitute.com/learning/appraisals

448 views • 1 year ago

VIDEO


ADVERTISING INFORMATION SECURITY

In this episode, executive principal at Risk Masters International’s Steven Ross
discusses why vendors of IT products and services are advertising information
security, why businesses are not advertising their security and how to use
information security as a component of organizations’ public images with host
Safia Kazi.

155 views • 1 year ago

VIDEO


BUILDING DIGITAL TRUST THROUGH ADVOCACY

If you thought ISACA was only about certification and education, get ready to
listen to this podcast and see how ISACA advocates for the IT Audit and Risk
Management professions! Join Cindy Baxter, author of the Audit in Practice
column in the ISACA Journal, as she interviews two members of the ISACA New
England Board of Directors who attended ISACA’s Hill Day in Washington DC. Hear
how they met with their government representatives and with ISACA’s help,
discussed legislation that supports our profession! It’s an opportunity to think
about the impacts you can have in your own back yard and with civic leaders!

130 views • 1 year ago

VIDEO


VALUE OF ISACA: ENTERPRISE SOLUTIONS

Discover how ISACA’s enterprise solutions enhance the ability of people,
organizations, processes, and technology to create and maintain a better digital
world. Our enterprise offerings in team training, performance improvement
solutions and partnership opportunities have helped drive innovation and
education globally. Learn more at isaca.org/enterprise

151 views • 1 year ago

VIDEO


RETHINKING IDENTITY GOVERNANCE

SaaS is eating the world even more than we think. Companies are dealing with
SaaS sprawl: hundreds of apps distributed across different owners that store
sensitive data and which are used to orchestrate critical business workflows.
Security-minded teams are turning to external compliance frameworks to help
protect their customers and data. However, traditional identity governance
controls have fallen short of delivering real security outcomes in this
digital-first world. They’re missing a critical piece: automation. In this
episode, ConductorOne’s CEO and Co-Founder, Alex Bovee joins this episode to
discuss why we need to change the way we think about compliance and risk and
what a security-led governance program could look like. Learn more about
ConductorOne at https://www.linkedin.com/company/conductorone/ or
https://www.conductorone.com/blog/automating-compliance-controls-least-privilege-access/

236 views • 1 year ago

VIDEO


WE ARE ISACA, EPISODE 04

The fourth episode of We Are ISACA brings us our first virtual participants.
Gustavo Galegale joined from São Paulo, Brazil and shared quite the story about
his son’s birth, while Glory Idehen connected from Abuja, Nigeria and shared how
the Abuja Chapter has built impressive local participation for ISACA’s annual
CommunITy Day. Watch and listen to their discussion with host Megan Moritz.

255 views • 1 year ago

VIDEO


2023: THE YEAR OF RISK

A review of the events of 2022 shows that 2023 will not be the year of dire new
cyber attacks waged by hoodie-wearing cyber criminals or office-bound
nation-state APTs. Instead, 2023 will be when multiple regulatory bodies express
their mounting frustration with public and private companies' collective
inability to reduce the volume and impact of prior cyber attacks. Tune into this
ISACA Episode as Hyperproof’s Field CISO, Kayne McGladrey, speaks with ISACA’s
Jeff Champion on how 2023 will be the year of risk. Learn more about Hyperproof
at: https://twitter.com/Hyperproof https://www.linkedin.com/company/hyperproof/
https://www.instagram.com/hyperproof/ Additional Hyperproof Resources:
https://hyperproof.io/resource/the-ultimate-guide-to-enterprise-risk-management/
https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2022/three-key-predictions-for-2023-the-year-of-risk
https://hyperproof.io/resource/risk-management-software-buyer-guide/
https://hyperproof.io/case-studies/pythian-uses-hyperproof-to-get-time-back-and-improve-its-risk-management-maturity/

341 views • 1 year ago

VIDEO


IMPROVING CYBER RESILIENCE IN AN AGE OF CONTINUOUS ATTACKS

We live in the age of continuous compromise. This podcast dives into why so many
organizations continue to be breached even after spending money on cybersecurity
point solutions. Many organizations gravitate towards silver bullet solutions
without understanding the threat and impact. In this ISACA Podcast episode,
Chris McGown speaks to Rex Johnson and Hamlet Khodaverdian about why a holistic
and collaborative approach is absolutely critical to creating cyber-resilience. 
For more information check out
www.isaca.org/improving-cyberresilience-in-an-age-of-continuous-attacks

292 views • 1 year ago

VIDEO


CMMI TECH TALK: NAVIGATING THE DIFFERENT FRAMEWORKS

Understand and navigate the different models and frameworks. Understand how CMMI
fits in the different models and frameworks and how it can be used alongside the
other models and frameworks.
https://www.isaca.org/enterprise/cmmi-performance-solutions

252 views • 1 year ago

VIDEO


DON’T MISS DIGITAL TRUST WORLD BOSTON

Join us 9-11 May, 2023 in Boston, MA for Digital Trust World. Register Now:
https://www.isaca.org/digital-trust-world

95K views • 1 year ago

VIDEO


LEARN MORE ABOUT ISACA FOUNDATION, PART 4

Building diversity and inclusion in Cyber and IT Audit careers is one of the
ways to address the workforce crisis and ensure innovation that meets all
perspectives. ISACA Foundation is a way for ISACA to philanthropically support
the mission of advancing the professional space. ISACA Foundation seeks to
create a healthy digital world that is safe, secure, and accessible for all.

171 views • 1 year ago

VIDEO


LEARN MORE ABOUT ISACA FOUNDATION, PART 3

Building diversity and inclusion in Cyber and IT Audit careers is one of the
ways to address the workforce crisis and ensure innovation that meets all
perspectives. ISACA Foundation is a way for ISACA to philanthropically support
the mission of advancing the professional space. ISACA Foundation seeks to
create a healthy digital world that is safe, secure, and accessible for all.

114 views • 1 year ago

VIDEO


LEARN MORE ABOUT ISACA FOUNDATION, PART 2

Building diversity and inclusion in Cyber and IT Audit careers is one of the
ways to address the workforce crisis and ensure innovation that meets all
perspectives. ISACA Foundation is a way for ISACA to philanthropically support
the mission of advancing the professional space. ISACA Foundation seeks to
create a healthy digital world that is safe, secure, and accessible for all.

112 views • 1 year ago

VIDEO


LEARN MORE ABOUT ISACA FOUNDATION, PART 1

Building diversity and inclusion in Cyber and IT Audit careers is one of the
ways to address the workforce crisis and ensure innovation that meets all
perspectives. ISACA Foundation is a way for ISACA to philanthropically support
the mission of advancing the professional space. ISACA Foundation seeks to
create a healthy digital world that is safe, secure, and accessible for all.

124 views • 1 year ago

VIDEO


ISACA LIVE | DIGITAL TRUST PRIORITIES FOR PRIVACY AND EMERGING TECH

ISACA Digital Trust Advisory Council Members Anne Toth and Michelle Finneran
Dennedy will discuss privacy concerns and priorities around emerging tech and
the most critical considerations for ensuring strong digital trust. Visit
isaca.org/privacy-month-2023

344 views • 1 year ago

VIDEO


ISACA. COMMUNITY. RESILIENCE.

ISACA's Global Community is bigger and stronger than you may realize...and more
resilient than you probably ever dreamed. Hear how ISACA members around the
world have supported fellow members in Ukraine, and discover how it is never too
late to make a difference. A very special thanks to those who took the time to
share their personal stories. https://www.isaca.org/ To donate:
https://bank.gov.ua/en/

771 views • 1 year ago

VIDEO


STATE OF PRIVACY 2023

Privacy is an essential component of digital trust—so how does your organization
compare to others when it comes to privacy trends, challenges, budgets, and
approaches? Learn about the latest global ISACA research and get key findings on
the privacy workforce, privacy skills, privacy by design, and the future of
privacy.

1M views • 1 year ago

VIDEO


WE ARE ISACA EPISODE 3

The third episode of We Are ISACA was recorded in Rome, Italy. Host Megan Moritz
talked with polyglot Mounir Messaoud from Sweden, and coffee connoisseur
Vladlena Benson from the UK.

466 views • 1 year ago

VIDEO


CMMI TECH TALK: CMMI AND AGILE

Learn more about integrating CMMI and agile.
https://www.isaca.org/enterprise/cmmi-performance-solutions

328 views • 1 year ago

VIDEO


ISACA LIVE - CAREER CHANGING IMPACT OF MENTORSHIP

To celebrate International Mentorship Day in January, we are hosting an ISACA
Live hosted by Liz Pisney, with panelists Veronica Rose (ISACA Board Director)
and career expert Caitlin McGaw.

188 views • 1 year ago

VIDEO


INFORMATION PRIVACY CONTRADICTION: INTEREST-BASED POSTURE OF COMPLIANCE AND
VIOLATION

Why do individuals, organizations, institutions, nations, or responsible agents
work hard to preserve their personal and enterprise data, personnel information,
trade secrets, intellectual properties, technical know-how, or national data,
yet easily trade on the individual and enterprise data and national data of
others? To understand and answer the question appropriately, one must examine
the underlying of the Information Privacy Realities Contradiction Theory
(IPRCT), which is integral to (1) our natural unity of opposites, (2) our
material dialectic mechanism or struggle of choosing from the opposites, and (3)
the role of our self-interest in time and circumstance. Therefore, understanding
the intricacies of the IPRCT would be instrumental to the proper and timely
introduction of privacy requirements early in our system development lifecycle
and in the development and enactment of information privacy policies,
directives, guidance, and regulations around the world. In this ISACA Podcast
episode, Safia Kazi host Dr. Patrick Offor, Chief Warrant Officer Five Retired
(CW5(R)); Associate Faculty, to discuss his recently released ISACA Journal
article. To read Dr. Offor’s full article, please visit
https://www.isaca.org/resources/isaca-journal/issues/2022/volume-6/the-information-privacy-contradiction.
To listen to more ISACA podcasts, please visit www.isaca.org/podcasts.

272 views • 1 year ago

VIDEO


CMMI TECH TALK: USING THE PERFORMANCE REPORT TO PROVIDE VALUE

Discover how the appraisal team can use the Performance Report to provide value
to the appraised organization.
https://www.isaca.org/enterprise/cmmi-performance-solutions

183 views • 1 year ago

VIDEO


CMMI TECH TALK: THE PERFORMANCE REPORT: VALIDATING THE PERFORMANCE REPORT

Learn more about how an appraisal team validates the performance report during
the conduct phase of an appraisal.
https://www.isaca.org/enterprise/cmmi-performance-solutions

204 views • 1 year ago

VIDEO


2023 TECH PREDICTIONS AND PRIORITIES

Chris Dimitriadis, Chief Global Strategy Officer at ISACA, shares his
predictions for the industry for 2023. Listen in as Chris explains his
predictions around digital trust, the skills gap, securing the supply chain, and
quantum computing. Please like and subscribe for more updates from ISACA.

585 views • 1 year ago

VIDEO


HOW TO BECOME AN ISACA MEMBER

A complete guide on becoming a member of ISACA. Get helpful instructions and
tips in this video. Join a global community of 180,000+ members.

1K views • 1 year ago

VIDEO


SHOULD CYBERSECURITY BE SUBJECT TO A SOX-TYPE REGULATION?

Numerous laws and regulations have been passed to protect sensitive information,
both at the federal and state level, creating a patchwork of requirements for
companies to comply with. However, with limited resources for cybersecurity
investment, this uncoordinated approach has clouded objectives and led to
decision paralysis within firms. Could cybersecurity implementation benefit from
a Sarbanes-Oxley Act (SOX) type approach? This approach would create a
risk-based, internal control model focused on cybersecurity that includes
enforcement capabilities and requires third-party oversight and executive
accountability. To read Should Cybersecurity Be Subject to a SOX-Type
Regulation? Please visit
www.isaca.org/should-cybersecurity-be-subject-to-a-sox-type-regulation. To
listen to more ISACA podcasts, please visit www.isaca.org/podcasts.

280 views • 1 year ago

VIDEO


BEWARE THE TRAPS OF DATA GOVERNANCE AND DATA MANAGEMENT PRACTICE

Guy Pearce joins ISACA’s Lisa Villanueva for a conversation about the traps of
Data Governance and management. Guy breaks down Lore vs. Data, reasons for not
using information for decision-making and why data is a shared benefit for the
organization. Stay tuned until the close to hear Guy’s advice on how to use
metaphor when communicating technical concepts to executive leadership. To read
Guy's full article, visit: To listen to more ISACA podcasts, please visit:
www.isaca.org/podcasts.

281 views • 1 year ago

VIDEO


CONVERGENCE: WHERE NEXT?

ISACA’s Jeff Champion welcomes Steven Ross to the ISACA podcast. Steven asks
what the effect of Convergence on the Control Community and concludes that
everything is connected to every role, and it is becoming risky to have
employees siloed within their own practice. He also remarks on how he once wrote
an ISACA Journal article about companies creating a role for Chief Security
Officer and now that is becoming a reality within the industry. Tune in now! To
read Steven’s full-length article, visit: www.isaca.org/convergence-where-next.
To listen to more ISACA podcasts, visit: www.isaca.org/podcasts

169 views • 1 year ago

VIDEO


DO DATA GO TO WASTE

The Impact of SOX on the Industry 20 Years Ago and Today. Opponents of Sarbanes
Oxley, (SOX) contend the law is too costly for companies to operationalize given
the small benefit that SOX regulation provide. Proponents say that a world
without SOX is a world in chaos. This article discusses how SOX measures up 20
years after the law was enacted. To read Cindy's ISACA Journal article, Do Data
Go to Waste, please visit: www.isaca.org/do-data-go-to-waste. To listen to more
ISACA Podcasts, please visit www.isaca.org/podcasts.

163 views • 1 year ago

VIDEO


PROTECTING YOUR ENTERPRISE AND DETERRING FRAUD IN A NEW RISK ERA

As uncertainty persists due to the COVID-19 pandemic, the war in Ukraine,
international cyberthreats, inflation, and a looming recession, it is clear that
the world has entered a new era of risk. These factors have created the perfect
storm for rising fraud. In the past year, unauthorized digital account openings
increased by 21%, while smartphone-related cyberattacks soared by 71%,
reflecting a changing threat landscape impacting enterprises and consumers
alike. According to one global survey, nearly half of all respondents
experienced fraud in the past 24 months, 3 compromising financial resources,
personal data, and peace of mind with frightening rapidity. Recent research we
have completed also reflects that “60% of Consumers Don't Believe Companies Do
Enough to Protect Their Data as Demand for Security Grows". Listen to the CEO of
GBG Americas, Christina Luttrell, as she explains that, as a result, identity
verification is a priority for organizations and government agencies that view
it as a strategic differentiator that allows them to enhance the customer
experience while improving their defensive posture at a critical time in this
ISACA podcast episode. To read the ISACA Journal article, Protecting Your
Enterprise and Deterring Fraud in a New Risk Era, please visit:
https://www.isaca.org/protecting-your-enterprise To listen to more ISACA
Podcasts, please visit www.isaca.org/podcasts.

313 views • 1 year ago

VIDEO


IN PURSUIT OF DIGITAL TRUST – ALON AMIT

ISACA member Alon Amit says that education and safety should be the two greatest
areas of emphasis for professionals tasked with building digital trust.

559 views • 1 year ago

VIDEO


ISACA PRIVACY MONTH - JANUARY 2023!

Privacy Awareness Month is here–as are continuing threats to your organization.
Today’s privacy practitioners are challenged to keep pace with the ever-evolving
technology space. ISACA is raising awareness about the importance of privacy and
Digital Trust by offering valuable resources for understanding trends and
solutions to overcome privacy challenges. Learn More: http://www.isaca.org/cdpse

162 views • 1 year ago

VIDEO


IN PURSUIT OF DIGITAL TRUST – FRANCISCO GUIMARAES

ISACA member Francisco Guimaraes thinks providing digital trust is “the right
umbrella” for technology professionals to think about how they can positively
impact their organizations.

79 views • 1 year ago

VIDEO


THE CIRCLE OF FAILURE: WHY THE CYBER SECURITY INDUSTRY DOESN’T WORK

Richard Hollis, Director of Rick Crew, is serious about asking the tough
questions. ISACA’s Jon Brandt welcomes him to the ISACA podcast to have a
conversation that challenges the status quo: Does the Cyber Security Industry
work? After decades of experience in the security industry, Richard asks, “have
I affected any change?” Richard points out that if we buy a toaster at the store
and it doesn’t work, we return it, but as security professionals, we don’t hold
products to the same standards. Why is this? Jon and Richard go back and forth
on FUD, vendors, false positives, and where accountability lies in the industry.
Join Richard and Jon in the conversation to think about how we can affect the
positive change that we want to see in our industry in the future! To read
Richard's full report, please visit www.isaca.org/the-circle-of-failure. To
listen to more ISACA podcasts, visit www.isaca.org/podcasts.

525 views • 1 year ago

VIDEO


WE ARE ISACA, EPISODE 02

In this, the second episode of We Are ISACA, host Megan Moritz visits with
BodyJam enthusiast Natalie Perez from Melbourne and school owner Alok Kakker
from Washington, DC. 00:00:14 Intro 00:01:38 Natalie 00:14:01 Alok 00:26:54
Dance 00:30:12 Close

524 views • 1 year ago

VIDEO


CMMI TECH TALK - APPRAISAL ROLES: APPRAISAL SPONSOR: AFTER THE APPRAISAL

The Appraisal Sponsor's responsibilities and expectations after an appraisal
have concluded. Click here for more information:
https://www.isaca.org/enterprise/cmmi-cybermaturity-platform?gclid=Cj0KCQiAm5ycBhCXARIsAPldzoX0ko3MgtB-Um8MC3Jrri2qFkCv7aFokT1ZN8G5mWiCXzJZuZSdOtkaAjPyEALw_wcB

373 views • 1 year ago

VIDEO


CMMI TECH TALK - APPRAISAL ROLES: APPRAISAL SPONSOR: DURING THE APPRAISAL

The Appraisal Sponsor's responsibilities during the conduct phase of the
appraisal. Click here for more information:
https://www.isaca.org/enterprise/cmmi-cybermaturity-platform?gclid=Cj0KCQiAm5ycBhCXARIsAPldzoX0ko3MgtB-Um8MC3Jrri2qFkCv7aFokT1ZN8G5mWiCXzJZuZSdOtkaAjPyEALw_wcB

214 views • 1 year ago

VIDEO


TAKING SECURITY STRATEGY TO THE NEXT LEVEL: THE CYBER KILL CHAIN VS. MITRE
ATT&CK

In an era of rampant ransomware and other malicious cyberattacks, it’s mandatory
to double down on cybersecurity analysis and strategy to ensure an optimal
security posture and the protection of critical assets and data. Today, two
models can help security professionals harden network resources and protect
against modern-day threats and attacks: the cyber kill chain (CKC)and the MITRE
ATT&CK framework. Tim Liu, long-term security technologist, co-founder, and CTO,
will provide an overview of these two frameworks and the limitations or benefits
of each approach. To read Taking Security Strategy to the Next Level, please
visit: www.isaca.org/taking-security-strategy-to-the-next-level To listen to
more ISACA podcasts, please visit: www.isaca.org/podcasts

448 views • 1 year ago

VIDEO


WHAT CAN ISACA CERTIFICATIONS DO FOR YOU?

ISACA certification holder Bruno Horta Soares shares how ISACA certifications
gave him credibility and recognition in his career. Bruno, a CISA, CRISC, and
CGEIT certification holder, shares what motivated him to get certified. Hear
how, no matter how his career focus changed, he could o benefit from ISACA
certifications, prove his commitment to high standards of professionalism and be
successful across multiple aspects such as IS/IT audit, security, risk, and
governance. Learn more about ISACA certifications:
https://www.isaca.org/credentialing 00:00:01 What's your current role in your
organization? 00:00:44 How long have you been certified, and what motivates you
to stay certified? 00:01:54 How likely are you to recommend getting certified?

1K views • 1 year ago

VIDEO


CMMI TECH TALK: APPRAISAL ROLES: APPRAISAL SPONSOR: BEFORE THE APPRAISAL

In this CMMI Tech Talk, we talk about the role and expectations of the Appraisal
Sponsor before an appraisal begins.

260 views • 1 year ago

VIDEO


AUDITEE BUY-IN—A KEY COMPONENT OF EFFECTIVE AUDITS

As you plan and execute your audit, do you take time to invest in the
stakeholder relationship? This can be an often-overlooked element but essential
in an effective audit. Tune into this ISACA Video Podcast as Steve Jackson, IT
Audit Manager at Airbnb, chats with ISACA’s Robin Lyons about ways to gain
auditee buy-in and have a successful and effective audit. To read Steve’s
full-length article, “Auditee Buy-In—A Key Component of Effective Audits,” visit
www.isaca.org/auditee-buy-in For more ISACA Podcasts, please visit:
www.isaca.org/podcasts

430 views • 1 year ago

VIDEO


BREAKING DOWN THE ESET T2 2022 THREAT REPORT

In this ISACA Podcast episode, ESET’s Chief Security Evangelist, Tony Anscombe,
joins ISACA’s Principal, Emerging Technology Professional Practices, Collin
Beder to discuss ESET’s recently released T2 2022 Threat Report. As a global
leader in cybersecurity, ESET’s T2 2022 Threat Report summarizes the most
notable trends that have shaped the threat landscape for the past four months.
This report dives into CloudMensis, the previously unknown macOS malware
discovered by ESET researchers. To read the full ESET report:
https://www.welivesecurity.com/wpcontent/uploads/2022/10/eset_threat_report_t22022.pdf.
For more information, check out ESET’s award-winning blog: WeLiveSecurity. Make
sure to follow ESET Research on Twitter for the latest news from ESET Research.
To listen to more ISACA Podcasts, please visit www.isaca.org/podcasts.

162 views • 1 year ago

VIDEO


WE ARE ISACA, EPISODE 01

Hooray! You found the first episode of We Are ISACA! Join host Megan Moritz as
she spends time getting to know "the person behind the member." This episode
features former Marine Joe Mendez and marathoner Allyson Zoller. 00:00 Show Open
00:00:14 We Are ISACA Introduction 00:02:37 Joe Mendez 00:21:38 Allyson Zoller

871 views • 1 year ago

VIDEO


ENABLING DIGITAL TRUST THROUGH CANADA'S DIGITAL CHARTER

Data are the lifelines of a digital economy. They drive innovation, enabling
cutting-edge research and next-generation technologies, including artificial
intelligence (AI), robotics, and the Internet of things (IoT). But these
opportunities introduce new sources of risk that must be managed appropriately.
Canadians are raising important questions such as, “How will personal data be
used?” and “What controls are in place to safeguard privacy and security?” To
encourage innovation within the digital economy while managing this risk, the
Government of Canada has established the need for digital trust between citizens
and organizations as an enabler by implementing a Digital Charter. As the
Canadian government cites, “Trust is the foundation on which our digital and
data-driven Canadian economy will be built.” This digital trust is defined by
the “confidence that users have in the ability of people, technology, and
processes to create a secure digital world. Tune into this ISACA Podcast as the
Acting Director of Internal Assurance at the Office of Enterprise Risk &
Assurance of the University of British Columbia (UBC), Mary Carmichael, join’s
ISACA’s Safia Kazi to explore topics including what is the Digital Charter and
how it supports digital trust; what are critical elements of the Digital Charter
(e.g., AI Ethics, Privacy, Principles for the Digital Economy); what are the
implications for organizations and the public. To read Mary’s full-length
article, visit
https://www.isaca.org/enabling-digital-trust-with-canadas-digital-charter. To
listen to more ISACA podcasts, visit https://www.isaca.org/podcasts.

160 views • 1 year ago

VIDEO


IT'S ABOUT (DOWN) TIME

It is all about the system's downtime. In this ISACA Podcast episode, Risk
Masters International's Steven Ross tells ISACA's Collin Beder that
organizations should start focusing on hours of unavailable systems and data
when measuring the cost of a cyber-attack. Steven also discusses the causes and
targets of system downtime and why he thinks the IT world is currently living in
a dangerous time. To read Steven's full-length article, visit:
www.isaca.org/its-about-down-time To listen to more ISACA Podcasts, visit:
www.isaca.org/podcasts

179 views • 1 year ago

VIDEO


HOW SOCIAL ENGINEERING BYPASSES TECHNICAL CONTROLS

We are subjected to phishing scams almost every day, and even the most seasoned
professional must examine an email to ensure the links included are safe. Brown
University and Federal Reserve Bank of Cleveland's Allen Dziwa says people are
the weakest link and that customized messaging using regional language for
targeted attacks are becoming more prevalent. Allen breaks down the many types
of attacks (phishing, spear phishing, smishing, vishing, whaling) with ISACA's
Kevin Keh. Tune into this ISACA Podcast to learn how to be vigilant when facing
potential attacks from scammers. To read Allen’s full article, please visit:
www.isaca.org/how-social-engineering-bypasses-technical-controls To listen to
more ISACA Podcasts, please visit: www.isaca.org/podcasts

481 views • 1 year ago

VIDEO


WHAT MAKES RISK ASSESSMENTS SO UNPLEASANT AND HOW TO CHANGE THAT

Ryan Cloutier's child came home from school one day and told him that he had
figured out the staff Wi-Fi password. Frustrated that the security wasn't better
for a school network, Ryan decided to do something about it. Since then, his
career has been focused on serving K12, local government and socio-economically
disadvantaged communities with his company Security Studio. ISACA's Jeff
Champion asks him about ways to overcome technical language barriers when
completing risk assessments, and Ryan discusses key issues with risk assessments
and a path forward to resolving them. Tune in to start thinking about more
interesting ways to approach risk assessments! To read Ryan's full-length
article, visit: www.isaca.org/what-makes-risk-assessments-so-unpleasant To
listen to more ISACA Podcasts, visit: www.isaca.org/podcasts

291 views • 1 year ago

VIDEO


ISACA CYBERPROS – NAOMI BUCKWALTER

Executive Director of Cybersecurity Gatebreakers Foundation, Naomi Buckwalter,
joins ISACA’s Jon Brandt to discuss burnout. There are many factors at play when
discussing burnout: company culture, work-from-home flexibility, unrealistic
expectations from supervisors, and industry pressure, but Naomi gives you
multiple action plans for combatting workplace burnout and creating healthy
boundaries with your colleagues. Tune into this ISACA Podcast now! To learn more
about Naomi, please visit: https://www.linkedin.com/in/naomi-buckwalter/ To
listen to more ISACA podcasts, please visit: www.isaca.org/podcasts

808 views • 1 year ago

VIDEO


QUANTIFYING THE QUALITATIVE RISK ASSESSMENT

In this ISACA podcast episode, IT Risk Director and Senior Vice President Mike
Powers, joined by IT Segment Risk Manager Julie Ebersbach to discuss the use of
the qualitative risk assessment as part of an organization's enterprise risk
framework, focusing on the use of data to inform subjective judgments. The value
and accuracy of a qualitative risk assessment, based on subject matter expert
judgment, can be improved with focused data. Tune in now to hear Mike and Julie
chat with ISACA’s Jeff Champion about how using quantifiable data increases the
reliability, accuracy, and credibility of the qualitative risk assessment. To
read Quantifying the Qualitative Technology Risk Assessment, please visit:
www.isaca.org/quantifying-the-qualitative-technology-risk-assessment To listen
to more ISACA Podcasts, please visit: www.isaca.org/podcasts

495 views • 1 year ago

VIDEO


ISACA LIVE: ADVANCING DIGITAL TRUST THROUGH CYBERSECURITY

ISACA's Jon Brandt and Chris McGowan will discuss how cybersecurity
professionals can advance digital trust, share some consumer perspectives on
cybersecurity and outline new ISACA resources for cybersecurity professionals.

367 views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT WITH ALI PABRAI

There is no denying the passion that ecfirst's CEO, Ali Pabrai has for
cybersecurity. In this ISACA Podcast, Ali tells ISACA's Hollee Mangrum-Willis
that after all his years in the industry, he is still more excited than a
two-year-old at the entrance to Disneyland. Listen in as Ali discusses his
origin story as a first-generation American working for Fermi National
Accelerator Laboratory, creating a startup soon after the new millennium and how
he has balanced all his career accomplishments while raising a neurodivergent
child. Tune in now to hear about why Ali thinks we should compare the human body
to cybersecurity and much more! To learn more about Ali, please visit:
https://www.linkedin.com/in/pabrai/.  To listen to more ISACA Podcasts, please
visit: www.isaca.org/podcasts

487 views • 1 year ago

VIDEO


HOW TO MATURE YOUR PRIVACY COMPLIANCE PROGRAM: A CONVERSATION WITH ONETRUST DPO
LINDA THIELOVA

Compliance with the world’s ever-increasing list of privacy laws can be a tricky
undertaking for any organization, but by taking a few simple steps, you can
begin to mature your privacy program from a series of check-box exercises into
an intelligent compliance program that can help organizations to build consumer
trust and protect brand reputation. Join this conversation with OneTrust DPO
Linda Thielova and ISACA's Paul Phillips to learn how to operationalize privacy
compliance within your organization and get practical tips on how to mature your
privacy compliance program.

330 views • 1 year ago

VIDEO


MANAGING CYBERSECURITY RISK AS ENTERPRISE RISK

Cybersecurity incidents like ransomware can potentially bring operations to a
standstill. Recent regulatory changes by the FTC and proposed changes by the SEC
show that both agencies are drafting cybersecurity rules similar to ERM
concepts. This would include board oversight of cybersecurity and the
responsibility of senior management to implement cybersecurity policies and
procedures and provide training for information security staff that is
sufficient for them to address relevant security risks. In addition, this could
mean that your organization may be required to report incidents and disclose
cybersecurity policies and procedures. Tune in to this ISACA Podcast episode to
listen in as Cyber Defense Labs’ Manager of Cybersecurity Advisory Services Tom
Schneider tells ISACA’s Jeff Champion that any threat to this essential
information is an enterprise risk that needs to be managed by the enterprise
through teamwork, with leadership from both the board and senior management. Tom
also gives insights into managing cybersecurity risk as an enterprise risk. To
read Managing Cybersecurity Risk as Enterprise Risk, please visit:
www.isaca.org/managing-cybersecurity-risk-as-enterprise-risk. To listen to more
ISACA Podcasts, please visit: www.isaca.org/podcasts.

501 views • 1 year ago

VIDEO


IMPLEMENTING ARTIFICIAL INTELLIGENCE: CAPABILITIES AND RISK

University of Florida's Ivy Munoko is passionate about AI and has plenty to
share regarding implementation and usage, but ISACA's Collin Beder asks, "is it
ethical"? Ivy breaks down the ethical considerations for AI and the four types
of intelligence (Mechanical, Analytical, Intuitive, Empathetic), and she shares
her take on why she thinks AI won't be replacing our jobs for a very long time
to come. To read Ivy's article, please visit
www.isaca.org/implementing-ai-capabilities-and-risk. To listen to more ISACA
Podcasts, please visit www.isaca.org/podcasts.

270 views • 1 year ago

VIDEO


ISACA FOUNDATION: BUILDING THE FUTURE OF DIGITAL TRUST

By building pathways and pipelines into digital trust careers for the
under-represented, we can make real progress in bridging the workforce gap.
ISACA Foundation works globally with ISACA chapters, enterprises, and key
stakeholders to remove barriers by providing scholarships, resources, and tools
that will change the face of digital trust.

745 views • 1 year ago

VIDEO


AUDIT IN PRACTICE: AUDITING CULTURE

What’s The Risk LLC’s Cindy Baxter sits down with ISACA’s Robin Lyons to discuss
auditing culture, which can be one of the most interesting areas to audit. We
all have things we want out of our work environment like remote work, flexible
hours or as Cindy comments: “I’d love to take my dog to work with me!”, but she
and Robin question what is really important to workplace culture, and does it
start with a “tone at the top”? Cindy gives advice on auditing approaches and
key assessments when auditing as culture can be a critical part of an
organization, making or breaking its effectiveness. To read Cindy’s full length
article, please visit: www.isaca.org/auditing-culture To listen to more ISACA
Podcasts, please visit: www.isaca.org/podcasts

368 views • 1 year ago

VIDEO


INCIDENT REPORT & CONTINUOUS CONTROL MONITORING

This episode of the ISACA Podcast is all about incident reporting. Lesotho
Postbank's Relebohile Kobeli talks to ISACA's Collin Beder about mitigating
risk, minimizing losses from events, and good communication. As Relebohile says:
"as we carry out our daily tasks at work, we should always be proactive... and
recognize abnormal behavior". Tune in now! To read Relebohile's full article,
please visit: www.isaca.org/how-enterprises-can-leverage-incident-reporting To
listen to more ISACA Podcasts, please visit: www.isaca.org/podcasts

165 views • 1 year ago

VIDEO


ISACA LIVE | ADVANCING DIGITAL TRUST THROUGH IT

On National IT Professionals Day, ISACA's Kevin Keh explains how IT
professionals can advance digital trust in their organizations and in their
industries. Learn more at isaca.org/digital-trust

190 views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT - LISA YOUNG

Netflix's Lisa Young started as a bank teller that learned tech by fixing and
servicing ATMs, which transitioned to her joining the network ops field and
leading her to "help organizations understand what could keep them from meeting
their strategy, objectives or mission". After rough telecom layoffs, she
re-educated herself with ISACA certifications and started leading a chapter,
which included the honor of hosting an ISACA conference and she has developed
content with ISACA's Paul Phillips. In this episode she sits down with Paul to
discuss their shared work on ISACA-related projects, cyber careers and why you
should be curious and ask how things work. Lisa loves the idea of continuous
learning and asks, "what is a good next step for you?" To listen to more ISACA
Podcasts, go to isaca.org/podcasts Be sure to like, comment, and subscribe for
more ISACA Productions content.

306 views • 1 year ago

VIDEO


WHY I RENEW MY MEMBERSHIP WITH ISACA

In this video, we hear from various ISACA members on why they renew their
membership with ISACA year after year. The value of membership and the exclusive
benefits it offers, that keeps bringing them back. For more information, visit:
https://www.isaca.org/renewals.

900 views • 1 year ago

VIDEO


HOW TO GET STARTED WITH CMMI: ADOPTION AND TRANSITION GUIDANCE

A review of the Adoption and Transition Guidance, one of the many adoption
guidance materials available from with the CMMI Product Suite. The Adoption and
Transition Guidance is a great tool to help organizations new to CMMI or those
who are evolving with CMMI new content. Additional CMMI Content:
https://youtu.be/qImzALUL9kY
https://cmmiinstitute.com/resource-files/public/v2-0-materials/cmmi-v2-0-adoption-and-transition-guide

540 views • 1 year ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO YOU? ALEX FENG TESTIMONIAL

ISACA members weigh in on what Digital Trust means to them. For more
information, check out https://www.isaca.org/digital-trust

253 views • 1 year ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO YOU? SCOTT BAUMAN TESTIMONIAL

ISACA members weigh in on what Digital Trust means to them. For more
information, check out https://www.isaca.org/digital-trust

128 views • 1 year ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO YOU? RIA BLUITT TESTIMONIAL

ISACA members weigh in on what Digital Trust means to them. For more
information, check out https://www.isaca.org/digital-trust

108 views • 1 year ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO YOU? CHRIS MADEKSHO TESTIMONIAL

ISACA members weigh in on what Digital Trust means to them. For more
information, check out https://www.isaca.org/digital-trust

89 views • 1 year ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO YOU? CHARLOTTE HARRIS TESTIMONIAL

ISACA members weigh in on what Digital Trust means to them. For more
information, check out https://www.isaca.org/digital-trust

111 views • 1 year ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO YOU? MARTIN POIPOI TESTIMONIAL

ISACA members weigh in on what Digital Trust means to them. For more
information, check out https://www.isaca.org/digital-trust

85 views • 1 year ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO YOU? JULIE CHATMAN TESTIMONIAL

ISACA members weigh in on what Digital Trust means to them. For more
information, check out https://www.isaca.org/digital-trust

84 views • 1 year ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO YOU? TAMARA LAUTERBACH TESTIMONIAL

ISACA members weigh in on what Digital Trust means to them. For more
information, check out https://www.isaca.org/digital-trust

86 views • 1 year ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO YOU?

ISACA members weigh in on what Digital Trust means to them. For more
information, check out https://www.isaca.org/digital-trust

373 views • 1 year ago

VIDEO


ISACA LIVE | STATE OF DIGITAL TRUST 2022: WHAT IT MEANS FOR YOU AND YOUR
ORGANIZATION

ISACA's Vice President of Content Development and Karen Heslop and Cerby's Chief
Trust Officer Matt Chiodi look at the results of ISACA's global research on the
state of digital trust and what it means for enterprises worldwide. Learn more
at https://isaca.org/digital-trust

233 views • 1 year ago

VIDEO


ISACA LIVE | THE DARK FUTURE OF PRIVACY

Privacy Mining will increase because of billions of IoT devices being connected
every day. Combined with advanced psychologic research, this can be a very
powerful tool for manipulating people's behavior. A Fake reality also poses a
big threat to our future of privacy. Software, such as Deep Fakes, has the
ability to use someone's facial structure and create fake videos featuring
digitally created characters with an uncanny resemblance of real people, such as
celebrities. This technology is so advanced, that our minds aren't sophisticated
enough to comprehend the difference between real and fake data created by it,
which leads to the next point. We are entering a trust crisis. Trust is the
foundation for innovation and technological advance. If people don't trust
autonomous cars - they won't use them; if people don't certain websites - they
won't read their news; Without trust, we cannot move forward, which is why we
need to raise awareness about the dark future of privacy.

105 views • 1 year ago

VIDEO


FOCO DE LA INDUSTRIA - ARNULFO ESPINOSA DOMINGUEZ, PARTE II

El vicepresidente del Capítulo Monterrey de ISACA y Director de Auditoría y
Fraude de TI de uno de los Grupos Financieros más grandes de México, Arnulfo
Espinosa Domínguez, se une a Jocelyn Alcantar de ISACA para compartir muchas
cosas que ha aprendido durante sus 20 años de experiencia profesional en la
industria. Habiéndose dado cuenta del valor de la información a una edad
temprana, Arnulfo ha forjado su camino dentro de la comunidad de TI. Es un
formador acreditado para múltiples certificaciones, asesor independiente y
presidente de varios comités de Ciberseguridad, Riesgo y Auditoría, y es
reconocido mundialmente por un apodo que sus compañeros le han dado, "El
AudiTHOR". Como voluntario de ISACA desde hace mucho tiempo y orador de
conferencias, Arnulfo ha sido premiado en numerosas ocasiones por sus destacados
logros. En 2019, se le otorgó el "Premio al Líder de Capítulo Sobresaliente"
(Outstanding Chapter Leader Award) de ISACA, en 2020, recibió el "Premio John
Kuyers al Mejor Orador" (John Kuyers Award for Best), y recibió el mayor logro,
el "Premio Salón de la Fama de ISACA" (ISACA Hall of Fame Award) en 2021. 
¡Únase a la escucha de este episodio mientras Arnulfo ofrece sus mejores
consejos y prácticas para convertirse en un orador excepcional, consejos sobre
cómo los profesionales emergentes pueden entrar en la industria, y cómo su alter
ego, AudiTHOR, alimenta su pasión por la auditoría! Para leer más sobre Arnulfo,
visite
www.isaca.org/resources/news-and-trends/isaca-now-blog/2020/iamisaca-from-rock-star-to-speak-star
Para escuchar más Podcasts de ISACA, visite www.isaca.org/podcasts

225 views • 1 year ago

VIDEO


ETHICAL AI SHIFTING THE CONVERSATION LEFT

Many organizations prioritize goals such as gains and profits, which often
require rich data sets, but fail to consider the eventual impact of their data
handling methodologies on foundational social justice issues. ISACA's Collin
Beder talks to Josh Scarpino about his recently released article Evaluating
Ethical Challenges in AI and ML. Josh discusses issues such as ethical behavior,
systemic issues and how to create trusted systems. Collin also asks what is the
future for humans in regards to AI. Tune in now! To read Evaluating Ethical
Challenges in AI and ML, visit:
www.isaca.org/evaluating-ethical-challenges-in-ai-and-ml To listen to more ISACA
Podcasts, visit: www.isaca.org/podcasts

98 views • 1 year ago

VIDEO


WHY (AND HOW TO) DISPOSE OF DIGITAL DATA

The stakes are too high for organizations not to comply with data privacy
regulations,” Bassel Kablawi states in his article, "Why (and How to) Dispose of
Digital Data." As the Information Security and Data Privacy Consultant for
System Solutions, Bassel Kablawi has the knowledge and experience to determine
that the value of data disposal can help an organization protect personal data
from being exposed and why the final step in the Data Lifecycle could be
considered the most crucial. Bassel takes us on a deep dive into digital data
with ISACA's Safia Kazi on the five stages of data disposal in this ISACA
podcast episode. He explains why it is essential to understand that destruction
should be performed based on an organization’s retention policy and the five
main disposal methods of data, which include date anonymization, data deletion,
data crypto shredding (for encrypted data), data degaussing, and data
destruction. Tune in to hear Bassel explain why data destruction is critical to
developing digital trust with customers and stakeholders and could save an
organization’s reputation. To read Bassel's article, please visit:
www.isaca.org/resources/news-and-trends/industry-news/2022/why-and-how-to-dispose-of-digital-data
To listen to more ISACA Podcasts, please visit: www.isaca.org/podcasts

236 views • 1 year ago

VIDEO


ISACA COMMUNITY - CALL TO ACTION

Attention all past and current ISACA chapter leaders: If you or someone you know
within the ISACA community has done something awesome to help make the world a
better place, I want to share that story. Help us bring attention to what you
and others are doing so we can elevate the importance of helping others. To
learn more, reach out to mmoritz@isaca.org

142 views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT - JOHANN DETTWEILER, PART II

Link to Part I: https://youtu.be/jWGT03ftV58 In this ISACA podcast episode, we
connect with TalaTek Director of Operations Johann Dettweiler to discuss his
almost two decades of experience across multiple industry fields, his
involvement in FEDRAMP compliance, and why the next generation should focus on
adding certifications to their resumes. Johann tells ISACA's Keith Karlsson that
it was his work ethic and guidance of a trusted mentor that provided an
opportunity in the IT security field. In less than 12 months, he racked up
multiple impressive certifications such as CISSP, CCSP, and CEH that rapidly
advanced his career and, as he explains it, allows him to be “the person that
everyone hates because I tell you what is wrong with your system.” Johann’s
strong background in research and his constant quest for knowledge about this
evolving industry, he is more than willing to provide listeners with his
efficiency hacks to stay productive, motivational career advice, and why the
next-generation cyber professionals may have an advantage over him. Tune in now
to meet Senior Security Information Security Consultant Johann Dettweiler. To
learn more about Johann, visit https://talatek.com/project/johann-dettweiler/ To
listen to other ISACA Podcast episodes, visit www.isaca.org/podcast

201 views • 1 year ago

VIDEO


IN PURSUIT OF DIGITAL TRUST – TAMARA LAUTERBACH (SHORT)

ISACA member Tamara Lauterbach shares her perspective on why focusing on digital
trust is a must for companies to succeed in today’s world. Learn more at
https://isaca.org/digital-trust

127 views • 1 year ago

VIDEO


IN PURSUIT OF DIGITAL TRUST – TAMARA LAUTERBACH

ISACA member Tamara Lauterbach shares her perspective on why focusing on digital
trust is a must for companies to succeed in today’s world. Learn more at
https://isaca.org/digital-trust

642 views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT - JOHANN DETTWEILER, PART I

Link to Part II: https://youtu.be/Dhr-VAFid-E In this ISACA podcast episode, we
connect with TalaTek Director of Operations Johann Dettweiler to discuss his
almost two decades of experience across multiple industry fields, his
involvement in FEDRAMP compliance, and why the next generation should focus on
adding certifications to their resumes. Johann tells ISACA's Keith Karlsson that
it was his work ethic and guidance of a trusted mentor that provided an
opportunity in the IT security field. In less than 12 months, he racked up
multiple impressive certifications such as CISSP, CCSP, and CEH that rapidly
advanced his career and, as he explains it, allows him to be “the person that
everyone hates because I tell you what is wrong with your system.” Johann’s
strong background in research and his constant quest for knowledge about this
evolving industry, he is more than willing to provide listeners with his
efficiency hacks to stay productive, motivational career advice, and why the
next-generation cyber professionals may have an advantage over him. Tune in now
to meet Senior Security Information Security Consultant Johann Dettweiler. To
learn more about Johann, visit https://talatek.com/project/johann-dettweiler/ To
listen to other ISACA Podcast episodes, visit www.isaca.org/podcast

463 views • 1 year ago

VIDEO


ACHIEVING EFFECTIVE CLOUD RISK MANAGEMENT

Cloud is ubiquitous now. From small enterprises to large companies, all are
moving a part of their technology operations to cloud. Initial reluctance is now
nowhere to be seen. There is more confidence among the user for the use of cloud
technology. Join ISACA’s Jeff Champion as he talks with Risk and Control
Specialist, Upesh Parekh about cloud deployment models, the various risks
involved with cloud storage, and what to know when using cloud technology for an
organization. Read Achieving Effective Cloud Risk Management at:
www.isaca.org/achieving-effective-cloud-risk-management Listen to more ISACA
Podcasts at: www.isaca.org/podcasts

743 views • 1 year ago

VIDEO


ADVANCING DIGITAL TRUST THROUGH DATA PRIVACY

For more information, check out https://www.isaca.org/digital-trust

413 views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT - DR. BLAKE CURTIS PART II

Link to Part I: https://youtu.be/AE-FykwzviU Author, editor, speaker, and
educator, Dr. Blake Curtis is joined by Red Cross’s Senior Internal Auditor Niki
Gomes to talk about everything from growing up in a small town to completing his
master’s degree in 10 weeks and publishing his 600-page dissertation in this
ISACA Industry Spotlight episode. In a meaningful conversation, Blake discusses
how surviving a near-death experience transformed and motivated him to expand
his understanding of what it means to be a human. He was inspired to supercharge
his learning, career journey, and personal growth. Making the decision to become
intentional in every interaction and giving 100% of his effort in every
initiative, he blazed his path to success. At the 2022 ISACA North America
Conference, Blake presented his findings from his ground-breaking and
internationally known dissertation, "The Next Generation Cybersecurity Auditor.”
His research discovered a technical competency gap in Big Four IT Auditors and
SMEs and debunked the 10,000-hour rule and "years of experience" fallacy. His
study proved that task-based experience is more objective than time-based
experience. Blake is also the author of "How to Complete Your Master's Degree in
One Semester," which has assisted over 150 students to complete their master’s
degrees in record-setting times. Along his journey, he has earned over 30 IT
certifications and gained additional impressive certificates for engineering,
advising, managing, and leadership. Blake has an abundance of experience to
share with ISACA’s audience. Tune in now to be inspired, uplifted, and
enlightened by his techniques, advice, and wisdom that can help boost your
career! Below you can find materials and resources that Blake would like to
share with our audience. Links: How to regulate a profession pg. 261 and 265 of
Creating the Next Generation Cybersecurity Auditor: Examining the Relationship
between It Auditors’ Competency, Audit Quality, & Data Breaches - ProQuest
Debunking Years of Experience:
https://www.linkedin.com/posts/reginaldblakecurtis_science-hiring-experience-activity-6951573321901621248-cygl?utm_source=linkedin_share&utm_medium=member_desktop_web
Videos Equitable Hiring YouTube Series link:
https://www.youtube.com/watch?v=IsnoCNIA2WU&list=PLfr4LANhCPrCXIc6V_h_k2dyKwPP7wJJa
Tools Inoreader: Inoreader - Take back control of your newsfeed Anki Notecards
(Spaced Repetition): About - AnkiWeb Notion Books Art of Conversation – Judy
Apps Verbal Judo – George Thompson The Science of Self-Learning – Peter Hollins
Finish What Your Start – Peter Hollins The Power of Discipline – Daniel Walter

357 views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT - DR. BLAKE CURTIS, PART I

Link to Part II: https://youtu.be/zlrGdTRP-OA Author, editor, speaker, and
educator, Dr. Blake Curtis is joined by Red Cross’s Senior Internal Auditor Niki
Gomes to talk about everything from growing up in a small town to completing his
master’s degree in 10 weeks and publishing his 600-page dissertation in this
ISACA Industry Spotlight episode. In a meaningful conversation, Blake discusses
how surviving a near-death experience transformed and motivated him to expand
his understanding of what it means to be a human. He was inspired to supercharge
his learning, career journey, and personal growth. Making the decision to become
intentional in every interaction and giving 100% of his effort in every
initiative, he blazed his path to success. At the 2022 ISACA North America
Conference, Blake presented his findings from his ground-breaking and
internationally known dissertation, "The Next Generation Cybersecurity Auditor.”
His research discovered a technical competency gap in Big Four IT Auditors and
SMEs and debunked the 10,000-hour rule and "years of experience" fallacy. His
study proved that task-based experience is more objective than time-based
experience. Blake is also the author of "How to Complete Your Master's Degree in
One Semester," which has assisted over 150 students to complete their master’s
degrees in record-setting times. Along his journey, he has earned over 30 IT
certifications and gained additional impressive certificates for engineering,
advising, managing, and leadership. Blake has an abundance of experience to
share with ISACA’s audience. Tune in now to be inspired, uplifted, and
enlightened by his techniques, advice, and wisdom that can help boost your
career! Below you can find materials and resources that Blake would like to
share with our audience. Links: How to regulate a profession pg. 261 and 265 of
Creating the Next Generation Cybersecurity Auditor: Examining the Relationship
between It Auditors’ Competency, Audit Quality, & Data Breaches - ProQuest
Debunking Years of Experience:
https://www.linkedin.com/posts/reginaldblakecurtis_science-hiring-experience-activity-6951573321901621248-cygl?utm_source=linkedin_share&utm_medium=member_desktop_web
Videos Equitable Hiring YouTube Series link:
https://www.youtube.com/watch?v=IsnoCNIA2WU&list=PLfr4LANhCPrCXIc6V_h_k2dyKwPP7wJJa
Tools Inoreader: Inoreader - Take back control of your newsfeed Anki Notecards
(Spaced Repetition): About - AnkiWeb Notion Books Art of Conversation – Judy
Apps Verbal Judo – George Thompson The Science of Self-Learning – Peter Hollins
Finish What Your Start – Peter Hollins The Power of Discipline – Daniel Walter

866 views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT - ARNULFO ESPINOSA DOMINGUEZ, PART II

Link to Part I: https://youtu.be/yNQvbf9onik Vice President of the ISACA
Monterrey Chapter and IT Audit & Fraud Director of one of the largest Financial
Groups in México, Arnulfo Espinosa Dominguez, joins ISACA’s Jocelyn Alcantar to
share some of the many things he has learned over his 20 years of professional
experience in the industry. Having realized the value of information at an early
age, Arnulfo has forged his path within the IT community. He is an accredited
trainer for multiple certifications, an independent advisor and chairman for
various Cybersecurity, Risk, and Audit committees, and is globally recognized by
a nickname his peers have given him, "The AudiTHOR.” As a long-time ISACA
volunteer and conference speaker, Arnulfo has been awarded on numerous occasions
for his outstanding achievements. In 2019, he was given the ISACA “Outstanding
Chapter Leader Award,” in 2020, he received the “John Kuyers Award for Best
Speaker”, and he received the highest achievement, the “ISACA Hall of Fame
Award” in 2021. Tune into this episode as Arnulfo offers his best tips and
practices for becoming an exceptional keynote speaker, advice on how the
up-and-coming professionals can get into the industry, and how his alter ego,
AudiTHOR, fuels his passion for auditing! To read more about Arnulfo, visit
www.isaca.org/resources/news-and-trends/isaca-now-blog/2020/iamisaca-from-rock-star-to-speak-star.
To listen to more ISACA Podcasts, visit www.isaca.org/podcasts.

107 views • 1 year ago

VIDEO


CAREER COACH ADVICE: HOW TO LAUNCH YOUR IT AUDIT CAREER

Career coach Caitlin McGaw will share her top tips for young professionals and
career changes on how to launch a successful career in IT audit--from acing your
first interview and landing your first job to career resources to help your
career continue to grow and thrive. To learn more, check out
https://www.caitlinmcgaw.com/

518 views • 1 year ago

VIDEO


ISACA COMMUNITY DAY 2022

In this video, Pam Nigro, ISACA Board Chair welcomes members to attend ISACA’s
4th Annual CommunITy Day to be held on Saturday, 1 October 2022. A one-day
initiative to foster relationships between members and offer opportunities for
networking and leadership. Members along with their friends and family are
encouraged to give back to their local or global communities, individually or
collectively to make a lasting global impact. For more information, check out
https://engage.isaca.org/communityday/about

852 views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT - ARNULFO ESPINOSA DOMINGUEZ, PART I

Link to Part II: https://youtu.be/plxD2frpYk0 Vice President of the ISACA
Monterrey Chapter and IT Audit & Fraud Director of one of the largest Financial
Groups in México, Arnulfo Espinosa Dominguez, joins ISACA’s Jocelyn Alcantar to
share some of the many things he has learned over his 20 years of professional
experience in the industry. Having realized the value of information at an early
age, Arnulfo has forged his path within the IT community. He is an accredited
trainer for multiple certifications, an independent advisor and chairman for
various Cybersecurity, Risk, and Audit committees, and is globally recognized by
a nickname his peers have given him, "The AudiTHOR.” As a long-time ISACA
volunteer and conference speaker, Arnulfo has been awarded on numerous occasions
for his outstanding achievements. In 2019, he was given the ISACA “Outstanding
Chapter Leader Award,” in 2020, he received the “John Kuyers Award for Best
Speaker”, and he received the highest achievement, the “ISACA Hall of Fame
Award” in 2021.   Tune into this episode as Arnulfo offers his best tips and
practices for becoming an exceptional keynote speaker, advice on how the
up-and-coming professionals can get into the industry, and how his alter ego,
AudiTHOR, fuels his passion for auditing! To read more about Arnulfo,
visit www.isaca.org/resources/news-and-trends/isaca-now-blog/2020/iamisaca-from-rock-star-to-speak-star.
To listen to more ISACA Podcasts, visit www.isaca.org/podcasts.

270 views • 1 year ago

VIDEO


CMMI TECH TALK: HOW TO PROPERLY IDENTIFY STRENGTHS

Discover how to identify a gratuitous strength and learn how to write proper
strength statements. For more information, check out
www.isaca.org/enterprise/cmmi-cybermaturity-platform

328 views • 1 year ago

VIDEO


CURRENT STATE OF CYBERSECURITY IN K12

ISACAs Director of Professional Practices and Innovation Jon Brand hosts Doug
Levin, co-founder and National Director of K12 Security Information eXchange
(K12 SIX), a national non-profit dedicated solely to helping schools protect
themselves from emerging cybersecurity threats. Levin's work includes
development and implementation of the nations initial and subsequent technology
plans and well as creation of K-12 Cyber Incident Map, the most comprehensive
database of publicly-disclosed K-12 cybersecurity incidents. Throughout this
episode they discuss the often unique challenges for the underrepresented sector
of U.S. critical infrastructure and current initiatives to bolster K-12
cybersecurity and privacy. For more information, check out
https://www.k12six.org/ Be sure to like, comment and subscribe for more ISACA
Productions content

386 views • 1 year ago

VIDEO


ISACA MENTORSHIP PROGRAM - TESTIMONIALS

In this video, ISACA members share their personal experience with the ISACA
Mentorship Program (exclusive to members) which facilitates one-to-one
mentorship connections and brings together ISACA members at all stages of their
careers, to give or receive professional development support. Mentorship is a
two-way opportunity, and we hear perspectives from both mentors and mentees on
how the program has allowed them to expand their networks, gain new knowledge
and build new skills. For more information, visit: https://mentorship.isaca.org

2K views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT - TODD FITZGERALD

Cybersecurity leader, author, and host of the CISO Stories podcast, Todd
Fitzgerald sits down with ISACA’s Chelsey Byrd to discuss his extensive career
journey in security, his best-selling book, CISO COMPASS, and how a make-believe
FBI club connects directly to his career passions today. As one of ISACA’s
top-rated speakers, Todd gives tips and techniques for the best way to prepare
for a speaking event, how to engage the audience, and some entertaining moments
and behind-the-scenes accounts from conferences! Named the Chicago CISO of the
Year and ranked Top 50 IS Executive in 2016 and 2017, Todd offers listeners his
best career advice, ways to stay aware of current business trends, and much
more. Listen now to this episode of ISACA’s Industry Spotlight. To listen to
CISO Stories, visit
https://securityweekly.com/category-shows/the-ciso-stories-podcast/ To listen to
more ISACA Podcasts, visit www.isaca.org/podcasts

262 views • 1 year ago

VIDEO


CMMI TECH TALK: HOW TO HANDLE COMMON APPRAISAL ISSUES

How to handle appraisal issues and understand when to stop an appraisal. For
more information, check out www.isaca.org/enterprise/cmmi-cybermaturity-platform

341 views • 1 year ago

VIDEO


ISACA ENGAGE: WHY ENGAGE?

Get involved in your professional community and expand your network through
ISACA Engage. Engage offers many opportunities to get involved in ways that
align with your time, talent, and interests. To learn more, go to
https://engage.isaca.org/home

242 views • 1 year ago

VIDEO


ISACA ENGAGE: LEARN MORE ABOUT ISACA ENGAGE

Get involved in your professional community and expand your network through
ISACA Engage. Engage offers many opportunities to get involved in ways that
align with your time, talent, and interests. To learn more, go to
https://engage.isaca.org/home

244 views • 1 year ago

VIDEO


MANAGING SECURITY ACROSS DISPARATE DATABASE TECHNOLOGIES

We usually think about the most efficient way to do things while working in
production environments. Still, often employees forget about an insecure
environment once the work has been completed and they have moved on to another
project. “We don’t always need to audit things; sometimes you can gauge risk by
having a conversation with stakeholders…on how they manage databases,” says Adam
Kohnke, Cybersecurity Architect for Charter Next Generation. Adam joins ISACA’s
Jon Brandt in this episode to discuss his recently released ISACA Journal
article, “Managing Security Across Disparate Database Technologies.” Adam breaks
down best practices for User Access Management, Encryption, and Logging. He
comments on the best ways to start the conversation about security beyond what
management considers vital for IT. Tune in now for the full episode! To read the
full article, visit
www.isaca.org/managing-security-across-disparate-database-technologies. To
listen to more ISACA podcasts, visit: www.isaca.org/podcasts

323 views • 1 year ago

VIDEO


IN PURSUIT OF DIGITAL TRUST – ANTHONY AYO

ISACA member Anthony Ayo talks about how people, processes and technology can
come together to strengthen digital trust and how those dynamics play out in his
role at the local government level. For more information, check out
https://isaca.org/digital-trust

912 views • 1 year ago

VIDEO


IN PURSUIT OF DIGITAL TRUST – ANTHONY AYO (SHORT)

ISACA member Anthony Ayo talks about how people, processes and technology can
come together to strengthen digital trust and how those dynamics play out in his
role at the local government level. For more information, check out
https://isaca.org/digital-trust

163 views • 1 year ago

VIDEO


ISACA ENGAGE: OTHER ENGAGE OPPORTUNITIES

Get involved in your professional community and expand your network through
ISACA Engage. Engage offers many opportunities to get involved in ways that
align with your time, talent, and interests. To learn more, go to
https://engage.isaca.org/home

181 views • 1 year ago

VIDEO


ADVANCING DIGITAL TRUST THROUGH AUDIT AND ASSURANCE

A strong audit and assurance function is critical to achieving digital trust in
an organization. This conversation spotlights audit's role in digital trust and
outlines key priorities. It also shares new ISACA resources for auditors. For
more information, go to https://isaca.org/digital-trust

405 views • 1 year ago

VIDEO


ISACA ENGAGE: HOW TO GET INVOLVED

Get involved in your professional community and expand your network through
ISACA Engage. Engage offers many opportunities to get involved in ways that
align with your time, talent, and interests. To learn more, go to
https://engage.isaca.org/home

268 views • 1 year ago

VIDEO


IMPLEMENTING EMERGING TECHNOLOGIES: AGILE SDLC STILL WORKS

AI is a part of our everyday life. What's The Risk LLC's Cindy Baxter gives
ISACA's Kevin Keh examples of modern media like the movies Free Guy, Ron’s Gone
Wrong and The Matrix, and how they relate to AI-related risk factors, and they
ask the questions, what is true? what is the data we are looking at? AI is about
data accuracy and reputational risk, and Cindy discusses how to manage
frameworks, create meaningful check points and intended outcomes six months or 2
years later that are spot on for what an organization intended. Cindy strongly
believes that you always get a better outcome with diversity, because people
from diverse backgrounds and life experiences create different ways to learn and
produce innovative ideas and avoid rework. To read Cindy's full article, visit:
www.isaca.org/implementing-emerging-technologies To listen to more ISACA
podcasts, visit: www.isaca.org/podcasts

203 views • 1 year ago

VIDEO


ISACA ENGAGE: WHAT MAKES ISACA'S VOLUNTEER PROGRAM DIFFERENT?

Get involved in your professional community and expand your network through
ISACA Engage. Engage offers many opportunities to get involved in ways that
align with your time, talent, and interests. To learn more, go to
https://engage.isaca.org/home

127 views • 1 year ago

VIDEO


ISACA ENGAGE: BENEFITS OF ISACA ENGAGE

Get involved in your professional community and expand your network through
ISACA Engage. Engage offers many opportunities to get involved in ways that
align with your time, talent, and interests. To learn more, go to
https://engage.isaca.org/home

127 views • 1 year ago

VIDEO


ISACA ENGAGE: ISACA’S VOLUNTEER BOARD

Get involved in your professional community and expand your network through
ISACA Engage. Engage offers many opportunities to get involved in ways that
align with your time, talent, and interests. To learn more, go to
https://engage.isaca.org/home

238 views • 1 year ago

VIDEO


ISACA LIVE | MANAGING SUPPLY CHAIN RISK WITH RICHARD HOLLIS

ISACA's risk expert Paul Phillips and Richard Hollis, CEO of Risk Factory and an
ISACA Conference Europe speaker, examine top cyber risks impacting the supply
chain, steps organizations need to take to manage supply chain risk, and
important steps to take in the contract process. For more information, check out
https://www.isaca.org/supply-chain-security Be sure to like, comment, and
subscribe for more ISACA Productions content.

305 views • 1 year ago

VIDEO


ISACA ENGAGE: WHAT IS ISACA ENGAGE?

Get involved in your professional community and expand your network through
ISACA Engage. Engage offers many opportunities to get involved in ways that
align with your time, talent, and interests. To learn more, go to
https://engage.isaca.org/home

144 views • 1 year ago

VIDEO


ISACA ENGAGE: ISACA ENGAGE & VOLUNTEERISM

Get involved in your professional community and expand your network through
ISACA Engage. Engage offers many opportunities to get involved in ways that
align with your time, talent, and interests. To learn more, go to
https://engage.isaca.org/home

138 views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT - PAM NIGRO

On this episode of Industry Spotlight, ISACA's outgoing Board Chair, Greg
Touhill, introduces the 2022-23 Board Chair, Pam Nigro. They trade stories from
their careers, Pam's thoughts on the future of ISACA, how Game of Thrones
relates to Cybersecurity, and Greg shares his favorite moments from his tenure.
To read Pam's welcome letter, go to:
www.isaca.org/letter-from-the-incoming-board-chair To listen to more ISACA
Podcasts, go to: www.isaca.org/podcasts

245 views • 1 year ago

VIDEO


ICNA - IN-PERSON BUZZ WITH ALEX HOLDEN

In-Person Buzz interview with Alex Holden from 2022 ICNA For more information,
go to https://www.isaca.org/

276 views • 1 year ago

VIDEO


ICNA - IN-PERSON BUZZ WITH ROB CLYDE

In-Person Buzz interview with Rob Clyde from 2022 ICNA. For more information, go
to https://www.isaca.org/

222 views • 1 year ago

VIDEO


THE IMPACT OF PEOPLE ON THE INFORMATION TECHNOLOGY LANDSCAPE

In this episode, ISACA’s Jon Brandt chats with Thomas Lenzenhofer, Business
Development Manager at Cisco, about his new ISACA article titled, “The Impact of
People on Today’s Information Security Landscape.” With over 20 years of
industry experience and named 2016–17 Chicago CISO of the Year, ranked Top 50 IS
Executive, Thomas has a wealth of knowledge to share with ISACA listeners.
Security of an organization is a serious matter and Thomas gives a vivid
scenario from his recent ISACA Journal article about how an attack of a
country's health care system could be massively disruptive to daily functions of
staff computer systems, possibly causing employees to not receive payroll.
Thomas also gives examples of how to properly train staff to avoid an event like
this and says that from the top-down security is a business enabler. Tune in
now! To read Thomas' ISACA article, visit:
www.isaca.org/impact-of-people-on-information-security-landscape To listen to
more ISACA podcasts, visit: www.isaca.org/podcasts

125 views • 1 year ago

VIDEO


CMMI TECH TALK: QUALITY AUDITS

A review of the quality audit process from what triggers an audit, what an audit
entails, and what are the possible results of the audit. For additional
information, check the links below:
https://cmmiinstitute.com/resource-files/public/quality/quality/cmmi%C2%A9-appraisal-%E2%80%93-sponsor-role-and-responsibilitie
https://cmmiinstitute.com/resource-files/public/quality/quality/cmmi%c2%a9-appraisal-%e2%80%93-sponsor-role-and-responsibilitie
https://cmmiinstitute.com/resource-files/public/quality/quality/quality-remedial-and-corrective-actions-policy
https://cmmiinstitute.com/resource-library/public/quality/policies/cmmi-quality-audit-policy
https://cmmiinstitute.com/partners/policies
https://cmmiinstitute.com/resource-files/public/quality/quality/policies/code-of-professional-conduct

640 views • 1 year ago

VIDEO


GRC FOR INTELLIGENT ECOSYSTEMS (GRCIE): AN INNOVATIVE APPROACH TO WORKFORCE
ENABLEMENT PART II

Executive Director for GRC for Intelligent Ecosystem (GRCIE) Jenai Marinkovic
joins ISACA Director of Professional Practices and Innovation Jon Brandt to
address key findings in ISACA's 2022 State of Cybersecurity report and talk
about GRCIE program. In this two-part program, they delve into program creation,
services offered, student selection and how ISACA research continues to shape
their work.  For more information about GRCIE, visit https://www.grcie.org/ Be
sure to like, comment, and subscribe for more ISACA Productions content Direct
Link to Part I: https://youtu.be/S4U1e9PMlmg

58 views • 1 year ago

VIDEO


GRC FOR INTELLIGENT ECOSYSTEMS (GRCIE): AN INNOVATIVE APPROACH TO WORKFORCE
ENABLEMENT PART I

Executive Director for GRC for Intelligent Ecosystem (GRCIE) Jenai Marinkovic
joins ISACA Director of Professional Practices and Innovation Jon Brandt to
address key findings in ISACA's 2022 State of Cybersecurity report and talk
about GRCIE program. In this two-part program, they delve into program creation,
services offered, student selection and how ISACA research continues to shape
their work. For more information about GRCIE, visit https://www.grcie.org/ Be
sure to like, comment, and subscribe for more ISACA Productions content Direct
Link to Part II: https://youtu.be/Bg7_Oh3Ifow

294 views • 1 year ago

VIDEO


SMARTER TESTING = SAFER DIGITAL EXPERIENCES

Application testing is a critical component of a software development lifecycle.
A complete testing battery for any application includes not only functionality
and usability testing but security and reliability testing as well. However,
helping ensure that security testing in particular produces results that focus
on actionable items – with accurate relative priorities – has been a persistent
challenge. Are actionable items from testing actually going to move the needle
in terms of product quality and resilience – especially in how they manage
evolving threats? While the “OWASP Top 10” and “CWE/SANS Top 25” are still
important, they represent merely a reasonable beginning to a security testing
strategy. How do you go beyond those lists and become truly more
“adversary-aware” in testing? In addition, how do you make sure that these
testing efforts genuinely help your development teams “shift left” in their
thinking and implementation of better security controls in your applications?
These are challenges Adobe set out to solve by not just making our testing
efforts more extensive or frequent – but smarter, and with as tight of alignment
as possible to the software development lifecycle and even closer in modeling
real-world adversary threats. We invite you to join Shannon Lietz, VP, Adobe
Security, as she speaks with ISACA's IT Audit Professional Practices Principal,
Robin Lyons for a discussion of these issues and others that we must address as
an industry to make us genuinely more “DevSecOps”-minded in our approach to
application security testing. Robin and Shannon will discuss Adobe’s overall
strategy around our application testing efforts and how smarter testing is
fundamental to achieving a true “shift left” approach around application
security. They will also talk about how this effort is really going to help us
deliver the safer digital experiences users are demanding. For more information
go to https://trust.adobe.com Be sure to like, comment, and subscribe for more
ISACA Productions content.

388 views • 1 year ago

VIDEO


LEARN ABOUT THE VALUE OF BECOMING AN ISACA ACCREDITED TRAINING ORGANIZATION

We invite you to view this short video to learn more about the ISACA Accredited
Training Partner Program and how it can help IT Training organizations
differentiate themselves by delivering ISACA’s globally recognized Credentials
and Training. For more information, check out
https://www.isaca.org/en/enterprise/partner-with-isaca

335 views • 1 year ago

VIDEO


ISACA STATE OF PRIVACY 2022

Join Safia Kazi, Privacy Professional Practices Associate at ISACA, as she
breaks down the key findings, stats and figures from the latest ISACA State of
Privacy 2022 report. With over 27,000 participants, the recent study reveals
exciting discoveries and shocking truths regarding the current state of the
industry, the differences in funding and staffing between technical privacy
teams and legal/compliance privacy teams and so much more. For more information,
be sure to check out
https://store.isaca.org/s/community-event?id=a334w000004cmroAAA

531 views • 1 year ago

VIDEO


CYBERSECURITY AT ISACA

Our ever-changing world relies on the power of professionals like you to defend
against potential cybersecurity threats. ISACA has the training, credentialing,
networking, resources and so much more that prepare you for what tomorrow
brings. Learn more at isaca.org/resources/cybersecurity

18K views • 1 year ago

VIDEO


BUILDING EARLY CAREER MOMENTUM WITH ISACA

Young professionals accelerate their career growth and expand their networks by
getting involved with ISACA early in their careers.
www.isaca.org/young-professionals

1K views • 1 year ago

VIDEO


WHAT CAN ISACA CERTIFICATIONS DO FOR YOU? HEAR FROM CERTIFICATION HOLDERS

ISACA certification holders share how ISACA certifications gave them credibility
and recognition in their careers. http://bit.ly/2P3Xz2i Bruno, CISA, CRISC,
CGEIT shares what motivated him to get certified. Hear how, no matter how his
career focus changed, he was able to benefit from ISACA certifications, prove
his commitment to high standards of professionalism and be successful across
multiple aspects such as IS/IT audit, security, risk and governance. Learn more
about ISACA certifications: http://bit.ly/2P3Xz2i

5K views • 1 year ago

VIDEO


IS/IT CERTIFICATIONS VALIDATE CREDIBILITY AND COMMITMENT TO LEARNING

ISACA certification holders share their experience, citing significant
improvements in engagement and performance in themselves as well as their
mentees and staff. http://bit.ly/2P3Xz2i Hear from a Certified Information
Systems Auditor® (CISA®) certification holder on how CISA brings built-in brand
recognition, validates his expertise, and helps him be nimble in an
ever-evolving technology landscape. Since CISA’s inception in 1978, ISACA now
has 151,000+ CISA holders worldwide. CISA is a building block for your career
success, no matter which aspect of IS/IT you are focused on. Learn more about
ISACA certifications: http://bit.ly/2P3Xz2i

904 views • 1 year ago

VIDEO


WHY VOLUNTEER AS AN ISACA CHAPTER LEADER?

Learn from those who have benefitted from serving on an ISACA chapter board. To
learn more, check out https://www.isaca.org/

529 views • 1 year ago

VIDEO


ISACA COMMUNITY DAY 2021

Join is on Saturday, 2 October 2021 for the 3rd Annual ISACA CommunITy Day! For
more information, visit https://engage.isaca.org/communityday

879 views • 1 year ago

VIDEO


DATA RESILIENCE

Ensuring That Your Organization Is Data Resilient Part I--Data is something we
constantly interact with. What happens when an adverse event occurs, thus
compromising your organization? Guy Pearce is the Chief Data Officer and Chief
Digital Officer at Convergence Tech. Guy sits down with ISACA's Kevin Keh to dig
into everything you'll want to know to keep your organization's data safe.
Listen is as Guy defines data resilience, understanding what the 4 aspects of
the data operating model are and how to utilize them, and the importance of data
governance. Kevin and Guy will also cover the resilience
attributes—availability, usability, robustness interoperability and
performance—as well as the need for enterprise risk officers to assure they
actually perform data risk assessments. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-3/data-resilience-is-data-risk-management
for more information!

250 views • 1 year ago

VIDEO


TWO PERSPECTIVES ON DATA RESILIENCE: DATA OPERATING MODEL AND DATA CAPABILITIES

Ensuring That Your Organization Is Data Resilient Part II--Data is something we
constantly interact with. What happens when an adverse event occurs, thus
compromising your organization? Guy Pearce is the Chief Data Officer and Chief
Digital Officer at Convergence Tech. Guy sits down with ISACA's Kevin Keh to dig
into everything you'll want to know to keep your organization's data safe.
Listen is as Guy defines data resilience, understanding what the 4 aspects of
the data operating model are and how to utilize them, and the importance of data
governance. Kevin and Guy will also cover the resilience
attributes—availability, usability, robustness interoperability and
performance—as well as the need for enterprise risk officers to assure they
actually perform data risk assessments. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-3/data-resilience-is-data-risk-management
for more information!

128 views • 1 year ago

VIDEO


KEY CONSTRUCTS OF A RESILIENT SYSTEM

Ensuring That Your Organization Is Data Resilient Part III--Data is something we
constantly interact with. What happens when an adverse event occurs, thus
compromising your organization? Guy Pearce is the Chief Data Officer and Chief
Digital Officer at Convergence Tech. Guy sits down with ISACA's Kevin Keh to dig
into everything you'll want to know to keep your organization's data safe.
Listen is as Guy defines data resilience, understanding what the 4 aspects of
the data operating model are and how to utilize them, and the importance of data
governance. Kevin and Guy will also cover the resilience attributes
—availability, usability, robustness interoperability and performance— as well
as the need for enterprise risk officers to assure they actually perform data
risk assessments. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-3/data-resilience-is-data-risk-management
for more information!

70 views • 1 year ago

VIDEO


DATA CAPABILITY FAILURES

Ensuring That Your Organization Is Data Resilient Part IV--Data is something we
constantly interact with. What happens when an adverse event occurs, thus
compromising your organization? Guy Pearce is the Chief Data Officer and Chief
Digital Officer at Convergence Tech. Guy sits down with ISACA's Kevin Keh to dig
into everything you'll want to know to keep your organization's data safe.
Listen is as Guy defines data resilience, understanding what the 4 aspects of
the data operating model are and how to utilize them, and the importance of data
governance. Kevin and Guy will also cover the resilience
attributes—availability, usability, robustness interoperability and
performance—as well as the need for enterprise risk officers to assure they
actually perform data risk assessments. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-3/data-resilience-is-data-risk-management
for more information!

34 views • 1 year ago

VIDEO


ATTRIBUTES OF DATA RESILIENCE

Ensuring That Your Organization Is Data Resilient Part V--Data is something we
constantly interact with. What happens when an adverse event occurs, thus
compromising your organization? Guy Pearce is the Chief Data Officer and Chief
Digital Officer at Convergence Tech. Guy sits down with ISACA's Kevin Keh to dig
into everything you'll want to know to keep your organization's data safe.
Listen is as Guy defines data resilience, understanding what the 4 aspects of
the data operating model are and how to utilize them, and the importance of data
governance. Kevin and Guy will also cover the resilience
attributes—availability, usability, robustness interoperability and
performance—as well as the need for enterprise risk officers to assure they
actually perform data risk assessments. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-3/data-resilience-is-data-risk-management
for more information!

73 views • 1 year ago

VIDEO


CONSIDERING THE VARIOUS TYPES OF DATA RISKS

Ensuring That Your Organization Is Data Resilient Part VII--Data is something we
constantly interact with. What happens when an adverse event occurs, thus
compromising your organization? Guy Pearce is the Chief Data Officer and Chief
Digital Officer at Convergence Tech. Guy sits down with ISACA's Kevin Keh to dig
into everything you'll want to know to keep your organization's data safe.
Listen is as Guy defines data resilience, understanding what the 4 aspects of
the data operating model are and how to utilize them, and the importance of data
governance. Kevin and Guy will also cover the resilience
attributes—availability, usability, robustness interoperability and
performance—as well as the need for enterprise risk officers to assure they
actually perform data risk assessments. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-3/data-resilience-is-data-risk-management
for more information!

65 views • 1 year ago

VIDEO


BENEFITS OF DATA RESILIENCE

Ensuring That Your Organization Is Data Resilient Part VIII--Data is something
we constantly interact with. What happens when an adverse event occurs, thus
compromising your organization? Guy Pearce is the Chief Data Officer and Chief
Digital Officer at Convergence Tech. Guy sits down with ISACA's Kevin Keh to dig
into everything you'll want to know to keep your organization's data safe.
Listen is as Guy defines data resilience, understanding what the 4 aspects of
the data operating model are and how to utilize them, and the importance of data
governance. Kevin and Guy will also cover the resilience
attributes—availability, usability, robustness interoperability and
performance—as well as the need for enterprise risk officers to assure they
actually perform data risk assessments. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-3/data-resilience-is-data-risk-management
for more information!

83 views • 1 year ago

VIDEO


ENSURING YOUR ORGANIZATION IS DATA RESILIENT

Ensuring That Your Organization Is Data Resilient Part VI--Data is something we
constantly interact with. What happens when an adverse event occurs, thus
compromising your organization? Guy Pearce is the Chief Data Officer and Chief
Digital Officer at Convergence Tech. Guy sits down with ISACA's Kevin Keh to dig
into everything you'll want to know to keep your organization's data safe.
Listen is as Guy defines data resilience, understanding what the 4 aspects of
the data operating model are and how to utilize them, and the importance of data
governance. Kevin and Guy will also cover the resilience
attributes—availability, usability, robustness interoperability and
performance—as well as the need for enterprise risk officers to assure they
actually perform data risk assessments. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-3/data-resilience-is-data-risk-management
for more information!

51 views • 1 year ago

VIDEO


DATA RISK ASSESSMENTS AND THE JOURNEY OF DATA RESILIENCE

Ensuring That Your Organization Is Data Resilient Part IX--Data is something we
constantly interact with. What happens when an adverse event occurs, thus
compromising your organization? Guy Pearce is the Chief Data Officer and Chief
Digital Officer at Convergence Tech. Guy sits down with ISACA's Kevin Keh to dig
into everything you'll want to know to keep your organization's data safe.
Listen is as Guy defines data resilience, understanding what the 4 aspects of
the data operating model are and how to utilize them, and the importance of data
governance. Kevin and Guy will also cover the resilience
attributes—availability, usability, robustness interoperability and
performance—as well as the need for enterprise risk officers to assure they
actually perform data risk assessments. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-3/data-resilience-is-data-risk-management
for more information!

62 views • 1 year ago

VIDEO


DIGITAL BODY LANGUAGE

What is digital body language, and why does it matter? Join ISACA's Director of
Global Volunteer Engagement, Megan Moritz, as she speaks with Erica Dhawan,
author of Digital Body Language: How to Build Trust and Connection, No Matter
the Distance. Megan and Erica discuss our modern digital environments and how we
can prioritize thoughtfulness over hastiness, building trust from behind a
computer screen, and how collective conversations are now possible in the
digital world. Book: Digital Body Language: How to Build Trust and Connection No
Matter the Distance: https://us.macmillan.com/books/9781250246523

430 views • 1 year ago

VIDEO


EPIC FAILS OF THE CYBERSECURITY INDUSTRY

The cyber security industry was founded to protect businesses from getting
breached. Simple. Yet, since the first computer virus was reported more than
three decades ago – breaches have increased exponentially year after year, after
year. In the last year alone just over eight and a half billion records were
reported as breached. At ISACA Oceania Conference 2021, Richard Hollis, Director
of Risk Crew, spoke on “Epic Fails of the Cybersecurity Industry” and started a
controversial conversation. Mr. Hollis believes and clearly showcases his
feeling that the industry has failed with its core objective – miserably. Could
it be that the cyber security industry is, in fact, NOT designed to stop
breaches? Check out this video as Mr. Hollis breaks down the statistics that are
everywhere and overwhelming. For More Information, Don't Forget to Check Out -
https://www.isaca.org/training-and-events/conferences

1K views • 1 year ago

VIDEO


ISACA'S CET - CLOUD CERTIFICATE

By successfully passing the Cloud Fundamentals exam, you’ll obtain the
certificate that affirms your understanding of basic cloud computing principles,
concepts and more. The knowledge and performance-affirming CET Cloud
Fundamentals Certificate validates your know-how and practical skills in cloud
governance and service supporters and your ability to use open-source cloud
technologies. Like the other modules of ISACA’s CET, Cloud Fundamentals helps
you hone and prove expertise, and moves you farther down the road to obtaining
your CET Certification. For more information, visit:
https://www.isaca.org/credentialing/cet/cloud-fundamentals-certificate

1K views • 1 year ago

VIDEO


IN PURSUIT OF DIGITAL TRUST – SHEA NANGLE

ISACA member Shea Nangle shares his perspective on what he calls “the implicit
struggle between profit and what is done with consumer data,” and how that
factors into creating digital trust. For more information, check out
https://isaca.org/digital-trust

587 views • 1 year ago

VIDEO


IN PURSUIT OF DIGITAL TRUST – SHEA NANGLE (SHORT)

ISACA member Shea Nangle shares his perspective on what he calls “the implicit
struggle between profit and what is done with consumer data,” and how that
factors into creating digital trust. For more information, check out
https://isaca.org/digital-trust

297 views • 1 year ago

VIDEO


CYBER DECISIONS ONLY EXECUTIVES CAN MAKE

One of ISACA’s most popular Journal columnists joins us to discuss his most
recent release, “Cyber Decisions Only Executives Can Make.” Steven Ross chats
with ISACA’s Safia Kazi about cyber recovery plans that organizations have in
place and that only when an attack disrupts normal business operations do those
organizations realize they should have prepared and planned for operation
continuity without the system and data they rely on. As Executive Principal for
Risk Master International and fifty plus years of industry experience, Steven
shares his insights into cyber recovery plans, categorizing cyberattacks, paying
ransom to cyber criminals, and offers his advice on what organizations should do
if they find themselves in the middle of a critical cyber decision. To read the
full ISACA Journal article, click here:
https://www.isaca.org/resources/isaca-journal/issues/2022/volume-4/cyber-decisions-only-executives-can-make
Be sure to like, comment, and subscribe for more ISACA Productions content.

257 views • 1 year ago

VIDEO


ELEVATE ORGANIZATIONAL PERFORMANCE WITH CMMI

CMMI’s performance improvement model has helped thousands of globally recognized
companies over the last 30+ years. Watch how CMMI can help organizations quickly
understand their current level of capability and performance and offer a guide
to optimize business results.

767 views • 1 year ago

VIDEO


BREAKING DOWN THE ESET T1 2022 THREAT REPORT

ESET, a global leader in cybersecurity, has released its T1 2022 Threat Report,
which summarizes the most notable trends that shaped the threat landscape from
January to April 2022. Join ISACA’s Research Advisor, Brian Fletcher, as he
breaks down the ESET T1 2022 Threat Report with Chief Security Evangelist for
ESET, Tony Anscombe. For more information, check out ESET’s award-winning blog:
WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news
from ESET Research. Be sure to like, comment, and subscribe for more ISACA
Productions content.

270 views • 1 year ago

VIDEO


SHELEADSTECH KEYNOTE: POWER OF AUTHENTICITY IN THE WORKPLACE

There is a human side to technology. Professionals at all levels have struggles,
personal priorities, goals and obligations. Many have expertise, knowledge,
gifts, and talents that are deactivated, underutilized, untapped, or unknown in
the workplace, yet very valuable. This session will discuss the power of
authenticity in the workplace and why leadership should intentionally embrace
multipotentiality. ISACA member, Executive Coach, and Empowerment Speaker,
Belinda Enoma discusses the struggles people face in their careers in their
quest for elevation and empowers the audience to value their brilliance and
fearlessly pursue their goals. For more information, check out
https://oneintech.org/

579 views • 2 years ago

VIDEO


ISACA FOUNDATION: A RE-INTRODUCTION & MASTERCLASS: WOMEN IN TECH, AUTHENTIC
ALLYSHIP AND INTENTIONAL LEADERSHIP

Ginger Spitzer shares the new strategic direction of the foundation. Later,
ISACA Member, Cybersecurity Leader, and Empowerment Speaker Belinda Enoma
converses with Hollee Mangrum-Willis. This discussion focuses on the issues
women face in the industry and strategies for purposeful and impactful
improvement/change.

481 views • 2 years ago

VIDEO


REAL-WORLD DATA RESILIENCE

Join ISACA's Lisa Villanueva as she talks with Guy Pearce about his recently
released ISACA Journal article "Real-World Data Resilience". Guy has a deep
knowledge of the movement of data and says "it’s about change and nothing is
stable." Lisa asks Guy about AI model implications, Data Drift and cloud
adoption. If you want to dive deeper, you can read the entire journal article
and learn about data and resilience in its modern context at:
https://www.isaca.org/resources/isaca-journal/issues/2022/volume-3/real-world-data-resilience-demands-an-integrated-approach-to-ai-data-governance-and-the-cloud
To listen to more ISACA podcasts, visit: www.isaca.org/podcasts Be sure to like,
comment, and subscribe for more ISACA Productions content.

254 views • 2 years ago

VIDEO


WHERE PRIVACY MEETS SECURITY

Jo Stewart-Rattray, the Director of Technology & Security Assurance for BRM
Advisory, believes privacy is a team sport. Every organization needs to be
responsible for asking, “what data is being collected,” “where is the
information held,” “what purpose is the information being collected for,” and
“how is the information being protected.” Jo chats with ISACA's Safia Kazi about
why it is essential that security and privacy teams collaborate when it comes to
collecting data. She expands on why the central role of a CISO needs to be
educating and communicating this team approach to organizations. Jo says that
the issue of data privacy will only continue to grow as the digital economy
grows and why privacy and security professionals play a critical role in
ensuring that enterprises adhere to privacy laws and regulations that protect
their customers’ personal data. To read Jo's full article, follow this link
www.isaca.org/where-privacy-meets-security Be sure to like, comment, and
subscribe for more ISACA Productions content.

528 views • 2 years ago

VIDEO


LEARN MORE ABOUT ISACA CHAPTERS

ISACA chapters foster a sense of community at the local level. Contact the
chapter in your area (www.isaca.org/chapters), or send an email to
chapters@isaca.org to learn how you can get involved.

586 views • 2 years ago

VIDEO


ISACA CHAPTERS: HOW TO JOIN AN ISACA CHAPTER

ISACA chapters foster a sense of community at the local level. Contact the
chapter in your area (www.isaca.org/chapters), or send an email to
chapters@isaca.org to learn how you can get involved.

415 views • 2 years ago

VIDEO


HOW TO BUILD A FOLLOWING AROUND YOUR IDEAS

In this talk based on her book Stand Out: How to Find Your Breakthrough Idea and
Build a Following Around It, Dorie Clark explains how to build a following
around your ideas. Join Megan Moritz and Dorie Clark as they discuss advancing
your business or your cause and inspiring others to listen and take action. Be
sure to like, comment, and subscribe for more ISACA Productions content.

186 views • 2 years ago

VIDEO


ISACA CHAPTERS: GET INVOLVED WITH AN ISACA CHAPTER

ISACA chapters foster a sense of community at the local level. Contact the
chapter in your area (www.isaca.org/chapters), or send an email to
chapters@isaca.org to learn how you can get involved.

283 views • 2 years ago

VIDEO


NORTH AMERICA CONFERENCE 2022 - WRAP UP

For more information, check out
https://www.isaca.org/en/training-and-events/conferences

862 views • 2 years ago

VIDEO


NORTH AMERICA CONFERENCE 2022 - WRAP UP

For more information, check out
https://www.isaca.org/en/training-and-events/conferences

894 views • 2 years ago

VIDEO


ISACA CHAPTERS: BENEFITS OF JOINING AN ISACA CHAPTER

ISACA chapters foster a sense of community at the local level. Contact the
chapter in your area (www.isaca.org/chapters), or send an email to
chapters@isaca.org to learn how you can get involved.

256 views • 2 years ago

VIDEO


STUDY YOUR SOCIAL MEDIA ENVIRONMENT

How Do Organizations Control Their Use of Social Media Part IV - What are the
main risks that most enterprises need to consider when it comes to social media?
If you don’t know, you and your organization are in danger of serious
reputational risk! Watch as ISACA’s IT Governance Job Practice Lead, Lisa
Villanueva discusses the risks of social media with Robert Findlay, Global Head
of IT Audit at Glanbia. Social media is one of the easiest platforms to hack and
it isn’t just from external threat actors. Oftentimes, the hack is coming from
inside the organization from current and recently released employees. And
remember, it doesn’t matter who hacks into your social platform, it is your
enterprise that gets the blame and negative press. Robert and Lisa also discuss
the current state of security on social media platforms and how organizations
can benefit by bringing in auditors to show how to control the management of
social media and avoid these pitfalls. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-4/how-do-organizations-control-their-use-of-social-media-part-1
for more information!

32 views • 2 years ago

VIDEO


PRIVACY AND SOCIAL MEDIA

How Do Organizations Control Their Use of Social Media Part V - What are the
main risks that most enterprises need to consider when it comes to social media?
If you don’t know, you and your organization are in danger of serious
reputational risk! Watch as ISACA’s IT Governance Job Practice Lead, Lisa
Villanueva discusses the risks of social media with Robert Findlay, Global Head
of IT Audit at Glanbia. Social media is one of the easiest platforms to hack and
it isn’t just from external threat actors. Oftentimes, the hack is coming from
inside the organization from current and recently released employees. And
remember, it doesn’t matter who hacks into your social platform, it is your
enterprise that gets the blame and negative press. Robert and Lisa also discuss
the current state of security on social media platforms and how organizations
can benefit by bringing in auditors to show how to control the management of
social media and avoid these pitfalls. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-4/how-do-organizations-control-their-use-of-social-media-part-1
for more information!

93 views • 2 years ago

VIDEO


CYBERSECURITY CERTIFICATION AND MITIGATING RISK

How Do Organizations Control Their Use of Social Media Part VII - What are the
main risks that most enterprises need to consider when it comes to social media?
If you don’t know, you and your organization are in danger of serious
reputational risk! Watch as ISACA’s IT Governance Job Practice Lead, Lisa
Villanueva discusses the risks of social media with Robert Findlay, Global Head
of IT Audit at Glanbia. Social media is one of the easiest platforms to hack and
it isn’t just from external threat actors. Oftentimes, the hack is coming from
inside the organization from current and recently released employees. And
remember, it doesn’t matter who hacks into your social platform, it is your
enterprise that gets the blame and negative press. Robert and Lisa also discuss
the current state of security on social media platforms and how organizations
can benefit by bringing in auditors to show how to control the management of
social media and avoid these pitfalls. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-4/how-do-organizations-control-their-use-of-social-media-part-1
for more information!

63 views • 2 years ago

VIDEO


ISACA CHAPTERS: CHAPTER AWARDS

ISACA chapters foster a sense of community at the local level. Contact the
chapter in your area (www.isaca.org/chapters), or send an email to
chapters@isaca.org to learn how you can get involved.

219 views • 2 years ago

VIDEO


ISACA CHAPTERS: ISACA CHAPTERS GO VIRTUAL

ISACA chapters foster a sense of community at the local level. Contact the
chapter in your area (www.isaca.org/chapters), or send an email to
chapters@isaca.org to learn how you can get involved.

192 views • 2 years ago

VIDEO


ISACA CHAPTERS: THE HISTORY OF ISACA CHAPTERS

ISACA chapters foster a sense of community at the local level. Contact the
chapter in your area (www.isaca.org/chapters), or send an email to
chapters@isaca.org to learn how you can get involved.

222 views • 2 years ago

VIDEO


INDUSTRY SPOTLIGHT: JAN ANISIMOWICZ

Jan Anisimowicz is an experienced senior IT manager with over 23 years of
experience in GRC, data analysis, broad business, and technical perspective in
telco, banking, pharma, and insurance. As the COO and EVP at C&F, he is
consistently solving business problems by leveraging his all-around experience
in creating and developing IT products and IT service offerings for businesses.
In this ISACA Industry Spotlight episode, Jan Anisimowicz chats with ISACA's
Megan Moritz on what he believes the most pressing current business continuity
issue is in this always-changing industry. With the recent pandemic, Jan also
discusses his active participation in the digital transformation technology for
vaccine manufacturers, the key component to the development and delivery of the
vaccine. He also explains why he wants to travel to Mars, how some friends
convinced him to run 9 marathons, and his dream to build a 14th-century-style
restaurant with archival computers and gaming devices! To learn more about Jan,
visit: linkedin.com/in/anisimowicz Be sure to like, comment, and subscribe for
more ISACA Productions content.

233 views • 2 years ago

VIDEO


HOW TO GET STARTED WITH CMMI

How to properly get started with CMMI adoption and how to choose a reputable
consultant to help your organization on its performance improvement journey.
https://www.isaca.org/enterprise/cmmi-performance-solutions

2K views • 2 years ago

VIDEO


ISACA CHAPTERS - WHAT IS AN ISACA CHAPTER?

ISACA chapters foster a sense of community at the local level. Contact the
chapter in your area (www.isaca.org/chapters), or send an email to
chapters@isaca.org to learn how you can get involved.

317 views • 2 years ago

VIDEO


IN PURSUIT OF DIGITAL TRUST – JULIE CHATMAN

ISACA member Julie Chatman describes her eventful career journey, her passions
outside of work and why digital trust matters to her both professionally and
personally. For more information, check out https://isaca.org/digital-trust

318 views • 2 years ago

VIDEO


IN PURSUIT OF DIGITAL TRUST – JULIE CHATMAN (SHORT)

ISACA member Julie Chatman describes her eventful career journey, her passions
outside of work and why digital trust matters to her both professionally and
personally. For more information, check out http://isaca.org/digital-trust

156 views • 2 years ago

VIDEO


CLIMATE RESILIENCY AND REGULATION

Climate resiliency and green innovations are of worldwide interest today, but
what is the best way to use skills and expertise that will make a difference?
 Cindy Baxter from What's the Risk, LLC talks with Frank O'Brian, leader of the
East Boston Climate Coalition to hear about the Coalition's approach, the
challenges they've faced, and what they do to overcome obstacles.  This
discussion takes us into everyone's backyard to understand how IS audit and risk
professionals can contribute to climate resiliency in an impactful way. Please
join us to imagine the role you can play in environmental resiliency and
justice! To read Cindy's full ISACA Journal article - follow this link -
www.isaca.org/resilience-and-regulation Be sure to like, comment, and subscribe
for more ISACA Productions content!

267 views • 2 years ago

VIDEO


MARK THOMAS: BENEFITS OF ENTERPRISE TEAM TRAINING

Mark Thomas, founder of Escoute Consulting, provides his perspectives on the
benefits and positive outcomes of ISACA Team Training for students, teams, and
team leaders, why it is worth the investment, and the ROI for organizations.
Watch as Mark Thomas addresses these quick questions about ISACA Team Training.
For more information, check out isaca.org/enterprise/enterprise-training

308 views • 2 years ago

VIDEO


CYBERSECURITY IN A COVID-19 WORLD: INSIGHTS ON HOW DECISIONS ARE MADE

In the early days of the Covid-19 pandemic, all organizations pivoted to remote
work. Now that we are years into working remotely, University of West Florida's
Jerry Burch asks if the choices we made in 2020 are still the best ones. He
explains to ISACA's Brian Fletcher what the concept of "satisficing" is and why
we might want to explore other options before picking a solution for employees’
remote work. While we have all adjusted to the shift that came in March 2020,
Jerry argues that it could happen again and now is the time to consider all
options for your cybersecurity team. He also discusses Rational choice theory as
it relates to cybersecurity and fighting cybercrime. Tune in now! To read
Cybersecurity In A Covid-19 World: Insights On How Decisions Are Made, Please
visit: www.isaca.org/cybersecurity-in-a-covid-world To listen to more ISACA
Podcasts, please visit: isaca.org/podcasts

140 views • 2 years ago

VIDEO


INDUSTRY SPOTLIGHT: CAITLIN MCGAW

Caitlin McGaw answered an ad in the newspaper in 1997 for a position with an
Executive Search Firm and she was instantly hooked. She tells ISACA's Hollee
Mangrum-Willis that for the past 25 years, she has been passionate about the
idea of corporate match-making in the IT Audit space. Hollee asks Caitlin about
process improvement within the ISACA community and the examples of candidates
using transferable skills to pivot to different positions within the industry.
Caitlin discusses the growth mindset and coachability of a candidate during the
hiring process and how that translates to performance on the job. Caitlin also
explains why she thinks more candidates should pursue careers in IT Audit. To
learn more about Caitlin, visit: www.linkedin.com/in/caitlinmcgaw and
www.caitlinmcgaw.com To listen to more ISACA podcasts, visit: isaca.org/podcasts

189 views • 2 years ago

VIDEO


INDUSTRY SPOTLIGHT: ED MCCABE

One of Ed McCabe's first childhood memories was taking apart his grandparent's
heirloom grandfather clock to find out why it wasn't working. His grandparents
were not happy to find it in pieces, but he did get it working again and says
that experience was the beginning of a life-long interest in IT, beginning his
quest to always ask "why, how and what is technology supposed to do and what is
it not, supposed to do?". ISACA's Angie Coleman talks to Ed about his career in
the US Navy, private sector and founding his own company The Rubicon Advisory
Group. Ed discusses how his organization has supported clients through the most
challenging moments during the pandemic, how he learned to find balance for his
life while sustaining his passion for education and technology, and what his
advice is to ISACA members when preparing for a certification test. For more
information on Ed, visit: www.therubiconadvisorygroup.com To listen to more
ISACA Podcasts, visit: www.isaca.org/podcasts Be sure to like, comment, and
subscribe for more ISACA Productions content!

486 views • 2 years ago

VIDEO


CYBER (BUSINESS) RECOVERY

"The thing that you plan for is not the thing that is going to happen" says Risk
Masters' Executive Principal Steven Ross. Steven talks to ISACA's Safia Kazi
about how to prepare for a cybersecurity Event and how to recover. Steven
discusses the types of attacks to watch out for, Business Continuity Planning
and how to recover from a cybersecurity event. Listen in as Steven shares some
ways you can use your imagination to prepare for "the thing that is going to
happen". To read Steven's full article, visit:
https://www.isaca.org/resources/isaca-journal/issues/2022/volume-3/cyber-business-recovery
To listen to more ISACA Podcasts, visit: https://www.isaca.org/podcasts

581 views • 2 years ago

VIDEO


ENTERPRISE DIRECT SERIES

ISACA is globally known for professional IT credentials. But did you know we
help enterprises train IT teams for the changing technology landscape? Make your
teams work better and smarter. For more information check out
isaca.org/enterprise-training

489 views • 2 years ago

VIDEO


WHAT IS MDDAP?

In highly regulated industries like health care, it is imperative to meet
compliance standards. ISACA, in collaboration Medical Device Innovation
Consortium, the Food & Drug Administration, and industry stakeholders have
developed the Case for Quality Voluntary Improvement Program, or VIP, to help
shift the mindset of medical device manufacturers beyond compliance and towards
continuous improvement. VIP leverages ISACA's Medical Device Discovery Appraisal
Program, or MDDAP, which is a tailored version of the CMMI Maturity Model
Framework and appraisal methodology for the medical device industry. For more
information, check out
https://www.isaca.org/enterprise/medical-device-discovery-appraisal-program

597 views • 2 years ago

VIDEO


INDUSTRY SPOTLIGHT – NIKI GOMES

Everyone starts somewhere and for Niki Gomes, it was at the front desk of a
hotel where she worked her way up to hospitality management, before pivoting to
accounting and finally to the American Red Cross, where she is currently Senior
Internal Auditor. Niki tells ISACA's Melissa Swartz about her passion for
people, technology and how the pandemic changed her work life to better connect
with her family. Dive deep into this Industry Spotlight episode as Niki
discusses why young Black and Latina women are under-represented in the industry
and her plan to remedy that divide, mentoring and what her advice is for the
next generation. Tune in now to hear all of Niki's inspiring story! For more
information, check out out https://www.redcross.org/ Be sure to like, comment,
and subscribe for more ISACA Production content.

208 views • 2 years ago

VIDEO


MANAGING DATA PRIVACY RISKS AND COMPLIANCE WITH A DISTRIBUTED WORKFORCE

Data now includes, consumer's social media, news, view and even browser
searches. From 2010-2020, the amount of data created, captured, and copied in
the world increased from 1.2 trillion GB to 59 trillion GB and the amount
created in the next 5 years is projected to double. With that massive amount of
data being collected, there is a growing sense of distrust with consumers when
it comes to privacy. RGP's Janis Parthun and Lynn Rohland join ISACA's Safia
Kazi for a discussion about data privacy. Janis and Lynn discuss trends from
their clients, challenges that AI is introducing and the effect that the
pandemic has had on the industry. Visit ISACA.org/podcasts for more ISACA
Podcasts! Be sure to like, comment, and subscribe for more ISACA content! To
find out more about RGP, visit https://rgp.com/

561 views • 2 years ago

VIDEO


CMMC AND CUI: ROCKET FUEL

"Cybersecurity is only as good as an organization's weakest link" - Ali Pabrai
Join ISACA's Senior Manager, CMMI Professional Practice, Kileen Harrison as she
talks with ecfirst's Chief Executive Officer, Ali Pabrai about his recently
released articles, “What Cyberprofessionals Should Know About CUI”, and “US DoD
Launches Comprehensive CMMC 2.0 Cybersecurity Framework”. Ali explains the three
levels of CCMC 2.0 and goes further in depth on CUI classification. By the end
of this episode, you'll have all the CMMC and CUI "Rocket Fuel" that you need to
understand this latest certification. To read Ali's full articles -
https://www.isaca.org/resources/news-and-trends/newsletters/atisaca/2022/volume-8/what-cyberprofessionals-should-know-about-cui
https://www.isaca.org/resources/news-and-trends/industry-news/2022/us-dod-launches-comprehensive-cmmc-2-cybersecurity-framework
Be sure to like, comment, and subscribe for more ISACA content.

190 views • 2 years ago

VIDEO


A SECURITY AWARENESS PROGRAM FOR PCI-DSS COMPLIANCE

People are considered the weakest link in any organization’s cybersecurity
defenses. Hence, in most cases, the primary targets of cyber-attackers are the
employees of the organization. In addition, people are easier to compromise and
exploit unlike finding a single software to breach an organization or enterprise
business. While a lot of efforts go into improving the existing security
infrastructure, ignorance of human resources would leave a significant gap in
the defense strategy. Join ISACA’s Research Advisor, Brian Fletcher, as he is
joined by Dr. Yasmin Razack, author of “A Security Awareness Program for PCI DSS
Compliance: Implementation and Legal and Ethical Issues to Be Considered”. In
this episode, they will be addressing the challenges in implementing a security
awareness program to fill this gap and the legal/ethical issues that needs to be
considered during implementation. As per the Payment Card Industry – Data
Security Standard (PCI-DSS) requirement 12.6, a Security Awareness Program is
mandatory to be held at least once a year and for new hires. However, it is not
an easy task and cannot be a one-time activity. But if implemented effectively,
awareness programs can be the human firewall of the organization. It will make
the organization compliant to regulations like PCI-DSS thereby protecting it
from fines due to non-compliance, defamation, costs of data breaches and will
help improve customer trust and loyalty. To read Dr. Razack’s full article click
here - www.isaca.org/pci-dss-compliance Be sure to like, comment, and subscribe
for more ISACA Production content!

738 views • 2 years ago

VIDEO


INDUSTRY SPOTLIGHT - JO STEWART-RATTRAY

Making a difference within the cyber industry is of paramount importance to Jo
Stewart-Rattray. She is incredibly passionate about encouraging, teaching, and
mentoring more women into tech and security fields. In this episode of Industry
Spotlight, Robyn Franko, Manager of Event Operations and Services at ISACA,
chats with Jo about her background and career path, hobbies, and some
interesting challenges the industry faces. Jo has over 25 years of experience in
the IT field, some of which were spent as CIO in the Utilities and as Group CIO
in the Tourism space, and with significant experience in the Information
Security arena, including as CISO in the healthcare sector. She underpins her
information technology and security background with her qualifications in
education and management. She specializes in consulting in risk and technology
issues with a particular emphasis on governance and security in both the
commercial and operational areas of businesses. Jo provides strategic advice to
organizations across a number of industry sectors, including banking and
finance, utilities, manufacturing, tertiary education, retail, healthcare, and
government. She has chaired several of ISACA’s international committees,
including the Board Audit & Risk Committee, Leadership Development, and
Professional Influence & Advocacy. She served as an Elected Director on ISACA’s
International Board of Directors for seven years and was the founder of its
global women’s leadership initiative, SheLeadsTech. Because of her involvement
with ISACA and the SheLeadsTech program and her rural background Jo was selected
from a large number of candidates to be one of only two non-government delegates
and was invited to join the official Australian Government delegation to the
62nd Session of the United Nations Commission on the Status of Women (CSW62)
held in New York in March 2018. She returned to the UN in 2019 and again spoke
at two UN events this year. She has spoken on Capitol Hill during a Day of
Advocacy designed to bring tech leaders together in one place to discuss issues
related to women in technology and then to meet with congressional
representatives and Senator’s offices. Be sure to like, comment, and subscribe
for more ISACA Content. For more information check out - www.isaca.org/podcasts

299 views • 2 years ago

VIDEO


CMMI TECH TALK: THE PERFORMANCE REPORT

For more information, check out -
https://www.isaca.org/enterprise/cmmi-cybermaturity-platform?gclid=Cj0KCQjw5-WRBhCKARIsAAId9Fm-gpm9jvXuMys6p0p6qqiEdUBhBz7VcAWY4FWbOyoHHSTrMfj2H3AaAou2EALw_wcB

1K views • 2 years ago

VIDEO


CMMI TECH TALK: HOW TO APPRAISE SMALL VS. LARGE ORGANIZATIONS

For more information, check out -
https://www.isaca.org/enterprise/cmmi-cybermaturity-platform?gclid=Cj0KCQjw5-WRBhCKARIsAAId9Fm-gpm9jvXuMys6p0p6qqiEdUBhBz7VcAWY4FWbOyoHHSTrMfj2H3AaAou2EALw_wcB

427 views • 2 years ago

VIDEO


THE TRANSFORMATIVE POWER OF MOBILITY

It's hard to believe the quarter century mark has almost arrived! Have you
thought about what you would like your work world to be in 2025? Have you
dreamed of more flexibility or better access to information so you can get work
done faster? ISACA’s IT Professional Practices Lead, Kevin Keh, sits down with
Cindy Baxter, Director of What's the Risk, LLC to talk about her recently
released article “The Transformative Power of Mobility”. Cindy spoke with three
professionals from three different industries and asked them how the promise of
mobility could change their work lives. Hear about the work her interviewees do
and the aspirations they have for themselves and their professions. Can IS risk
and audit professionals make their mobility dreams come true? Tune in to the
conversation and see what you think! To Read Cindy’s full ISACA Journal Article
click here - www.isaca.org/power-of-mobility Please like, comment, and subscribe
to the ISACA Media channels to keep up to date with all of ISACA’s new content.

170 views • 2 years ago

VIDEO


INDUSTRY SPOTLIGHT WITH RAVEN DAVID

"For me, it's all about working with people... at the end of the day, you want
to work in a place where you can trust other individuals, you can get to know
other individuals, and being personable with one another makes an organization
great to work for," Raven David tells ISACA. In this Industry Spotlight episode,
we meet Raven David, Cyber Risk and Governance Manager for The University of New
South Wales (UNSW). Fascinated with technology at an early age, the native
Australian recalls that he spent part of his childhood disassembling computers
and putting them back together to understand better how they worked. This
passion led him on a fantastic life journey and set him on a path to dominate
the industry as a risk management, governance, compliance, assurance, and
emerging technologies expert. Raven talks about his less traditional educational
and career track. While working full-time, he managed a full-time class schedule
simultaneously, to a career that allowed him to establish and manage a cyber
risk and compliance team within a corporation of 5,000+ employees. Listen as
Raven recaps the success of his cybersecurity awareness program, gives
thoughtful advice to the next generation of young professionals, and discusses
his current self-educating project, 3D printed chess set with Arduino-powered
actuators and a Python chess engine.  As an active contributor to ISACA and the
ISACA Sydney Chapter, Raven recently volunteered, mentored, and led the 2021
Oceania Conference Taskforce and is currently a CRISC Certification Working
Group. In this ISACA Industry Spotlight episode, get to know the next-gen
cybersecurity leader, Raven David. Connect with Raven David on LinkedIn:
https://www.linkedin.com/in/ravendavid/  Press play now, and don’t forget to
subscribe!

254 views • 2 years ago

VIDEO


DIVERSITY BY DESIGN

Why is the achievement of gender balance critical to the viability and trust of
the industry? Jenai Marinkovic, Virtual CISO & CTO of Tiro Security, answers
this question in a short clip from ISACA's latest live video, "Breaking the Bias
for Women in Tech." Watch the full video at https://youtu.be/24n7K-pKTEU

205 views • 2 years ago

VIDEO


BREAKING THE BIAS FOR WOMEN IN TECH

On International Women's Day, ISACA Foundation hosted a conversation on breaking
the bias for women in tech. What biases are still prevalent? How can male allies
help? Why is intersectionality a crucial part of this conversation? Watch this
episode of ISACA Live for these answers and more.

243 views • 2 years ago

VIDEO


PRIVACY FOR SALE

Is Privacy a commodity? This episode explores the future direction of privacy
and the demise of privacy in the digital age. Could privacy become something
that people cannot afford, creating a two-tier system of internet users — those
who can afford privacy and those who cannot? Join Safia Kazi, ISACA's Privacy
Professional Practice Advisor, as she speaks with Steven Ross, Executive
Principal of Risk Masters International, about his recently released ISACA
article "Privacy for Sale.” Listen in as they chat about what privacy could be
worth, and if this is a decision we must make soon? To read Steve’s full ISACA
Journal article, please check out www.isaca.org/privacy-for-sale We would love
to hear from you, please leave your comments below. If you enjoyed this episode,
please click the like and subscribe buttons for more from ISACA!

330 views • 2 years ago

VIDEO


ENSURING THAT CYBERSECURITY IS EVERYONE’S JOB

Join ISACA’s Performance Based Training Engineer, Collin Beder as he speaks with
Tom Schneider, Senior Associate of Proactive Advisory for Cyber Defense Labs as
they discuss Tom’s recently released article “Ensuring that Cybersecurity is
Everyone’s Job”. Employees expect to focus on the responsibilities that are
communicated to them, for example in their job descriptions. If cybersecurity
and privacy responsibilities are not documented in job descriptions, then it is
likely that staff will assume that cybersecurity is not a primary responsibility
for them because management did not consider it significant enough to include.
Collin and Tom will delve into these topics and why keeping cybersecurity on
everyone’s mind will be better in the long run. To read Tom’s full article,
please check out
https://www.isaca.org/resources/isaca-journal/issues/2022/volume-2/ensuring-that-cybersecurity-is-everyones-job
We would love to hear from you, please leave your comments below. If you enjoyed
this episode, please click the like and subscribe buttons for more from ISACA!

349 views • 2 years ago

VIDEO


CYBERPROS - ZERO TRUST: HOW TO BEAT ADVERSARIES AT THEIR OWN GAME FEATURING DR.
ZERO TRUST

ISACA’s Jon Brandt welcomes Dr. Chase Cunningham aka Dr. Zero Trust to the ISACA
CyberPros podcast. You may know Chase from his own podcast, Dr. Zero Trust, or
book series, Cynja. Chase dives deep into Zero Trust and Jon gets Chase's
opinions on how legislation relates to ZT, and thoughts on attack trends,
including how to outsmart bad actors. Listen now and don’t forget to subscribe
and write in the comments! For more information check
out https://www.isaca.org/credentialing/cybersecurity Interested in hearing more
from DrZeroTrust - check out his podcast at: https://anchor.fm/chase-cunningham8

534 views • 2 years ago

VIDEO


RISING STAKES FOR PROTECTING CRITICAL INFRASTRUCTURE TEASER

Watch the full video at https://www.youtube.com/watch?v=ov7f9EL8w50

122 views • 2 years ago

VIDEO


RISING STAKES FOR PROTECTING CRITICAL INFRASTRUCTURE TEASER

Critical infrastructure expert and renowned cyberthreat investigator Alex Holden
discusses the latest on critical infrastructure security as global tensions rise
amid Russian attacks in Ukraine. For more information check out
https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2022/tensions-shine-spotlight-on-protecting-critical-infrastructure

195 views • 2 years ago

VIDEO


BREAKING DOWN THE ESET T3 2021 THREAT REPORT

Tune in as ISACA’s Kevin Keh talks with the Chief Security Evangelist of ESET,
Tony Anscombe about the latest released report from ESET. ESET, a global leader
in cybersecurity, has released its T3 2021 Threat Report, which summarizes the
most notable trends that shaped the threat landscape from September to December
2021. For more information, check out ESET’s award-winning blog: WeLiveSecurity.
Make sure to follow ESET Research on Twitter for the latest news from ESET
Research. To read the full Report, please check out
https://www.welivesecurity.com/2022/02/09/eset-threat-report-t32021/ We would
love to hear from you, please leave your comments below. If you enjoyed this
episode, please click the like and subscribe buttons for more from ISACA!

68 views • 2 years ago

VIDEO


BUILDING DIGITAL TRUST IN A FINTECH START UP

Today's Page to Podcast features ISACA's Kevin Keh and Donald Tse, the Head of
Cyber & Technology Risk at Mox Bank and author of "Cybersecurity and the
Technology Risk in Virtual Banking", as they dive into the virtual banking scene
in fintech. This will compare the differences between a digital-only virtual
bank and a brick-and-mortar traditional bank and therefore the underlying
challenges and risks they face. As a founding member of Mox Bank, Donald will
also share his experience in building digital trust with customers and
regulators in this whole new cloud-native bank. To read Donald's full article,
please check out
https://www.isaca.org/resources/isaca-journal/issues/2022/volume-1/cybersecurity-and-technology-risk-in-virtual-banking
We would love to hear from you, please leave your comments below. If you enjoyed
this episode, please click the like and subscribe buttons for more from ISACA!

303 views • 2 years ago

VIDEO


LESSONS LEARNED FROM A YEAR OF REMOTE WORK

Working from alternate work sites using unsecure networks may be here to stay,
but there is much to learn from 2020 that can help improve cybersecurity
capabilities for remote staff. Listen in with ISACA's Deputy Director of One in
Tech, Hollee Mangrum-Willis as she talks with Tom Conkle, CEO of Optic Cyber
Solutions, and Kelly Hood, EVP of Optic Cyber Solutions. They will discuss
various technical solutions such as using VPNs, enabling MFA, encrypting mobile
devices and laptops, and leveraging services such as a CASB, and how,
ultimately, training and awareness are the most effective at protecting
organizational data. To read the full article, be sure to check out
https://www.isaca.org/resources/news-and-trends/industry-news/2021/lessons-learned-from-a-year-of-remote-work.
We would love to hear from you, please leave your comments below. If you enjoyed
this episode, please click the like and subscribe buttons for more from ISACA!

365 views • 2 years ago

VIDEO


UNPACKING PAKISTAN'S CYBERSECURITY POLICY 2021

Listen in as ISACA’s Director of Professional Practices & Innovation, Jon
Brandt, is joined by Muneeb Imran Shaikh, author of "Pakistan’s Cybersecurity
Policy in 2021: A Review". They will dig deeper into the report and discuss the
policy changes that Pakistan and other Central Asian countries will see moving
forward. To read the full report, be sure to check out
https://www.isaca.org/resources/news-and-trends/newsletters/atisaca/2021/volume-39/pakistan-cybersecurity-policy-in-2021-a-review.
We would love to hear from you, please leave your comments below. If you enjoyed
this episode, please click the like and subscribe buttons for more from ISACA!

337 views • 2 years ago

VIDEO


USING XDR AND ZERO TRUST TO COMBAT RANSOMWARE

Both XDR and Zero Trust are useful security concepts, but they are sadly
overhyped. Listen in as ISACA's Research Advisor, Brian Fletcher and Trend
Micro's Bill Malik look into the realities behind ZDR and Zero Trust, how
ransomware works, and how the both XDR and Zero Trust can help organizations
minimize their vulnerabilities Interested in reading Bill's full ISACA Blog?
Click the link and download a copy today!
https://www.isaca.org/resources/news-and-trends/industry-news/2021/using-zero-trust-and-xdr-to-stop-ransomware
We would love to hear from you, please leave your comments below. If you enjoyed
this episode, please click the like and subscribe buttons for more from ISACA!

306 views • 2 years ago

VIDEO


ISACA JOURNAL TURNS 50

Celebrating a Half-Century of Insights. For 50 years, the ISACA Journal has
helped shape IT. Here’s to 50 more. For more information, don't forget to check
out https://www.isaca.org/resources/isaca-journal

3K views • 2 years ago

VIDEO


WHAT IS ENVIRONMENT, SOCIAL, AND GOVERNANCE (ESG)?

Mark Thomas (Founder, Escoute) and Caren Shiozaki (EVP & CIO, TMST, Inc.) join
ISACA's Lisa Villanueva for a conversation about Environment, Social, Governance
or ESG. Mark and Caren dive deep into why your organization will want to know
about ESG. Mark & Caren agree “the ESG Train” has already left the station.
Organizations need to jump on board now! Click play now to learn about ESG! For
more information, don't forget to check out
https://www.isaca.org/resources/insights-and-expertise/white-papers#sort=relevancy&layout=card
and https://youtube.com/playlist?list=PLHaB3gI5mcQa0zjjXSyC3ZBlKmsct9H4g

213 views • 2 years ago

VIDEO


THE IMPACT OF SOX ON THE INDUSTRY 20 YEARS AGO AND TODAY WITH CINDY BAXTER

The Sarbanes-Oxley (SOX) Act was passed by the United States Congress in 2002.
20 years later, ISACA's IT Audit Professional Practice Lead, Robin Lyons chats
with Cindy Baxter, Director at What’s the Risk, LLC on all things SOX. Cindy
goes in-depth on the scandals that caused SOX to be enacted, legislation's
effect on corporate behavior, how SOX has affected the audit profession, and
what trends she sees in the regulatory landscape in 2022 and beyond! Interested
in reading Cindy’s full ISACA Journal article? Click the link and download a
copy today!
https://www.isaca.org/resources/isaca-journal/issues/2022/volume-1/the-impact-of-sox-on-the-industry-20-years-ago-and-today
We would love to hear from you, please leave your comments below. If you enjoyed
this episode, please click the like and subscribe buttons for more from ISACA!

453 views • 2 years ago

VIDEO


PRIVACY IN THE DARK (DATA)

Listen in as Safia Kazi, ISACA's Privacy Professional Practice Advisor, as she
speaks with Steve Ross, Executive Principal of Risk Masters International, about
his article "Privacy in the Dark (Data)". Organizations have a lot of “dark
data”; information that they have collected, filed and forgotten. Some of it
concerns people, so there is a privacy concern about how that data is secured.
Both enterprising cyberattackers and litigants using eDiscovery tools have
incentive to search through this dark data to see what they might make use of.
The potential for misuse calls for greater attention to the security of this
data. For more information, don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2022/volume-1/privacy-in-the-dark-data

193 views • 2 years ago

VIDEO


CYBERPROS - 2022 INDUSTRY NEWS WRAP

ISACA's CyberPro Jon Brant breaks down industry news stories so far in the new
year: Log4j, Cyber Insurance, Augmented Reality/Virtual Reality, Metaverse, Deep
Fakes, and even the legal discussion around vehicle car data. Tune in now to
hear Jon's hot takes on all this and more. Happy listening! For more
information, don't forget to check out
https://www.isaca.org/resources/news-and-trends/isaca-podcast-library.

124 views • 2 years ago

VIDEO


ISACA CYBER PRO CHATS WITH NAOMI BUCKWALTER

ISACA’s Cyber Pro, Jon Brandt, invites information security guru, Naomi
Buckwalter, Director of Information Security and IT to the podcast to discuss
hot and heavy topics within Cybersecurity and the IT industry. Listen in as they
hash out the current and future trends. For More Information, Check Out
https://www.isaca.org/training-and-events/cybersecurity

275 views • 2 years ago

VIDEO


WHAT WILL IT TAKE TO REACH DEVSECOPS MATURITY?

While our development teams have been busy running full speed ahead using the
latest and greatest technology to build amazing products, security teams haven’t
always been known to keep the same pace – and we have reached a point of
“developer revolt.” Security teams are still too often viewed as producers of
“design constraints” by development teams versus “reliable partners” in helping
them build better software. The path to changing this is getting security more
tightly integrated into the DevOps pipeline – and working to make security even
more of everyone’s responsibility. In this podcast Shannon Lietz, Adobe’s VP of
Vulnerability Labs, will discuss some of the opportunities for security teams to
become trusted partners, providing a roadmap for how DevSecOps needs to evolve
to reach necessary maturity, and discuss some of the efforts that can help the
broader security industry get better at this essential security muscle. For more
information, check out https://www.isaca.org/

80 views • 2 years ago

VIDEO


THE LOG4SHELL VULNERABILITY: STEPS TO TAKE NOW AND GOOD PRACTICES FOR THE FUTURE

ISACA's Chris Dimitriadis and Scott Reynolds discuss the latest information
regarding the Log4Shell vulnerability, including what organizations need to do
in both the immediate and longer term. For more information on the Log4Shell
Vulnerability, visit:
https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2021/log4shell-vulnerability-highlights-critical-need-for-improved-detection-and-response

560 views • 2 years ago

VIDEO


ISACA FOUNDATION 2021 YEAR IN REVIEW

Our first year of programming has been a transformative time for ISACA
Foundation, and we have much more to come. Thank you for your support and
dedication to making cyber professions accessible to all.

243 views • 2 years ago

VIDEO


SECURITY OPERATIONS CHALLENGES IN 2021

ISACA’s Director, Channel Business Development, Chris DeMale is joined by
ServiceNow’s Director of Product Marketing, Karl Klaessig in this follow up
interview that takes a deeper look into his presentation during ISACA’s Virtual
Summit session, Security Operations Challenges in 2021. The presentation
discussed how opportunistic and tenacious cybercriminals can be. Klaessig takes
explores how dissecting attackers' behavior and automating responses can better
defend your attack surface. Don't forget to check out
https://www.isaca.org/training-and-events/online-training/virtual-summits for
more information!

193 views • 2 years ago

VIDEO


INFORMATION SECURITY PROGRAMS NEED TO BE UBIQUITOUS, PROACTIVE, AND VIGILANT

This ISACA TV interview is a discussion about information security concerns (and
challenges), evolution, and the future. Topics covered include mobile computing
devices, the Internet of Things (IoT), artificial intelligence (AI), cyber
threat intelligence (CTI), software tools, and malware. Threats, risk,
safeguards, and countermeasures will be reviewed along with some new ideas and
approaches. Tune in as ISACA’s Information Security Professional Practices Lead,
Jon Brandt chat with Larry Wlosinski, Senior Consultant at Coalfire Federal
about his recently release article, Cyberthreat intelligence as a Proactive
Extension to Incident Response. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-6/cyberthreat-intelligence-as-a-proactive-extension-to-incident-response
for more information!

171 views • 2 years ago

VIDEO


HOW INNOVATIVE ENTERPRISES WIN WITH SECURE MACHINE LEARNING

Enterprises use machine learning to validate who they are doing business with
and to find new opportunities. ISACA's IT Professional Practices Lead Kevin Keh
discusses secure machine learning with Protegrity's Chief Security Strategist
Ulf Mattsson. Ulf explains Trusted Execution Environment (TEE), synthetic data,
and encryption keys. All these technologies can be sometimes misunderstood, but
they are changing the digital landscape, so listen in now! Don't forget to check
out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-6/how-innovative-enterprises-win-with-secure-machine-learning
for more information!

199 views • 2 years ago

VIDEO


HCL STATE OF CYBERSECURITY 2021

Jon Brandt (Information Security Professional Practices Lead at ISACA) and Renju
Varghese (Fellow and Chief Architect at HCL Technologies) break down the State
Of Cybersecurity 2021 —Part II report. Threat actors did not take advantage of
clients more during the pandemic, but there have been higher instances of
attacks or attempts of attacks during the past 18 months. This has brought
attention to organization’s boards and executives to show Cybersecurity in a
more serious light than it was pre-pandemic. Tune in now to hear what Renju says
you can expect in 2022! Don't forget to check out
https://www.isaca.org/why-isaca/about-us/newsroom/press-releases/2021/new-isaca-study-finds-cybersecurity-workforce-minimally-impacted-by-pandemic-but-still-grappling
for more information!

459 views • 2 years ago

VIDEO


ISACA’S NEW CYBERPRO – JON BRANDT

Listen in as ISACA’s Information Security Professional Practices Lead, Jon
Brandt grabs the podcast microphone and takes over November’s Cyber Pros to
discuss CISA’s Directive Breakdown. Don't forget to check out
https://www.isaca.org/resources/news-and-trends/isaca-podcast-library for more
information!

121 views • 2 years ago

VIDEO


ISACA CONFERENCE OCEANIA 2021 - THREAT LANDSCAPE PANEL DISCUSSION

Don't forget to check out https://www.isaca.org/training-and-events/conferences
for more information

523 views • 2 years ago

VIDEO


ISACA STANDS FOR SOMETHING BIGGER, SHORT VERSION 2

Find out what ISACA truly stands for to members of its global learning
community. Learn more at www.isaca.org/go/stand-for-something-bigger.

110 views • 2 years ago

VIDEO


ISACA STANDS FOR SOMETHING BIGGER, SHORT VERSION 1

Find out what ISACA truly stands for to members of its global learning
community. Learn more at www.isaca.org/go/stand-for-something-bigger.

97 views • 2 years ago

VIDEO


ISACA STANDS FOR SOMETHING BIGGER

Find out what ISACA truly stands for to members of its global learning
community. Learn more at www.isaca.org/go/stand-for-something-bigger.

1K views • 2 years ago

VIDEO


CAREER PROGRESS DURING THE PANDEMIC

Members of the ISACA community explain what they’ve been doing to keep their
careers moving forward with more flexible schedules during the pandemic. Don't
forget to check out https://www.isaca.org/ for more information

741 views • 2 years ago

VIDEO


THE CYBERSECURITY WORKFORCE

Join ISACA’s Director of Communications, Kristen Kessinger as she interviews
ISACA’s Information Security Professional Practices Lead, Jon Brandt about what
is currently happening in the cybersecurity workforce. Listen in as Jon explains
how the demand for cybersecurity resources is large, but the workforce pipeline
is not keeping pace and how that makes hiring difficult for organizations. Jon
and Kristen also discuss the “Great Resignation”, how the pandemic has helped
make job hunters more selective, and if the NIST/NICE frameworks are still
valued. Take a listen and enjoy! Don't forget to check out
https://www.isaca.org/resources/infographics/state-of-cybersecurity-2021-infographic
for more information!

362 views • 2 years ago

VIDEO


EMERGING TECHNOLOGY - BLOCKCHAIN

In our third LinkedIn Live session on Emerging Technology, Director of Emerging
Technology and Innovation at ISACA, Dustin Brewer, and Principal Consultant at
Strategic Global Consulting LLC, Ronke Oyemade, discuss the topic of blockchain,
its common uses, security concerns related to the technology, and what the
future holds for blockchain as it continues to develop. Discover the highlights
here! Don't forget to check out
https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004Ko8bEAC for more
information

498 views • 2 years ago

VIDEO


ISACA LIVE - ONEINTECH

In this episode of ISACA Live, join Hollee Mangrum-Willis as she talks to Jo
Stewart-Rattray (Vice President, Communities - Australian Computer Society)
about the state of women in Cybersecurity in Oceania and worldwide and how we
can bring awareness to the issue of gender balance in the Cybersecurity field.
Jo and Hollee also discuss how they have worked to set work/life balance
boundaries during the pandemic, changing the language within your sphere of
influence, career pathing for women and what allies can do for all genders in
Cybersecurity.

200 views • 2 years ago

VIDEO


DIGITAL DUNKIRK: USING CYBER SKILLS TO SAVE LIVES

ISACA Pittsburgh Chapter board member Dan Desko and his Echelon Risk + Cyber
team put their cybersecurity skills to good use in a humanitarian effort to help
endangered people flee Afghanistan as part of the Digital Dunkirk project. Don't
forget to check out https://engage.isaca.org/pittsburghchapter/home for more
information!

656 views • 2 years ago

VIDEO


SOCIAL MEDIA HACKING RISK

How Do Organizations Control Their Use of Social Media Part III - What are the
main risks that most enterprises need to consider when it comes to social media?
If you don’t know, you and your organization are in danger of serious
reputational risk! Watch as ISACA’s IT Governance Job Practice Lead, Lisa
Villanueva discusses the risks of social media with Robert Findlay, Global Head
of IT Audit at Glanbia. Social media is one of the easiest platforms to hack and
it isn’t just from external threat actors. Oftentimes, the hack is coming from
inside the organization from current and recently released employees. And
remember, it doesn’t matter who hacks into your social platform, it is your
enterprise that gets the blame and negative press. Robert and Lisa also discuss
the current state of security on social media platforms and how organizations
can benefit by bringing in auditors to show how to control the management of
social media and avoid these pitfalls. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-4/how-do-organizations-control-their-use-of-social-media-part-1
for more information!

132 views • 2 years ago

VIDEO


DANGERS OF SOCIAL MEDIA

How Do Organizations Control Their Use of Social Media Part II - What are the
main risks that most enterprises need to consider when it comes to social media?
If you don’t know, you and your organization are in danger of serious
reputational risk! Watch as ISACA’s IT Governance Job Practice Lead, Lisa
Villanueva discusses the risks of social media with Robert Findlay, Global Head
of IT Audit at Glanbia. Social media is one of the easiest platforms to hack and
it isn’t just from external threat actors. Oftentimes, the hack is coming from
inside the organization from current and recently released employees. And
remember, it doesn’t matter who hacks into your social platform, it is your
enterprise that gets the blame and negative press. Robert and Lisa also discuss
the current state of security on social media platforms and how organizations
can benefit by bringing in auditors to show how to control the management of
social media and avoid these pitfalls. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-4/how-do-organizations-control-their-use-of-social-media-part-1
for more information!

130 views • 2 years ago

VIDEO


HOW DO ORGANIZATIONS CONTROL THEIR USE OF SOCIAL MEDIA

How Do Organizations Control Their Use of Social Media Part I - What are the
main risks that most enterprises need to consider when it comes to social media?
If you don’t know, you and your organization are in danger of serious
reputational risk! Watch as ISACA’s IT Governance Job Practice Lead, Lisa
Villanueva discusses the risks of social media with Robert Findlay, Global Head
of IT Audit at Glanbia. Social media is one of the easiest platforms to hack and
it isn’t just from external threat actors. Oftentimes, the hack is coming from
inside the organization from current and recently released employees. And
remember, it doesn’t matter who hacks into your social platform, it is your
enterprise that gets the blame and negative press. Robert and Lisa also discuss
the current state of security on social media platforms and how organizations
can benefit by bringing in auditors to show how to control the management of
social media and avoid these pitfalls. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-4/how-do-organizations-control-their-use-of-social-media-part-1
for more information!

75 views • 2 years ago

VIDEO


FAKE BUSINESS VS YOUR REPUTATION

How Do Organizations Control Their Use of Social Media Part VIII - What are the
main risks that most enterprises need to consider when it comes to social media?
If you don’t know, you and your organization are in danger of serious
reputational risk! Watch as ISACA’s IT Governance Job Practice Lead, Lisa
Villanueva discusses the risks of social media with Robert Findlay, Global Head
of IT Audit at Glanbia. Social media is one of the easiest platforms to hack and
it isn’t just from external threat actors. Oftentimes, the hack is coming from
inside the organization from current and recently released employees. And
remember, it doesn’t matter who hacks into your social platform, it is your
enterprise that gets the blame and negative press. Robert and Lisa also discuss
the current state of security on social media platforms and how organizations
can benefit by bringing in auditors to show how to control the management of
social media and avoid these pitfalls. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-4/how-do-organizations-control-their-use-of-social-media-part-1
for more information!

36 views • 2 years ago

VIDEO


AUDITING RISK BENEFIT ANALYSIS

How Do Organizations Control Their Use of Social Media Part VI - What are the
main risks that most enterprises need to consider when it comes to social media?
If you don’t know, you and your organization are in danger of serious
reputational risk! Watch as ISACA’s IT Governance Job Practice Lead, Lisa
Villanueva discusses the risks of social media with Robert Findlay, Global Head
of IT Audit at Glanbia. Social media is one of the easiest platforms to hack and
it isn’t just from external threat actors. Oftentimes, the hack is coming from
inside the organization from current and recently released employees. And
remember, it doesn’t matter who hacks into your social platform, it is your
enterprise that gets the blame and negative press. Robert and Lisa also discuss
the current state of security on social media platforms and how organizations
can benefit by bringing in auditors to show how to control the management of
social media and avoid these pitfalls. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-4/how-do-organizations-control-their-use-of-social-media-part-1
for more information!

68 views • 2 years ago

VIDEO


CAN YOU MANAGE RISK WITHOUT MEASURING?

Cyber Risk and Communicating to a Board of Directors Part VII--Digital
transformation has heightened due to the pandemic. We went from, “we can’t work
from home” to “we can only work from home moving forward”. Because of this
change, our cyber risk increases and organizations need to take new action when
it comes to risk. Join ISACA’s Risk IT Risk Professional Practices Lead, Paul
Philips as he talks with Dr. Jack Freund—Head of Cyber Risk Methodology at
VisibleRisk —about how to effectively communicate Cyber Risk to a Board of
Directors. Organizations need to understand the financial ramifications of all
aspects of cyber risk. Along with risk quantification, organizations need to
work with and inform the BOD about the risk appetite for certain projects, how
much risk tolerance the organization can afford to deal with and more. Don't
forget to check out
https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004KoEHEA0 for more
information!

99 views • 2 years ago

VIDEO


RISK APPETITE & TOLERANCE

Cyber Risk and Communicating to a Board of Directors Part VI--Digital
transformation has heightened due to the pandemic. We went from, “we can’t work
from home” to “we can only work from home moving forward”. Because of this
change, our cyber risk increases and organizations need to take new action when
it comes to risk. Join ISACA’s Risk IT Risk Professional Practices Lead, Paul
Philips as he talks with Dr. Jack Freund—Head of Cyber Risk Methodology at
VisibleRisk —about how to effectively communicate Cyber Risk to a Board of
Directors. Organizations need to understand the financial ramifications of all
aspects of cyber risk. Along with risk quantification, organizations need to
work with and inform the BOD about the risk appetite for certain projects, how
much risk tolerance the organization can afford to deal with and more. Don't
forget to check out
https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004KoEHEA0 for more
information!

445 views • 2 years ago

VIDEO


LAW AND REGULATIONS

Cyber Risk and Communicating to a Board of Directors Part V--Digital
transformation has heightened due to the pandemic. We went from, “we can’t work
from home” to “we can only work from home moving forward”. Because of this
change, our cyber risk increases and organizations need to take new action when
it comes to risk. Join ISACA’s Risk IT Risk Professional Practices Lead, Paul
Philips as he talks with Dr. Jack Freund—Head of Cyber Risk Methodology at
VisibleRisk —about how to effectively communicate Cyber Risk to a Board of
Directors. Organizations need to understand the financial ramifications of all
aspects of cyber risk. Along with risk quantification, organizations need to
work with and inform the BOD about the risk appetite for certain projects, how
much risk tolerance the organization can afford to deal with and more. Don't
forget to check out
https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004KoEHEA0 for more
information!

45 views • 2 years ago

VIDEO


RISK QUANTIFICATION

Cyber Risk and Communicating to a Board of Directors Part IV--Digital
transformation has heightened due to the pandemic. We went from, “we can’t work
from home” to “we can only work from home moving forward”. Because of this
change, our cyber risk increases and organizations need to take new action when
it comes to risk. Join ISACA’s Risk IT Risk Professional Practices Lead, Paul
Philips as he talks with Dr. Jack Freund—Head of Cyber Risk Methodology at
VisibleRisk —about how to effectively communicate Cyber Risk to a Board of
Directors. Organizations need to understand the financial ramifications of all
aspects of cyber risk. Along with risk quantification, organizations need to
work with and inform the BOD about the risk appetite for certain projects, how
much risk tolerance the organization can afford to deal with and more. Don't
forget to check out
https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004KoEHEA0 for more
information!

166 views • 2 years ago

VIDEO


BOARD STRUCTURE AND COMMUNICATION

Cyber Risk and Communicating to a Board of Directors Part III--Digital
transformation has heightened due to the pandemic. We went from, “we can’t work
from home” to “we can only work from home moving forward”. Because of this
change, our cyber risk increases and organizations need to take new action when
it comes to risk. Join ISACA’s Risk IT Risk Professional Practices Lead, Paul
Philips as he talks with Dr. Jack Freund—Head of Cyber Risk Methodology at
VisibleRisk —about how to effectively communicate Cyber Risk to a Board of
Directors. Organizations need to understand the financial ramifications of all
aspects of cyber risk. Along with risk quantification, organizations need to
work with and inform the BOD about the risk appetite for certain projects, how
much risk tolerance the organization can afford to deal with and more. Don't
forget to check out
https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004KoEHEA0 for more
information!

84 views • 2 years ago

VIDEO


CYBER RISK AS A STRATEGIC RISK

Cyber Risk and Communicating to a Board of Directors Part II--Digital
transformation has heightened due to the pandemic. We went from, “we can’t work
from home” to “we can only work from home moving forward”. Because of this
change, our cyber risk increases and organizations need to take new action when
it comes to risk. Join ISACA’s Risk IT Risk Professional Practices Lead, Paul
Philips as he talks with Dr. Jack Freund—Head of Cyber Risk Methodology at
VisibleRisk —about how to effectively communicate Cyber Risk to a Board of
Directors. Organizations need to understand the financial ramifications of all
aspects of cyber risk. Along with risk quantification, organizations need to
work with and inform the BOD about the risk appetite for certain projects, how
much risk tolerance the organization can afford to deal with and more. Don't
forget to check out
https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004KoEHEA0 for more
information!

116 views • 2 years ago

VIDEO


COMMUNICATING CYBER RISK TO BOARDS

Cyber Risk and Communicating to a Board of Directors Part I--Digital
transformation has heightened due to the pandemic. We went from, “we can’t work
from home” to “we can only work from home moving forward”. Because of this
change, our cyber risk increases and organizations need to take new action when
it comes to risk. Join ISACA’s Risk IT Risk Professional Practices Lead, Paul
Philips as he talks with Dr. Jack Freund—Head of Cybe rRisk Methodology at
VisibleRisk —about how to effectively communicate Cyber Risk to a Board of
Directors. Organizations need to understand the financial ramifications of all
aspects of cyber risk. Along with risk quantification, organizations need to
work with and inform the BOD about the risk appetite for certain projects, how
much risk tolerance the organization can afford to deal with and more. Don't
forget to check out
https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004KoEHEA0 for more
information!

222 views • 2 years ago

VIDEO


GAINING EXECUTIVE LEADERSHIP SUPPORT FOR SECURITY CHANGES

APTs Require Enhanced Cyberdefense Part VIII-- Advanced persistent threats
(APTs) are introduced by adversaries that possess sophisticated levels of
expertise and significant resources, which allow them to achieve their
objectives by using multiple attack vectors (e.g., cyberattacks, physical
attacks, deception). We must re-imagine cyberdefense. The threats are global,
the impact is local—and every organization, regardless of industry, should
examine strategic options to mitigate this risk to business. The old mantra
“trust, but verify” has given way to the idea of a zero trust security model,
which assumes the adversary is already inside the organization’s defenses. It is
worthwhile to examine some options to reduce risk from APTs. With every business
now a digital business, we must re-think, we must re-imagine cyber defense.”
Don't forget to check out
https://www.isaca.org/resources/news-and-trends/industry-news/2021/apts-require-enhanced-cyberdefense
for more information!

126 views • 2 years ago

VIDEO


BACKGROUND ON THE CMMC MODEL

APTs Require Enhanced Cyberdefense Part VII--Advanced persistent threats (APTs)
are introduced by adversaries that possess sophisticated levels of expertise and
significant resources, which allow them to achieve their objectives by using
multiple attack vectors (e.g., cyberattacks, physical attacks, deception). We
must re-imagine cyberdefense. The threats are global, the impact is local—and
every organization, regardless of industry, should examine strategic options to
mitigate this risk to business. The old mantra “trust, but verify” has given way
to the idea of a zero trust security model, which assumes the adversary is
already inside the organization’s defenses. It is worthwhile to examine some
options to reduce risk from APTs. With every business now a digital business, we
must re-think, we must re-imagine cyber defense.” Don't forget to check out
https://www.isaca.org/resources/news-and-trends/industry-news/2021/apts-require-enhanced-cyberdefense
for more information!

64 views • 2 years ago

VIDEO


SETTING UP AN SOC FOR SUCCESS

APTs Require Enhanced Cyberdefense Part VI--Advanced persistent threats (APTs)
are introduced by adversaries that possess sophisticated levels of expertise and
significant resources, which allow them to achieve their objectives by using
multiple attack vectors (e.g., cyberattacks, physical attacks, deception). We
must re-imagine cyberdefense. The threats are global, the impact is local—and
every organization, regardless of industry, should examine strategic options to
mitigate this risk to business. The old mantra “trust, but verify” has given way
to the idea of a zero trust security model, which assumes the adversary is
already inside the organization’s defenses. It is worthwhile to examine some
options to reduce risk from APTs. With every business now a digital business, we
must re-think, we must re-imagine cyber defense.” Don't forget to check out
https://www.isaca.org/resources/news-and-trends/industry-news/2021/apts-require-enhanced-cyberdefense
for more information!

55 views • 2 years ago

VIDEO


THE TRANSITION FROM “TRUST BUT VERIFY” TO “ZERO-TRUST”

APTs Require Enhanced Cyberdefense Part V—Advanced persistent threats (APTs) are
introduced by adversaries that possess sophisticated levels of expertise and
significant resources, which allow them to achieve their objectives by using
multiple attack vectors (e.g., cyberattacks, physical attacks, deception). We
must re-imagine cyberdefense. The threats are global, the impact is local—and
every organization, regardless of industry, should examine strategic options to
mitigate this risk to business. The old mantra “trust, but verify” has given way
to the idea of a zero trust security model, which assumes the adversary is
already inside the organization’s defenses. It is worthwhile to examine some
options to reduce risk from APTs. With every business now a digital business, we
must re-think, we must re-imagine cyber defense.” Don't forget to check out
https://www.isaca.org/resources/news-and-trends/industry-news/2021/apts-require-enhanced-cyberdefense
for more information!

58 views • 2 years ago

VIDEO


MITIGATING APT RISK

APTs Require Enhanced Cyberdefense Part IV-- Advanced persistent threats (APTs)
are introduced by adversaries that possess sophisticated levels of expertise and
significant resources, which allow them to achieve their objectives by using
multiple attack vectors (e.g., cyberattacks, physical attacks, deception). We
must re-imagine cyberdefense. The threats are global, the impact is local—and
every organization, regardless of industry, should examine strategic options to
mitigate this risk to business. The old mantra “trust, but verify” has given way
to the idea of a zero trust security model, which assumes the adversary is
already inside the organization’s defenses. It is worthwhile to examine some
options to reduce risk from APTs. With every business now a digital business, we
must re-think, we must re-imagine cyber defense.” Don't forget to check out
https://www.isaca.org/resources/news-and-trends/industry-news/2021/apts-require-enhanced-cyberdefense
for more information!

31 views • 2 years ago

VIDEO


DEFENSE AGAINST APT ATTACKS

APTs Require Enhanced Cyberdefense Part III—Advanced persistent threats (APTs)
are introduced by adversaries that possess sophisticated levels of expertise and
significant resources, which allow them to achieve their objectives by using
multiple attack vectors (e.g., cyberattacks, physical attacks, deception). We
must re-imagine cyberdefense. The threats are global, the impact is local—and
every organization, regardless of industry, should examine strategic options to
mitigate this risk to business. The old mantra “trust, but verify” has given way
to the idea of a zero trust security model, which assumes the adversary is
already inside the organization’s defenses. It is worthwhile to examine some
options to reduce risk from APTs. With every business now a digital business, we
must re-think, we must re-imagine cyber defense.” Don't forget to check out
https://www.isaca.org/resources/news-and-trends/industry-news/2021/apts-require-enhanced-cyberdefense
for more information!

81 views • 2 years ago

VIDEO


HOW ORGANIZATIONS SHOULD DEAL WITH APTS

APTs Require Enhanced Cyberdefense Part II — Advanced persistent threats (APTs)
are introduced by adversaries that possess sophisticated levels of expertise and
significant resources, which allow them to achieve their objectives by using
multiple attack vectors (e.g., cyberattacks, physical attacks, deception). We
must re-imagine cyberdefense. The threats are global, the impact is local—and
every organization, regardless of industry, should examine strategic options to
mitigate this risk to business. The old mantra “trust, but verify” has given way
to the idea of a zero trust security model, which assumes the adversary is
already inside the organization’s defenses. It is worthwhile to examine some
options to reduce risk from APTs. With every business now a digital business, we
must re-think, we must re-imagine cyber defense.” Don't forget to check out
https://www.isaca.org/resources/news-and-trends/industry-news/2021/apts-require-enhanced-cyberdefense
for more information!

61 views • 2 years ago

VIDEO


WHY ORGANIZATIONS SHOULD REIMAGINE THEIR CYBERDEFENSES

APTs Require Enhanced Cyberdefense Part I-- Advanced persistent threats (APTs)
are introduced by adversaries that possess sophisticated levels of expertise and
significant resources, which allow them to achieve their objectives by using
multiple attack vectors (e.g., cyberattacks, physical attacks, deception). We
must re-imagine cyberdefense. The threats are global, the impact is local—and
every organization, regardless of industry, should examine strategic options to
mitigate this risk to business. The old mantra “trust, but verify” has given way
to the idea of a zero trust security model, which assumes the adversary is
already inside the organization’s defenses. It is worthwhile to examine some
options to reduce risk from APTs. With every business now a digital business, we
must re-think, we must re-imagine cyber defense.” Don't forget to check out
https://www.isaca.org/resources/news-and-trends/industry-news/2021/apts-require-enhanced-cyberdefense
for more information!

119 views • 2 years ago

VIDEO


ISACA AWARDS GALA 2021: CONGRATULATIONS AND INVITATION FROM DAVID SAMUELSON

ISACA CEO David Samuelson sends our 2021 ISACA Award recipients his personal
congratulations on their recognition and encourages everyone to celebrate their
achievements at the 2021 ISACA Awards Virtual Gala. Don't forget to check out
https://www.isaca.org/ for more information!

238 views • 2 years ago

VIDEO


ISACA 2021 HALL OF FAME

Congratulations to the 2021 ISACA Hall of Fame Inductees! Don't forget to check
out https://www.isaca.org/ for more information!

120 views • 2 years ago

VIDEO


ISACA GLOBAL ACHIEVEMENT AWARDS

Congratulations 2021 ISACA Global Achievement Award Recipients! Don't forget to
check out https://www.isaca.org/ for more information!

90 views • 2 years ago

VIDEO


2021 ISACA CHAPTER AWARDS

Congratulations 2021 ISACA Chapter Award Recipients! Don't forget to check out
https://www.isaca.org/ for more information!

118 views • 2 years ago

VIDEO


2021 ISACA CERTIFICATION EXAM TOP SCORERS

Congratulations to the 2021 ISACA Certification Exam Top Scorers! Don't forget
to check out https://www.isaca.org/ for more information!

223 views • 2 years ago

VIDEO


BEHIND THE SCENES @ ISACA CONFERENCE NORTH AMERICA

Watch this exclusive behind the scenes footage of the ISACA team working hard
and playing hard while bringing the ISACA Conference North America to life!
Don't forget to check out https://www.isaca.org/ for more information!

218 views • 2 years ago

VIDEO


GAINING DIGITAL TRUST BY ELIMINATING PRIVACY DARK PATTERNS

With the growing emphasis on consent for collecting and processing data, some
enterprises have turned to tricking data subjects into giving their consent by
using privacy dark patterns. Privacy dark patterns can manifest in numerous
ways, from confusing user interface design to manipulative language. In this
episode Jonathan Brandt, ISACA's Director of Professional Practices and
Innovation, is joined by ISACA's Privacy Professional Practices Principal, Safia
Kazi, who defines and provides examples of privacy dark patterns, their
consequences, and how to avoid them. Jon and Safia also discuss how privacy dark
patterns affect digital trust, which can ultimately hurt an enterprise's
reputation and customers. To read the full article, Fostering Trust by
Eliminating Dark Patterns click the link:
https://www.isaca.org/fostering-trust-by-eliminating-dark-patterns. Be sure to
comment, like, and subscribe for more ISACA Productions content!

531 views • 2 years ago

VIDEO


ISACA ANTHEM – MEGA RAN CUSTOM RAP

Rapper Mega Ran drops straight fire bars about ISACA’s IT credentialing programs
and community of experts, taking you on a journey “from a new member to the
latest IT star”. ISACA! Video made on commission through Event Rap. Explore
ISACA’s programs: https://www.isaca.org/ Follow Mega Ran:
https://www.eventrap.com/artist/mega-ran/ Learn more about Event Rap and custom
rap videos: https://www.eventrap.com

6K views • 2 years ago

VIDEO


ISACA'S VOLUNTEER APPRECIATION WEEK 2021

Don't forget to check out https://www.isaca.org/ for more information!

536 views • 2 years ago

VIDEO


SHORTER VERSION 3 - CYBERSECURITY: A PERFECT FIT FOR RISING PROFESSIONALS

Stanford University student Kyla Guru says Gen Z members are especially
well-equipped to thrive in cybersecurity. Don't forget to check out
https://www.isaca.org/ for more information!

166 views • 2 years ago

VIDEO


SHORTER VERSION 2 - CYBERSECURITY: A PERFECT FIT FOR RISING PROFESSIONALS

Stanford University student Kyla Guru says the challenges posed when working in
cybersecurity can seem like a surreal experience. Don't forget to check out
https://www.isaca.org/ for more information!

125 views • 2 years ago

VIDEO


SHORT VERSION 1 - CYBERSECURITY: A PERFECT FIT FOR RISING PROFESSIONALS

Stanford University student Kyla Guru explains the problem-solving mindset that
helps rising professionals succeed in cybersecurity. Don't forget to check out
https://www.isaca.org/ for more information!

163 views • 2 years ago

VIDEO


CYBERSECURITY: A PERFECT FIT FOR RISING PROFESSIONALS

Stanford University student Kyla Guru makes the case that cybersecurity skills
come naturally to members of Gen Z who want to impact the future. Don't forget
to check out https://www.isaca.org/ for more information!

387 views • 2 years ago

VIDEO


#IAMISACA: ANDREA TANG

In her #IamISACA story, Andrea Tang explains how her privacy expertise positions
her to be to a bridge between China and the rest of the world. Don't forget to
check out https://www.isaca.org/ for more information!

250 views • 2 years ago

VIDEO


#IAMISACA: ANDREA TANG - SHORTER VERSION

In her #IamISACA story, Andrea Tang explains how her privacy expertise positions
her to be to a bridge between China and the rest of the world. Don't forget to
check out https://www.isaca.org/ for more information!

97 views • 2 years ago

VIDEO


BUILDING EARLY CAREER MOMENTUM WITH ISACA

Find out how starting early with ISACA can make a difference for young
professionals and other newcomers to IT careers. Don't forget to check out
https://www.isaca.org/ for more information!

375 views • 2 years ago

VIDEO


BUILDING CUSTOMER TRUST THROUGH PRIVACY

When organizations build privacy programs that are reflective of consumers’ best
interests, it builds goodwill and creates added value for the enterprise, says
ISACA privacy expert Matt Stamper. Don't forget to check out
https://www.isaca.org/ for more information!

248 views • 2 years ago

VIDEO


PROTECTING AND GOVERNING PERSONAL DATA

As more and more employees work from home, organizations will have to evolve
their approaches to data privacy, including adding more credentialed privacy
professionals. Don't forget to check out https://www.isaca.org/ for more
information!

180 views • 2 years ago

VIDEO


BRINGING TECHNICAL AND LEGAL PRIVACY PROFESSIONALS TOGETHER

Collaborations between technical and legal privacy professionals focused on data
governance and data privacy lead to stronger privacy solutions for
organizations. Don't forget to check out https://www.isaca.org/ for more
information!

289 views • 2 years ago

VIDEO


IMPLEMENTING THE NEEDED PRIVACY CONTROLS

Privacy credentials such as ISACA’s CDPSE certification can help practitioners
ensure they are putting in place the needed technical privacy safeguards and
controls. Don't forget to check out https://www.isaca.org/ for more information!

255 views • 2 years ago

VIDEO


A SEAT AT THE TABLE FOR PRIVACY

Privacy is increasingly driving organizational change. Professionals who
proactively seek privacy knowledge and credentials are more likely to have a
seat at the table for these important conversations. Don't forget to check out
https://www.isaca.org/ for more information!

125 views • 2 years ago

VIDEO


PRIVACY IN PRACTICE 2021 REPORT

Don't forget to check out https://www.isaca.org/ for more information!

722 views • 2 years ago

VIDEO


TOP TECH RISKS FOR 2021

As organizations plan for the year ahead, the COVID-19 world has reshaped the
landscape of technology risks. In September/October 2020, ISACA and Protiviti
conducted a global survey of more than 7,400 IT audit leaders and professionals
to obtain their perspectives on the top technology risks their organizations
will face in 2021. Explore these in this video and the new report:
https://www.isaca.org/go/2020-isaca-protiviti-global-it-audit-benchmarking-survey.

981 views • 2 years ago

VIDEO


JOIN PRIVACY IN PRACTICE EMCEE SAFIA KAZI ONLINE, 8 DECEMBER 2020

459 views • 2 years ago

VIDEO


MANAGE AND CONQUER DATA AND PRIVACY ISSUES WITH ISACA

Chief Product Officer, Nader Qaimari, talks about ISACA’s current and future
plans to help IS/IT professionals overcome privacy issues that keep them up at
night.

407 views • 2 years ago

VIDEO


2020 ISACA AWARDS PRESENTATION

Watch the presentation of the 2020 ISACA Global Achievement and Certification
Exam Top Score Awards and celebrate the achievements of ISACA members around the
world.

1K views • 2 years ago

VIDEO


TECHNICAL PRIVACY KNOWLEDGE: IN-DEMAND

CDPSE-holder Yunique Demann offers her perspective on why privacy has become one
of the hottest areas of job growth for information and technology professionals.

325 views • 2 years ago

VIDEO


WHY EMPLOYERS VALUE THE CDPSE

CDPSE-holder Yunique Demann explains how the CDPSE certification demonstrates
technical privacy skills to prospective employers.

1K views • 2 years ago

VIDEO


UNDERSTANDING PRIVACY AT THE DESIGN LEVEL

Mohammed J. Khan says that ISACA’s CDPSE certification enables professionals to
understand how privacy works at the design level throughout the enterprise.

466 views • 2 years ago

VIDEO


ISACA – CYBER MATURITY: IMPROVE YOUR PANDEMIC PREPAREDNESS BY FRANK DOWNS

816 views • 2 years ago

VIDEO


2020 ISACA BEST CHAPTER AWARDS

Congratulations to the 2020 recipients of the K. Wayne Snipes Best Chapter
Award: Chicago Chapter (Very Large Chapter), Middle Tennessee Chapter (Large
Chapter), Tallahassee Chapter (Medium Chapter), and Coimbatore Chapter (Small
Chapter). Learn more at www.isaca.org/awards.

367 views • 2 years ago

VIDEO


2020 ISACA CHAIR'S AWARD

ISACA’s 2019-2020 Board Chair Brennan P. Baybeck dedicates the 2020 Chair’s
Award to ISACA’s passionate members, chapters, chapter leaders, and volunteers.
Learn more at www.isaca.org/awards.

414 views • 2 years ago

VIDEO


ISACA COMMUNITY DAY 2020 - JOIN US!

854 views • 2 years ago

VIDEO


2019 ISACA ANNUAL REPORT VIDEO

Find out how ISACA celebrated its 50th anniversary year by preparing for even
greater impact in the next 50 years.

1K views • 2 years ago

VIDEO


WELCOME TO THE NEW ISACA!

For more information: https://www.isaca.org/

243K views • 2 years ago

VIDEO


EUROCACS/CSX 2019 HIGHLIGHTS

Check out the conference highlights from EuroCACS 2019 in Geneva, Switzerland.
EuroCACS 2020 will take place on 28-30 October 2020 in Helsinki, Finland.

462 views • 2 years ago

VIDEO


INFOSECURITY ISACA NORTH AMERICA EXPO AND CONFERENCE

Expand your network, deepen your knowledge, and sharpen your skills at
Infosecurity ISACA North America Expo and Conference. Learn more
http://bit.ly/2ng0TKe Earn up to 37 CPEs, experience customized learning, and
engage with industry peers 20-21 November 2019 at the Javits Convention Center
in New York, New York. Register Today http://bit.ly/2ng0TKe

794 views • 2 years ago

VIDEO


ISACA CISM CERTIFICATION HOLDERS GIVE ADVICE TO PROFESSIONALS CONSIDERING
CERTIFICATION

Certified Information Security Manager (CISM) certification holders give advice
to those considering becoming CISM certified. http://bit.ly/2jQA9fH The uniquely
management-focused CISM certification affirms that the holders understand
business information systems, know how to manage, and methods to adapt
technology to their enterprise and industry. Since its inception in 2002, more
than 30,000 of professionals worldwide have earned the industry-leading CISM
designation, to affirm both their high level of technical competence and
qualifications for top-caliber leadership in information security management
roles. Learn more about the CISM certification: http://bit.ly/2jQA9fH

11K views • 2 years ago

VIDEO


JOIN US FOR ISACA COMMUNITY DAY!

ISACA CEO David Samuelson invites all ISACA members and chapters to give back to
their local communities on ISACA CommunITy Day. Be part of this global day of
service where we all have a positive impact on the world. Hosted on 5 October
2019, the inaugural event will kick off in ISACA’s 50th year and become an
annual tradition on the first Saturday in October. Follow our global activities
using #ISACACommunITyDay. https://engage.isaca.org/communityday/

927 views • 2 years ago

VIDEO


SIMON T. BAILEY – OPENING KEYNOTE AT 2019 GRC

Be inspired to Shift Your Brilliance with 2019 GRC Conference Keynote, Simon T.
Bailey. Named by SUCCESS magazine as one of the top 25 people who will help you
reach your business and life goals, Simon T. Bailey has used his talks to
inspire change and success across thousands of organizations in dozens of
countries. Bailey will address the failure of yesterday’s methods to keep pace
with today’s rapid technological change, and inspire and empower attendees to
new ways of thinking will create tomorrow’s solutions. Register now for 2019 GRC
Conference, brought to you by ISACA and The IIA. http://bit.ly/329eQJR

646 views • 2 years ago

VIDEO


NORTH AMERICA CACS 2019 HIGHLIGHTS

Register for NACACS 2020 here: http://bit.ly/2FLz42L The North America CACS 2019
conference in Anaheim, CA just ended. Check out the conference highlights and
register for North America CACS 2020, 12-14 May in Baltimore, Maryland here:
http://bit.ly/2FLz42L

1K views • 2 years ago

VIDEO


RIGHT-SIZE YOUR GOVERNANCE OF ENTERPRISE INFORMATION & TECHNOLOGY

If you are new to COBIT, there has never been a better time to reevaluate your
enterprise governance program. Effective governance over information and
technology is critical to business success, and this new release of COBIT® 2019
further cements COBIT’s continuing role as an important driver of innovation and
business transformation. Learn more http://bit.ly/2HKhIF7

7K views • 2 years ago

VIDEO


CURRENT COBIT USERS GAIN EVEN MORE FROM COBIT® 2019

For current users of COBIT 5, the news couldn’t be better. COBIT 2019 is an
evolution of COBIT 5, so this newly revised governance framework contains
everything you value about COBIT 5, plus many exciting new features and focus
areas. Learn more http://bit.ly/2HKiq5o

5K views • 2 years ago

VIDEO


INTRODUCING COBIT® 2019

The world-renowned COBIT framework has been updated—Introducing COBIT 2019. Four
core publications provide the foundation for creating a customized governance
program for information and technology, right-sized to the needs of your
enterprise. Good governance is a vital element of strategy formulation and
business transformation success, and COBIT 2019 can help chart that path
forward. Learn more http://bit.ly/2HI8Y2l

32K views • 2 years ago

VIDEO


WHAT’S NEW IN COBIT® 2019: DESIGN GUIDE

Besides updating information in the Core COBIT model and incorporating refreshed
standards, the new COBIT 2019 is more flexible in implementation and offers more
design guidance. This new Design Guide publication fills an important need for
COBIT users—how to put COBIT to practical use, offering prescriptive how-to
information. Learn more http://bit.ly/2HI8Y2l

12K views • 2 years ago

VIDEO


ISACA 2018 ANNUAL REPORT: NAVIGATING CHANGE

ISACA spent 2018 equipping its global professional community to deal with the
many changes impacting the enterprise technology landscape. To find out more,
visit www.isaca.org/annualreport.

434 views • 2 years ago

VIDEO


A HISTORY OF COBIT

Learn how ISACA’s Control Objectives evolved into COBIT, a globally respected
framework for the governance and management of enterprise information and
technology, and how COBIT 2019 builds upon this rich history. Find out how you
can be part of the ISACA50 celebration! http://bit.ly/2ETEU3p

1K views • 2 years ago

VIDEO


CISAS TALK ABOUT CISA

Certified Information Systems Auditor (CISA) certification holders talk in their
own words about the ways ISACA’s globally recognized IT credential has helped
their careers. Learn more http://bit.ly/2vHa5aV

10K views • 2 years ago

VIDEO


EUROCACS 2018 HIGHLIGHTS

Check out the conference highlights from EuroCACS 2018 in Edinburgh, Scotland.
EuroCACS 2019 will take place on 16-18 October 2019 in Geneva, Switzerland.
Check-in for updates here: http://bit.ly/2I55ROB See the EuroCACS 2018 photo
album here: http://bit.ly/2sQjcpa

1K views • 2 years ago

VIDEO


ISACA ANNUAL REPORT 2017 OVERVIEW

ISACA advanced its Purpose and Promise throughout 2017 by moving forward
numerous impactful programs and initiatives. See the full 2017 ISACA Annual
Report here: http://bit.ly/2FpWl7c

832 views • 2 years ago

VIDEO


2017 ANNUAL REPORT: VOLUNTEERS

ISACA board director Leonard Ong notes how volunteering with ISACA provides a
variety of professional and social rewards. See the full 2017 ISACA Annual
Report here: http://bit.ly/2FpWl7c

144 views • 2 years ago

VIDEO


NORTH AMERICA CACS 2018 HIGHLIGHTS

Register for NACACS 2019 here: http://bit.ly/2ruNaO0 The North America CACS 2018
conference in Chicago just ended. Check out the conference highlights and
register for North America CACS 2019, 13-15 May in Anaheim, CA here:
http://bit.ly/2ruNaO0 See NACACS 2018 photo album here: http://bit.ly/2rx4UIv

1K views • 2 years ago

VIDEO


ISACA AWARDS PROGRAM

ISACA Awards: http://bit.ly/2rtrpy1 Learn why ISACA values the opportunity to
recognize outstanding thought leadership, volunteer service and professional
achievements. We rely upon our members to submit nominations and volunteer to
help select the incredible accomplishments we present with ISACA Global
Achievement Awards and Chapter Awards. ISACA also recognizes the Certification
Exam Top Scores for their exemplary abilities. Visit http://bit.ly/2rtrpy1 to
learn more. Volunteer Opportunities: http://bit.ly/2rsFgVn ISACA Awards:
http://bit.ly/2rtrpy1

1K views • 2 years ago

VIDEO


CISA VIRTUAL INSTRUCTOR-LED TRAINING COURSE - MAY 2018

Offering you intensive, cram-style online preparation for your CISA® exam,
ISACA's 12-hour VILT prep course is spread across four 3-hour sessions with
direct interaction with an expert instructor. To register for the CISA Virtual
Instructor-Led Training course on 21-24 May, click here: http://bit.ly/2qCpWWs
Course Description Join fellow CISA exam candidates along with a CISA-certified
trainer for a unique exam prep experience. The CISA Exam Prep Course is an
intensive, cram-style course that will cover some of the more challenging topics
from the CISA job practice. Drill through sample exam items, ask your most
pressing questions and get the answers to build your confidence as you prepare
for exam day. Learning Objectives At the end of this course, you will: • Learn
the specific requirements for passing the CISA Exam and attaining your
certification • Review key concepts, tasks and knowledge related to the duties
of an IS auditor, which serve as the foundation of the CISA Exam • Learn
successful methods of evaluating exam questions and answers, including analysis
and explanations • Review useful, proven information on study and exam time
management Who Should Attend? • CISA Exam Candidates • Audit professionals with
3-5 years of experience

681 views • 2 years ago

VIDEO


EUROCACS 2018 | COBIT 5 FOUNDATION WORKSHOP

Learn about the COBIT 5 Foundation workshop here: http://bit.ly/2pSrudX Bruno
Horta Soares talks about his COBIT 5 Foundation workshop at EuroCACS 2018 in
Edinburgh, Scotland. Learn the importance of an effective framework to enable
business value. Delve into the elements of ISACA’s evolutionary framework to
understand how COBIT 5 covers the business end-to-end and helps you effectively
govern and manage enterprise IT. Developed for anyone interested in obtaining
foundation-level knowledge of COBIT, the course explains the COBIT framework and
supporting materials in a logical and example-driven approach. Earn the COBIT 5
Foundation Certificate! Attendees can take the Foundation Exam Monday, 28 May
2018 for an additional US $150! The exam will take place on Monday morning,
before the opening keynote presentation. A study session will also be held on
Sunday evening prior to the exam to prepare you as much as possible. In 2017,
100% of those who attended the COBIT 5 Foundation workshop and took the exam at
the conference passed! Space is limited for the exam, so be sure to add it to
your registration today to secure your spot! Learn about the COBIT 5 Foundation
workshop here: http://bit.ly/2pSrudX Register for EuroCACS 2018 today:
http://bit.ly/2pWTygr See the full program: http://bit.ly/2pRYaEd Learn more
about our workshops: http://bit.ly/2pSrudX Check out our networking events:
http://bit.ly/2pSr9YJ Explore Edinburgh with our interactive map:
http://bit.ly/2pTNntf

276 views • 2 years ago

VIDEO


WHY YOU SHOULD ATTEND NORTH AMERICA CACS 2018

Register for North America CACS 2018: http://bit.ly/2q1Uelg Grow your expertise,
skills and value to enterprises worldwide at North America CACS 2018. Join us on
30 April-2 May in Chicago, Illinois, and be a part of the top conference for IS
audit and security professionals! Choose from dynamic, timely topics that help
you address challenges and learn innovative solutions. There will be more than
100 sessions to customize for your goals and various in-depth options for
advanced learning. Enjoy direct access to industry leaders, expert speakers and
valuable resources. North America CACS will also provide enhanced networking
opportunities for attendees. Hear what last year's attendees have to say about
their North America CACS experience and register for the 2018 conference right
here: http://bit.ly/2q1Uelg See the full program: http://bit.ly/2q0mRzk Learn
more about our workshops: http://bit.ly/2q2cGdE Check out our networking events:
http://bit.ly/2q1R1SR Explore Chicago with our interactive map:
http://bit.ly/2q1ToF8

409 views • 2 years ago

VIDEO


ISACA PURPOSE AND PROMISE

Learn more about ISACA here: http://bit.ly/2EF84CQ ISACA's Purpose and Promise
video showcases ISACA’s presence, work, and value on a global scale through
leader, member and staff narratives. The ISACA community – members, volunteers
and professional staff -- is guided by our Purpose and Promise, which define the
essence of who we are and what we do. Our Purpose is the reason we exist – to
help business technology professionals and their enterprises around the world
realize the positive potential of technology. Our Promise is how we, as an
organization and as individuals, deliver on our Purpose – the work we do every
day to inspire confidence that enables innovation through technology. Our work,
and the work of the more than 450,000 engaged business technology professionals
we support, has never been more important. Learn more about ISACA here:
http://bit.ly/2EF84CQ

12K views • 2 years ago

VIDEO


MELTDOWN & SPECTRE - IDENTIFYING THE VULNERABILITY & MITIGATING THE RISK

ISACA’s Frank Downs, Senior Manager of Cyber Information Security Practices,
demonstrates how to identify if you have the vulnerability and how to mitigate
the risk. To learn more, read the ISACA Now Blog, Understanding Meltdown and
Spectre http://bit.ly/2CQRm3i

949 views • 2 years ago

VIDEO


GDPR OVERVIEW IN FOUR MINUTES - CSX EUROPE

Experts on GDPR from ISACA, IAPP, and ENISA joined together to discuss the
impending GDPR Regulation implementation 25 May 2018 at 2017 CSX Europe. The
panel discussed what GDPR is, what is involved in preparing for it and the
expectations of organizations. Links to more ISACA content about GDPR are below.
GDPR Data Protection Impact Assessments (White Paper): http://bit.ly/2kQjWGa
Adopting GDPR Using COBIT 5 (White Paper): http://bit.ly/2kQSTdy Using ISACA
Privacy Principles for GDPR Compliance (Article): http://bit.ly/2kQkcVG
Countdown to GDPR: 5 Tips to Accelerate GDPR Readiness (Archived Webinar):
http://bit.ly/2kSiO4z For a full list of GDPR resources from ISACA, go here:
http://bit.ly/2kQjVC8 To learn about CSX 2018 Europe, click here:
http://bit.ly/2kRdWNh

14K views • 2 years ago

VIDEO


CSX 2017 EUROPE CONFERENCE HIGHLIGHTS

Enjoy the very best of what CSX 2017 Europe had to offer in this highlight
video. The attendees at the Intercontinental London - The O2 in London, UK, each
engaging keynote and session speaker and more made this incredible cyber event a
resounding success! Register for next year's conference here:
http://bit.ly/2zC7PWd

992 views • 2 years ago

VIDEO


EUROCACS 2018

Hear what last year's attendees have to say about their EuroCACS experience and
register for the 2018 conference right here: http://bit.ly/2zCa4c6 Leaders in
IS/IT Audit, Security, and Compliance gather at one exceptional event each year.
Join them on 28-30 May 2018 in Edinburgh, Scotland. Gain fresh ideas and
approaches while earning CPE hours at a variety of workshops and over 50
breakout sessions. You will be gaining new knowledge and perspectives alongside
the industry’s brightest and most highly respected minds at this ISACA®
industry-leading conference. Register today at http://bit.ly/2zCa4c6

921 views • 2 years ago

VIDEO


BETTER TECH GOVERNANCE IS BETTER FOR BUSINESS

Highlights from CSX 2017 North America conference panel discussing the key
takeaways from ISACA’s research on the importance of strong board oversight over
areas such as cybersecurity and risk management. To see ISACA's corresponding
report, click here: http://bit.ly/2z9U0hq

425 views • 2 years ago

VIDEO


AFRICA CACS 2017 HIGHLIGHTS

Here are highlights from ISACA's Africa CACS 2017 conference. See a recap of the
Africa CACS event in Accra, Ghana. Learn more about all of our conferences here:
http://bit.ly/2gcf5kk

197 views • 2 years ago

VIDEO


CSX 2017 NORTH AMERICA CONFERENCE HIGHLIGHTS

Enjoy the very best of what CSX 2017 North America had to offer in this
highlight video. The attendees at the Marriott Wardman Park in Washington D.C.,
each engaging keynote and session speaker, the interactive Cyber Challenge and
more made this incredible cyber event a resounding success! We cannot wait to
see everyone next year in Las Vegas, Nevada. http://bit.ly/2gbdxaa

1K views • 2 years ago

VIDEO


CSX TRAINING PLATFORM

It’s Cyber Security Awareness Month. In cyber security, there’s no substitute
for real-world experience. That’s why we created the Cybersecurity Nexus™ (CSX)
Training Platform, the first on-demand, real-world training solution that builds
real technical skills to help enterprises train their staff to combat real
threats. Learn more. http://bit.ly/2xQNDwN

4K views • 2 years ago

VIDEO


ISACA CRISC ONLINE REVIEW COURSE OVERVIEW

Purchase ISACA's CRISC Online Review Course here: http://bit.ly/2wgNLYc Online
review courses are also available for purchase through our enterprise sales team
for larger organizations. Learn more here: http://bit.ly/2whvv0C Course
Description The CRISC Online Review Course is an online preparation course that
will prepare you for the CRISC certification exam using proven instructional
design techniques and interactive activities. The course covers all four of the
CRISC domains. The course incorporates video, interactive eLearning modules,
downloadable, interactive workbooks, downloadable job aids, case study
activities, and pre- and post-course assessments. You will be able to navigate
the course at your own pace, following a recommended structure, or target
preferred job practice areas. You may also start and stop the course based on
your study schedule, picking up exactly where you left off the next time you
access. Trained by ISACA. Certified by ISACA. Learning Objectives At the end of
this course, the learner will be able to: --Identify the IT risk management
strategy in support of business objectives and alignment with the Enterprise
Risk Management (ERM) strategy. --Analyze and evaluate IT risk to determine the
likelihood and impact on business objectives to enable risk-based decision
making. --Determine risk response options and evaluate their efficiency and
effectiveness to manage risk in alignment with business objectives.
--Continuously monitor and report on IT risk and controls to relevant
stakeholders to ensure the continued efficiency and effectiveness of the IT risk
management strategy and its alignment with business objectives. Course Outline
CRISC Self-Assessment --50 questions --Results broken down per domain
Introduction --Welcome video --Getting started Job Aid Domain 1 — Risk
Management --Collect and review environmental risk data Identify potential
vulnerabilities to people, processes and assets --Develop IT scenarios based on
information and potential impact to the organization --Identify key stakeholders
for risk scenarios --Establish risk register --Gain senior leadership and
stakeholder approval of the risk plan --Collaborate to create a risk awareness
program and conduct training Domain 2 – IT Risk Assessment --Analyze risk
scenarios to determine likelihood and impact --Identify current state of risk
controls and their effectiveness --Determine gaps between the current state of
risk controls and the desired state --Ensure risk ownership is assigned at the
appropriate level --Communicate risk assessment data to senior management and
appropriate stakeholders --Update the risk register with risk assessment data
Domain 3 – Risk Response and Mitigation --Align risk responses with business
objectives --Develop consult with and assist risk owners with development risk
action plans --Ensure risk mitigation controls are managed to acceptable levels
--Ensure control ownership is appropriately assigned to establish accountability
--Develop and document control procedures for effective control --Update the
risk register --Validate that risk responses are executed according to risk
action plans Domain 4 – Risk and Control Monitoring and Reporting --Risk and
control monitoring and reporting --Define key risk indicators (KRIs) and
identify key performance indicators (KPIs) to enable performance measurement key
risk indicators (KRIs) and key performance indicators (KPIs) --Determine the
effectiveness of control assessments --Identify and report trends/changes to
KRIs/KPIs that affect control performance or the risk profile CRISC Sample Exam
--75 questions

2K views • 2 years ago

VIDEO


ASIA PACIFIC CACS 2017 OVERVIEW

Mark your calendars for 29-30 November 2017 and join us in Dubai! Don’t miss the
opportunity to earn up to 23 CPE hours and be a part of the top conference for
Audit and Security professionals. Register today! http://bit.ly/2hhdXbm

741 views • 2 years ago

VIDEO


ISACA CISM ONLINE REVIEW COURSE OVERVIEW

Purchase ISACA's CISM Online Review Course here: http://bit.ly/2wh1AWD Online
review courses are also available for purchase through our enterprise sales team
for larger organizations. Learn more here: http://bit.ly/2wgNbtu
________________________________________ CISM Online Review Course Description
The CISM Online Review Course is an online preparation course that will prepare
you for the CISM certification exam using proven instructional design techniques
and interactive activities. The course covers all four of the CISM domains. The
course incorporates video, interactive eLearning modules, downloadable,
interactive workbooks, downloadable job aids, case study activities, and pre-
and post-course assessments. You will be able to navigate the course at your own
pace, following a recommended structure, or target preferred job practice areas.
You may also start and stop the course based on your study schedule, picking up
exactly where you left off the next time they access. Trained by ISACA.
Certified by ISACA. Learning Objectives At the completion of this course the
learner will be able to: --Establish and/or maintain an information security
governance framework and supporting processes to ensure that the information
security strategy is aligned with organizational goals and objectives. --Manage
information risk to an acceptable level based on risk appetite to meet
organizational goals and objectives. --Develop and maintain an information
security program that identifies, manages and protects the organization’s assets
while aligning to information security strategy and business goals, thereby
supporting an effective security posture. --Plan, establish and manage the
capability to detect, investigate, respond to and recover from information
security incidents to minimize business impact. Course Outline CISM
Self-Assessment --50 questions --Results are broken down per domain Introduction
--Welcome video --Getting started Job Aid Domain 1 – Information Security
Governance --Explain the need for and the desired outcomes of an effective
information security strategy --Create an information security strategy aligned
with organizational goals and objectives --Gain stakeholder support using
business cases Identify key roles and responsibilities needed to execute an
action plan --Establish metrics to measure and monitor the performance of
security governance Domain 2 – Information Risk Management --Explain the
importance of risk management as a tool to meet business needs and develop a
security management program to support these needs --Identify, rank, and respond
to a risk in a way that is appropriate as defined by organizational directives
--Assess the appropriateness and effectiveness of information security controls
--Report information security risk effectively Domain 3- Information Security
Program Development and Management --Align information security program
requirements with those of other business functions --Manage the information
security program resources --Design and implement information security controls
--Incorporate information security requirements into contracts, agreements and
third-party management processes Domain 4 – Information Security Incident
Management --Understand the concepts and practices of Incident Management
--Identify the components of an Incident Response Plan and evaluate its
effectiveness --Understand the key concepts of Business Continuity Planning, or
BCP and Disaster Recovery Planning, or DRP --Be familiar with techniques
commonly used to test incident response capabilities CISM Sample Exam --75
questions

4K views • 2 years ago

VIDEO


MARK THOMAS EXPLAINS HIS UPCOMING WORKSHOP AT ASIA PACIFIC CACS 2017 CONFERENCE

Mark Thomas explains how effectively managing IT risk helps drive better
business performance by linking information and technology risk to the
achievement of strategic enterprise objectives. This one day, instructor-led
workshop will address COBIT 5 for Risk which defines IT risk as ‘’business risk,
specifically, the business risk associated with the use, ownership, operation,
involvement, influence, and adoption of IT within an enterprise.’’ Attendees
will learn how to adopt COBIT 5 for Risk to ensure a broader coverage of
business risk to the benefit their enterprise’s risk profile. Learn more at Asia
Pacific CACS 2017 http://bit.ly/2vWXWhZ

155 views • 2 years ago

VIDEO


LEARN HOW CSX 2017 WILL HELP YOU IMPROVE HEALTHCARE'S CYBER SECURITY

Learn how to defend your healthcare organization, patients and more against the
growing cyber security threat. Make plans now to join the thought (and action)
leaders in cyber security at CSX 2017: 2-4 October 2017 in Washington, DC, USA;
or 30 October–1 November 2017 in London, UK. CSX 2017 North America:
http://bit.ly/2w5tk00 CSX 2017 Europe: http://bit.ly/2w5klvS

312 views • 2 years ago

VIDEO


LEARN HOW CSX 2017 WILL HELP YOU IMPROVE DEPARTMENTAL CYBER SECURITY

Learn more about the NIST Cybersecurity framework and cyber security’s impact on
your agency, role and career, and the public’s trust. Make plans now to join the
thought (and action) leaders in cyber security at CSX 2017: 2-4 October 2017 in
Washington, DC, USA; or 30 October–1 November 2017 in London, UK CSX 2017 North
America: http://bit.ly/2vMvW08 CSX 2017 Europe: http://bit.ly/2vLU9nn

529 views • 2 years ago

VIDEO


TICHAONA ZORORO | COBIT 5 FOUNDATION WORKSHOP AT AFRICA CACS 2017

Don’t miss out! Embrace fresh insights, tools, and solutions you can apply
immediately in your organisation at your choice of more than 30 track sessions
at Africa CACS 2017 in Accra, Ghana, 11-12 September 2017. Add to your expertise
and earn an additional 14 Continuing Professional Education (CPE) credits for a
conference total of 29 CPE—by starting your learning early. Join fellow
business, government and information systems audit, security, risk and
governance professionals for COBIT expert Tichaona Zororo’s invaluable
pre-conference workshop—COBIT 5 Foundation—starting Saturday, 9 September 2017.
Learn more about Africa CACS and register here: http://bit.ly/2uXyESQ

851 views • 2 years ago

VIDEO


INTERNAL CONTROL USING COBIT 5

Download your copy of the free corresponding whitepaper here:
http://bit.ly/2uTpS8s A free Internal and Mitigating Control Selection Worksheet
is also available under "Related Items" here: http://bit.ly/2uTpS8s Synopsis: In
any organization, uncertainty is everywhere. External factors such as industry
outlooks and consumer sentiment can have substantial impact on an organization’s
growth and strategy. Internal factors within the organization also arise, such
as IT security, ethics, and financial compliance. These external and internal
factors introduce risk to an organization’s ability to meet goals and
objectives. Every organization must establish processes that ensure risk is
managed. These policies are called ”internal controls.” Failing to mitigate
these risk factors may result in regulatory issues, ethical misconduct, or
security breaches—the consequences of which can be severe. Therefore, it is
vital to establish a properly managed control environment to create assurance
and confidence in the organization’s activities and outcomes. An effective way
to achieve that goal is to use the COBIT 5 framework for governance of
enterprise IT as an overarching framework for various standards, frameworks and
best practices being used in that control environment. At the enterprise level,
the separation of governance controls and internal controls in many
organizations may lead to miscommunication, inefficiency, and an inability to
effectively deliver value to stakeholders. Using the COBIT 5 governance
framework for internal controls can streamline and eliminate these
inefficiencies, by aligning controls with business objectives, and by creating a
cohesive methodology across the governance, risk, and compliance (GRC)
functions. This video explores this concept in detail. Learn more:
http://bit.ly/2uTpS8s

8K views • 2 years ago

VIDEO


CACS CONFERENCE CALL FOR SPEAKERS

Are you an industry expert, thought-leader or passionate professional willing to
share your experiences, insights, and knowledge with colleagues and peers? ISACA
is frequently accepting proposals for educational sessions at the globally
recognized CACS Conferences. Increase your visibility throughout the ISACA
international community by becoming an event speaker. ISACA issues Call for
Speakers for its education events, and a volunteer task force vets speakers
based on subject matter expertise and other criteria on this page. Learn more
and submit your proposal today: http://bit.ly/2uEM1qG.

343 views • 2 years ago

VIDEO


RYAN HOGARTH - AFRICA CACS 2017 OPENING KEYNOTE

Be enriched and inspired by the perspective-altering address of Ryan Hogarth at
ISACA’s prestigious Africa CACS 2017 Conference in Accra, Ghana, 11-12 September
2017. Kick off your two-days of knowledge growth with Ryan Hogarth’s opening
keynote address. The social business strategist, and author offers invaluable
insight on understanding what customers, prospects and other stakeholders are
doing with and expecting from the transforming digital landscape. Gain new
guidance on how to adapt and prepare your thinking to capitalize on the business
impacts of shifting technology. Register today: http://bit.ly/2tgblzq

442 views • 2 years ago

VIDEO


MARK THOMAS EXPLAINS HIS UPCOMING WORKSHOP AT CSX 2017 NORTH AMERICA CONFERENCE

Mark Thomas gives insight on what his upcoming workshop will be about at the CSX
2017 North America Conference. As part of the knowledge, tools and guidance
provided through the globally respected Cybersecurity Nexus (CSX) program, ISACA
has developed a guide and course: Implementing NIST Cybersecurity Framework
Using COBIT 5. This course presents deep insights on the Cybersecurity Framework
(CSF), its goals, implementation steps and the ability to apply this
information. The course is well-suited for individuals who have a basic
understanding of both COBIT 5 and security concepts, and who are involved in
improving the cyber security program for their enterprises. Students will learn
to understand the goals of the CSF and what it means to align to it, understand
the seven CSF implementation steps, and apply and evaluate the steps using COBIT
5. Register for CSX 2017 North America and/or workshops here:
http://bit.ly/2sMnBY8 Learn more about about this workshop and Mark Thomas here:
http://bit.ly/2sLC3Q9 Learn more about the overall CSX 2017 North America
Program here: http://bit.ly/2sMbMRH

510 views • 2 years ago

VIDEO


SPONSORSHIP OPPORTUNITIES

Connect with your target audience; 150,000 IS & IT Professionals in audit &
assurance, cybersecurity, governance & risk and control. Jeff McNaughton of
Vanguard Integrity Professionals and Chris Parkerson of Adobe talk about their
experiences sponsoring ISACA events. For more information on ISACA sponsorship
opportunities, visit our website: http://bit.ly/2sy1vsu

224 views • 2 years ago

VIDEO


NETWORK WITH OTHERS AT CSX 2017 ASIA PACIFIC

CSX 2017 Asia Pacific builds on the globally respected Cybersecurity Nexus™
(CSX) program. This immersive experience supports regional security
practitioners, managers and teams in enhancing how to identify, analyze and plan
for security breaches and cyber-attacks. You will do more than just listen to
speakers. You will collaborate with peers to help solve today’s issues and
better prepare for tomorrow’s challenges. http://bit.ly/2suxNo9

132 views • 2 years ago

VIDEO


ALI PABRAI INVITES YOU TO ENGAGE AT CSX 2017 CAIRO

Renowned cyber security and compliance expert Uday Ali Pabrai presents and
moderates a day of collaborative discussion about cyber security vulnerability
assessment at CSX 2017 Cairo. Ali is a member of Infragard, a public-private
partnership between U.S. businesses and the U.S. Federal Bureau of
Investigation. He also is chief executive of ecfirst, an Inc. Magazine 500
fastest-growing business. Register today and leave energized, better connected
with peers and with new knowledge on how to improve your organization’s cyber
security defenses. Sign up here: http://bit.ly/2stGUoR

287 views • 2 years ago

VIDEO


CRISC VIRTUAL EXAM PREP WITH MARK THOMAS

CRISC Exam Prep Course: 10-13 July 2017 | Online. Leverage the best of both
worlds—personal interaction with highly-qualified and experienced instructors,
and the convenience of online access to a virtual classroom. Grow your
knowledge, enhance your skills and advance your career with Virtual
Instructor-Led Training from ISACA. This easy-to-use web-based training connects
you from anywhere to lectures, demonstrations and hand-on instruction that will
develop your expertise in vital areas of information systems.
http://bit.ly/2sT7Z8s

1K views • 2 years ago

VIDEO


TED HARRINGTON EXPLAINS HIS UPCOMING WORKSHOP AT CSX 2017 NORTH AMERICA
CONFERENCE

In his seminal work The Art of War, Sun Tzu advocated that we must “know thy
enemy” in order to defeat that enemy. Utilizing a mixture of presentation and
group exercise modules, this workshop leverages that mantra, adopting the
attacker’s viewpoint in order to understand how to defend. Presented by the
elite group of security researchers and consultants widely known as the first
company to hack the iPhone, this session examines secure design principles,
attack anatomies, and real world case studies from a variety of industries.
Notably, this session extracts lessons from recently published security research
by the presenters, including the seminal whitepaper Hacking Hospitals, in which
it was investigated how hackers could cause patient harm or fatality. Attendees
can expect to be challenged to consider a new defense paradigm, and will leave
with actionable guidance that can be immediately implemented at their
organizations. Register now: http://bit.ly/2sTnldo

206 views • 2 years ago

VIDEO


EUROCACS 2017 RECAP

There were 45+ speakers, 50+ sessions, 4 workshops and endless networking
opportunities. See all of the fun that was had at EuroCACS 2017 in Munich,
Germany this this year. Sign up for EuroCACS 2018 in Edinburgh, Scotland here:
http://bit.ly/2sDF3kZ

744 views • 2 years ago

VIDEO


CSX NORTH AMERICA - NETWORKING TESTIMONIAL

After attending 2015 CSX North America, attendees give testimonials about their
experience. Click here to sign up for the 2016 conference in Las Vegas:
http://bit.ly/2clARuC

357K views • 2 years ago

VIDEO


CSX NORTH AMERICA - SESSIONS TESTIMONIAL

In this video, CSX North America 2015 attendees give testimonials about their
experience. Click here to sign up for the 2016 conference in Las Vegas:
http://bit.ly/2cTR8w8

90K views • 2 years ago

VIDEO


CSX EUROPE - NETWORKING TESTIMONIAL

After attending 2015 CSX Europe, attendees give testimonials about their
experience. Click here to sign up for the 2016 conference in London:
http://bit.ly/2clEYah

219K views • 2 years ago

VIDEO


CSX EUROPE - SESSIONS TESTIMONIAL

In this video, CSX Europe 2015 attendees give testimonials about their
experience. Click here to sign up for the 2016 conference in London:
http://bit.ly/2clFtkt

630K views • 2 years ago

VIDEO


OVERVIEW OF DIGITAL FORENSICS

When a cyber incident occurs, IT’s best practice is to respond with a set of
predetermined actions. Applying digital forensics to aid in the recovery and
investigation of material on digital media and networks is one of these actions.
Digital forensics is defined as the “process of identifying, preserving,
analyzing and presenting digital evidence in a manner that is legally acceptable
in any legal proceedings (i.e., a court of law).” To download the accompanying
whitepaper, click here: http://bit.ly/2rerSCZ. For a suite of cyber security
learning solutions for individuals and enterprises, check out Cybersecurity
Nexus (CSX) from ISACA: http://bit.ly/2sxqAXx

168K views • 2 years ago

VIDEO


ISACA OFFICIAL CISA ONLINE REVIEW COURSE

Get the CISA training you need here: http://bit.ly/2qZK17D. Prepare to obtain
the Certified Information Systems Auditor® (CISA) certification and be
recognized among the world’s most-qualified information systems professionals.
The CISA Online Review Course provides online, on-demand instruction and is
ideal for preparing you and fellow audit, assurance, control, security and cyber
security professionals for the CISA certification exam. The course covers all
five of the CISA domains, and each section corresponds directly to the CISA job
practice. It uses proven instructional design techniques, incorporating video,
narrated interactive eLearning modules, downloadable, interactive workbooks,
downloadable job aids, case study activities and pre- and-post-course
assessments. You will be able to navigate the course at your own pace following
a recommended structure or target preferred job practice areas. You may also
start and stop the course based on your preferred study schedule, picking up
exactly where you left off the next time you return. Trained by ISACA. Certified
by ISACA. Purchase here: http://bit.ly/2qZK17D

13K views • 2 years ago

VIDEO


AFRICA CACS 2017 OVERVIEW

Mark your calendars for 11-12 September 2017 and join us in Accra, Ghana! Don’t
miss the opportunity to earn up to 29 CPE hours and be a part of the top
conference for Audit and Security professionals. http://bit.ly/2pX2GAk

1K views • 2 years ago

VIDEO


NORTH AMERICA CACS 2017 HIGHLIGHTS

The North America CACS 2017 conference in Las Vegas just ended. Check out the
conference highlights and register for NACACS 2018 in Chicago here:
http://bit.ly/2pXnHO5

1K views • 2 years ago

VIDEO


2016 ANNUAL REPORT: A YEAR OF IMPACT, INNOVATION AND GROWTH

ISACA achieved many milestones in 2016 that allowed us to make substantial
progress in our programs and pursue several new opportunities for our global
community. The 2016 Annual Report highlights the year’s accomplishments, which
were made possible through the commitment and support of ISACA members,
volunteers and professional staff. See the full report here:
http://bit.ly/2prGVLF

693 views • 2 years ago

VIDEO


ISACA VOLUNTEER APPRECIATION

It's National Volunteer Appreciation Week and ISACA wants to thank all of our
dedicated volunteers. In a world where time is our most precious commodity, your
willingness to give back inspires us all, especially knowing that you do so
above and beyond your many other professional and personal responsibilities.
Read what ISACA CEO, Matt Loeb has to say about volunteers:
http://bit.ly/2oOb57W

813 views • 2 years ago

VIDEO


IT AUDIT LEADERS FORUM AT EUROCACS 2017

In an effort to provide IT Audit Leaders with a forum to discuss common needs
and solutions, ISACA is organizing an “invitation only” complimentary one-day
event held adjacent to ISACA’s 2017 EuroCACS. This one day forum offers an
unrivaled opportunity to expand your network, build onto your knowledge and
skills and to discuss common needs and solutions among peers. Learn more here:
http://bit.ly/2nHO3mn.

221 views • 2 years ago

VIDEO


EUROCACS 2017 OVERVIEW

Mark your calendar for 29 – 31 May 2017 and join us in Munich, Germany! Don’t
miss the opportunity to earn up to 32 CPE hours and be a part of the top
conference for IS audit and security professionals! http://bit.ly/2mzt0Pb

650 views • 2 years ago

VIDEO


NACACS 2017 WORKSHOP - COBIT 5 FOUNDATION

Learn the importance of an effective framework to enable business value during
the COBIT 5 Foundation workshop available at #NACACS 2017. Learn more here:
http://bit.ly/2no2iJn

131 views • 2 years ago

VIDEO


EARN 39 CPE HOURS AT NORTH AMERICA CACS 2017 CONFERENCE

Mark your calendar for 1 – 3 May 2017 and join us in Las Vegas, Nevada! Don’t
miss the opportunity to earn up to 39 CPE hours and be a part of the top
conference for IS audit and IT security professionals!In addition to the 39 CPE
hours for attending the North America CACS conference, take advantage of the
four pre-conference workshops and four post-conference workshops. To learn more:
http://bit.ly/2mGYyGc

118 views • 2 years ago

VIDEO


WHY I WORK AT ISACA

ISACA employees explain how they demonstrate ISACA's values and why they enjoy
working at ISACA. To learn more about open job positions at ISACA, click here:
http://bit.ly/2mOl8dc

638 views • 2 years ago

VIDEO


EUROCACS 2017 WORKSHOP - COBIT 5 FOUNDATION

EuroCACS 2017 in Munich has 1 and 2 day workshops available before the
conference. Click here to learn more and sign up for the COBIT 5 Foundation
workshop: http://bit.ly/2l0WKUp

496 views • 2 years ago

VIDEO


ISACA SPONSORSHIP OPPORTUNITIES - LLOYD'S REGISTER

Lloyd's Register explains why they sponsored ISACA's CSX Europe conference. To
learn more about how you can experience the power of partnership with ISACA,
visit our website: http://bit.ly/2kGRFji

236 views • 2 years ago

VIDEO


ISACA SPONSORSHIP OPPORTUNITIES - TURN KEY CONSULTING

Turn Key Consulting explains what made them decide to become a sponsor for
ISACA's CSX Europe conference. To learn more about how you can experience the
power of partnership with ISACA, visit our website: http://bit.ly/2kH4utT

330 views • 2 years ago

VIDEO


GET INVOLVED IN ISACA

People share what motivated them to volunteer for ISACA and the benefits they
have received from getting involved. Learn more about becoming a volunteer here:
http://bit.ly/2kyEoJo

1K views • 2 years ago

VIDEO


CSX NORTH AMERICA OVERALL EXPERIENCE TESTIMONIAL

2015 attendees give testimonials about their experience at CSX North America.
Don't miss out on the 2016 conference in Las Vegas. Sign up here:
http://bit.ly/2cTRu5S

187K views • 2 years ago

VIDEO


CSX EUROPE - OVERALL EXPERIENCE TESTIMONIAL

2015 attendees give testimonials about their experience at CSX Europe. Don't
miss out on the 2016 conference in London. Sign up here: http://bit.ly/2clEJfn

887K views • 2 years ago

VIDEO


CSX ASIA - OVERALL EXPERIENCE TESTIMONIAL

2015 attendees give testimonials about their experience at CSX Asia Pacific.
Don't miss out on the 2016 conference in Singapore. Sign up here:
http://bit.ly/2clFy7I

1M views • 2 years ago

VIDEO


CSX ASIA PACIFIC - SESSIONS TESTIMONIAL

In this video, CSX Asia Pacific 2015 attendees give testimonials about their
experience. Click here to sign up for the 2016 conference in Singapore:
http://bit.ly/2clFiFS

156K views • 2 years ago

VIDEO


6TH ANNUAL IT AUDIT BENCHMARKING SURVEY

ISACA, in partnership with Protiviti, has released the 6th Annual IT Audit
Benchmarking Survey results. View the full survey results, infographic, and more
at http://bit.ly/2l1mFer.

587 views • 2 years ago

VIDEO


WHY SHOULD YOU GET A CYBERSECURITY NEXUS PRACTITIONER CERTIFICATION (CSXP)?

Are you contemplating getting a Cybersecurity Nexus Practitioner Certification
(CSXP)? Watch this video to see what motivated Adam Khan to pursue it. Learn
more about the CSXP certification here: http://bit.ly/2k9ox5g

3K views • 2 years ago

VIDEO


CRISC CERTIFICATION HOLDERS EXPRESS WHAT MOTIVATED THEM TO GET CERTIFIED

Certified in Risk and Information Systems Control (CRISC) certification holders
discuss how what motivated them to pursue the CRISC. Learn more about the CRISC
certification here: http://bit.ly/2jHZWX9

25K views • 2 years ago

VIDEO


CSX ASIA - NETWORKING TESTIMONIAL

After attending 2015 CSX Asia Pacific, attendees give testimonials about their
experience. Click here to sign up for the 2016 conference in Singapore:
http://bit.ly/2clFAMK

1M views • 2 years ago

VIDEO


EUROCACS 2017 PROMO

Mark your calendar for 29–31 May 2017 and join us in Munich, Germany! Don’t miss
the opportunity to earn up to 32 CPE hours and be a part of the top conference
for Audit and Security professionals! http://bit.ly/2hb0YJO

400 views • 2 years ago

VIDEO


CHRISTOS K. DIMITRIADIS | OPENING REMARKS AT CSX ASIA PACIFIC CONFERENCE

Christos K. Dimitriadis, Ph.D., CISA, CISM, CRISC, is chair of ISACA’s Board of
Directors and group director of information security for INTRALOT, a
multinational supplier of integrated gaming and transaction processing systems.
Dimitriadis has built INTRALOT’s Global Information Security operations and is
responsible for the alignment of the Group’s security strategy with the business
needs. He also designed INTRALOT’s innovation program in 2013 and heads the
office of the CTO, managing business transformation.

580 views • 2 years ago

VIDEO


ISACA CGEIT CERTIFICATION HOLDERS EXPLAIN HOW THEY PUT CREDENTIALS TO USE

Individuals with Certified in the Governance of Enterprise IT (CGEIT)
classifications discuss the professional benefits of CGEIT.
http://bit.ly/2gh8pgK The uniquely governance-focused CGEIT certification
ensures holders are capable of bringing IT governance into an organization, can
grasp the complex subject holistically, and enhance the value that the
enterprise obtains from its IT solutions. Since its inception in 2007, thousands
of professionals around the world have earned the industry-leading CGEIT
designation as a means to affirm that they have the broad knowledge and the
wide-ranging experience necessary to support and advance the IT governance of an
enterprise; ensuring that business IT systems align with optimum effectiveness
and efficiency. Learn more about the CGEIT certification: http://bit.ly/2gh8pgK

16K views • 2 years ago

VIDEO


ISACA CISA CERTIFICATION HOLDERS DESCRIBE CAREER BENEFITS

Certified Information Systems Auditor (CISA) certification holders discuss the
professional benefits of earning and maintaining their CISA certification.
http://bit.ly/2gh4QHd For some business and government agencies, CISA
certifications have become a prerequisite for information systems and
information technology roles. CISA certifications are world-renowned as the
standard of achievement for those who assess an organization’s information
technology and business systems and provide assurance on their availability and
sustainability. Since its inception in 1978, more than 129,000 people have
become CISA certified to validate their expertise. Learn more about the CISA
certification: http://bit.ly/2gh4QHd

63K views • 2 years ago

VIDEO


CSX 2016 ASIA PACIFIC CONFERENCE HIGHLIGHTS INSIGHTS

Don't miss out on highlights and insights from the CSX 2016 Asia Pacific
Conference in Singapore! The inaugural conference brought together globally
respected experts and professionals at the Marina Bay Sands hotel to share
expertise and make new connections. Thank you to all the attendees, volunteers
and staff for making this event a success! http://bit.ly/2f7ZlLF

694 views • 2 years ago

VIDEO


CSX 2016 ASIA PACIFIC CONFERENCE SLIDESHOW

Check out the CSX 2016 Asia Pacific Conference Slideshow! Attendees at the
Marina Bay Sands hotel in Singapore took part in engaging keynote presentations,
high-impact break out sessions and more. Thank you to all the attendees,
volunteers and staff for making this event a success! http://bit.ly/2fZcft1

262 views • 2 years ago

VIDEO


ISACA’S IT RISK/REWARD BAROMETER: AUGMENTED REALITY

241 views • 2 years ago

VIDEO


CSX 2016 EUROPE CONFERENCE HIGHLIGHTS

See the highlights from CSX 2016 Europe Conference that was held in London.
Attendees took part in engaging keynote presentations. As well as high-impact
break out sessions that provided the unique opportunity to learn from top
experts in the field in this inaugural conference. Thank you to all the
attendees, volunteers and staff. http://bit.ly/2enygDQ

955 views • 2 years ago

VIDEO


CSX 2016 NORTH AMERICA CONFERENCE HIGHLIGHTS

Enjoy the very best of what CSX 2016 North America had to offer in this
highlight video. The attendees at the Cosmopolitan Hotel in Las Vegas, each
engaging keynote and session speaker, the interactive Cyber Challenge and more
made this history-making cyber event a resounding success! We cannot wait to see
everyone next year in Washington D.C.

1K views • 2 years ago

VIDEO


CSX 2016 NORTH AMERICA CONFERENCE PHOTO HIGHLIGHTS

Take a look at photos from the CSX 2016 North America conference . The attendees
at the Cosmopolitan Hotel in Las Vegas, each engaging keynote and session
speaker, the interactive Cyber Challenge and more made this history-making cyber
event a resounding success! We cannot wait to see everyone next year in
Washington D.C.

254 views • 2 years ago

VIDEO


CSX CONFERENCE TESTIMONIALS

Here is what last years attendees had to say about the inaugural CSX
Conferences. Click here to register for the 2016 conferences in Las Vegas,
London and Singapore: http://bit.ly/2cTUzmw

6K views • 2 years ago

VIDEO


LATIN CACS 2016 - PUERTO RICO

Latin CACS ofrece el chance de ampliar tus redes de contactos y profundizar
conocimientos/habilidades. Inscríbete en: http://bit.ly/2clzo7D

1K views • 2 years ago

VIDEO


HOW CAN AUDITORS USE COBIT 5 TO BENEFIT THE BUSINESS?

Shaun Kirby emphasizes COBIT’s value in allowing organizations to audit in line
with industry standards. For more information, visit http://bit.ly/2bgXa3Q.

2K views • 2 years ago

VIDEO


HOW DO YOU EXPLAIN COBIT TO YOUR DAD – OR YOUR CEO?

Mark Pardee says that COBIT helps convey complicated concepts in simple business
terms. For more information, visit http://bit.ly/2bgYlAc.

3K views • 2 years ago

VIDEO


HOW DOES COBIT 5 HELP WITH KNOWLEDGE MANAGEMENT AND INNOVATION?

Marjorie Hechavarria explains how COBIT helps organizations work across
departments to achieve business goals. For more information, visit
http://bit.ly/2bfVNYE.

1K views • 2 years ago

VIDEO


WHY SWITCH TO COBIT 5?

James Lloyd addresses the benefits of switching to COBIT 5 from previous
versions. For more information, visit http://bit.ly/2bfDjaW.

812 views • 2 years ago

VIDEO


HOW CAN YOU CUSTOMIZE COBIT?

Gwen Clopton lauds COBIT for its flexibility. For more information, visit
http://bit.ly/2bfCq20.

485 views • 2 years ago

VIDEO


HOW CAN COBIT 5 PROVIDE A COMMON LANGUAGE FOR BUSINESS AND IT?

Bernard K. Akowuah describes how COBIT 5 helps business and IT better understand
one another. For more information, visit http://bit.ly/2bftMR4.

1K views • 2 years ago

VIDEO


ISACA NORTH AMERICA CACS 2016 HIGHLIGHTS

ISACA North America CACS 2016 Highlights - See a recap of the NACACS event in
New Orleans, LA.

1K views • 2 years ago

VIDEO


CHRISTOS DIMITRIADIS INVITES YOU TO AFRICACACS

ISACA Board of Directors Chair, Christos Dimitriadis, invites you to the
inaugural AfricaCACS conference in Nairobi, Kenya 8-9 August. Sign up today!
http://bit.ly/2aoswu4

361 views • 2 years ago

VIDEO


INTRODUCTION TO COBIT VIDEO SERIES

This self-paced video series offers an easy and convenient way for employees,
practitioners, managers and executives to learn about the basics of COBIT 5 and
the value of governance of enterprise IT (GEIT). Click here for full series:
http://bit.ly/2aoyUS4 The videos provide a baseline of knowledge for COBIT and
governance programs. If a lack of COBIT training resources is a problem in your
geographical region, this on demand video series can help fill that need. Sign
up and watch on your schedule. Enterprise/group learning packages are also
available.

35K views • 2 years ago

VIDEO


ISACA 2015 ANNUAL REPORT

The 2015 Annual Report spotlights ISACA’s accomplishments last year and
emphasizes that we can achieve great things. #WeAreOne

605 views • 2 years ago

VIDEO


ISACA EUROCACS 2016

ISACA EuroCACS 2016 Conference - Dublin, Ireland

2K views • 2 years ago

VIDEO


SIMON T. BAILEY - NORTH AMERICA CACS 2016

Don't miss your chance to see Keynote Speaker, Simon T. Bailey, at ISACA's North
America CACS Conference on May 4, 2016. Register now: http://bit.ly/21RcsPO

729 views • 2 years ago

VIDEO


NORTH AMERICA COBIT CONFERENCE - PROMO

Register for North America COBIT Conference today!

132 views • 2 years ago

VIDEO


NORTH AMERICA CACS 2016 - PROMO

Register for North America CACS today!

248 views • 2 years ago

VIDEO


SIMON T. BAILEY PROMOTES NORTH AMERICA CACS 2016

Register for the North America CACS 2016 Conference to see keynote speaker Simon
T. Bailey http://bit.ly/1T4cDaA

923 views • 2 years ago

VIDEO


EUROCACS CONFERENCE 2015 - SUPER SPY ME EVENT

ISACA's 2015 EuroCACS conference was in Copenhagen, Denmark. The special event,
Super Spy Me, was a hit with attendees.

682 views • 2 years ago

VIDEO


CYBERSECURITY NEXUS (CSX) TRAINING & CERTIFICATIONS

ISACA International President Christos Dimitriadis discusses new cybersecurity
career resources.

2K views • 2 years ago

VIDEO


CSX 2015: ISACA'S INAUGURAL CYBER SECURITY CONFERENCE

ISACA International President Christos Dimitriadis Invites You to CSX North
America 2015.

663 views • 2 years ago

VIDEO


ISACA OVERVIEW

6K views • 2 years ago

VIDEO


2014 ISACA ANNUAL REPORT OVERVIEW

ISACA marked a milestone year in 2014 by reaching its 45th anniversary. While we
are extremely proud of our history and accomplishments, we took this notable
year as an opportunity to look forward and position our organization for future
growth. We live in a world where change is an everyday event. We need to adapt,
innovate, lead with vision and create an impact. And most important, we need to
assure trust in everything we do and in every tool and piece of knowledge we
create. Take a look back at 2014.

505 views • 2 years ago

VIDEO


RESOURCES FOR PRIVACY PROFESSIONALS

Learn more about the resources available from ISACA to help privacy
professionals.

153 views • 2 years ago

VIDEO


COBIT 5, THE EDGE YOU HAVE BEEN WAITING FOR

440 views • 2 years ago

VIDEO


NORTH AMERICA CACS 2015 | HIGHLIGHTS

ISACA members, IS audit, assurance, security and risk management and governance
professionals came together for North America CACS 2015. See video highlights
from the conference.

215 views • 2 years ago

VIDEO


JOIN US FOR COBIT CONFERENCE IN MARCH 2015

IT audit, assurance, security and risk management and governance professionals
join together to expand networks and build onto their COBIT knowledge and
skills. Join them in March 2015 in Orlando, Florida.

139 views • 2 years ago

VIDEO


UPDATE FROM ISACA’S CYBERSECURITY NEXUS (CSX)

ISACA International President Robert Stroud shares a cybersecurity update from
ISACA’s Cybersecurity Nexus (CSX).

1K views • 2 years ago

VIDEO


ISACA'S 2014 IT RISK/REWARD BAROMETER

ISACA International President Robert Stroud shares global survey findings on the
Internet of Things, wearable tech in the workplace, and other key business/IT
trends.

353 views • 2 years ago

VIDEO


CYBERSECURITY AWARENESS MONTH

Robert E Stroud, CGEIT, CRISC, 2014-2015 ISACA International President talks
about cybersecurity awareness month.

639 views • 2 years ago

VIDEO


COBIT 5 BENEFITS

Robert E Stroud, CGEIT, CRISC, 2014-2015 ISACA International President talks
about the benefits of COBIT 5.

628 views • 2 years ago

VIDEO


COBIT ONLINE BENEFITS

Robert E Stroud, CGEIT, CRISC, 2014-2015 ISACA International President talks
about COBIT 5 online - a brand new way to access and use the COBIT guidance.

310 views • 2 years ago

VIDEO


ISACA 2014 EUROCACS/ISRM CONFERENCE

Robert E Stroud, CGEIT, CRISC, 2014-2015 ISACA International President, invites
you to the ISACA 2014 EuroCACS ISRM Conference.

188 views • 2 years ago

VIDEO


BHAVESH BHAGAT: COMMUNICATING TECH TRENDS TO BOARDS

Bhavesh Bhagat, CEO/founder of Confident Governance and member of ISACA's
Emerging Business and Technology Committee, discusses how critical it is to
communicate to boards about emerging trends and technologies that can benefit
enterprises.

319 views • 2 years ago

VIDEO


INTRODUCING: COBIT 5 ONLINE

COBIT 5 online makes COBIT even more practical and easier to use, and provides
industry and COBIT news and insights. While the full capabilities of COBIT
online will be released in August (including customizable goals cascade and RACI
tools), today's version immediately simplifies the process of navigating,
searching and exporting the principles, practices, analytical tools and models
that make COBIT 5 a key resource for the governance and management of enterprise
IT. Learn more and begin using COBIT online here: http://ow.ly/wQkuR

1K views • 2 years ago

VIDEO


LOOKING BACK AT ISACA'S NORTH AMERICA CACS 2014 CONFERENCE

More than 90 presenters and 1,000 attendees gathered in Las Vegas for ISACA's
2014 North America CACS Conference last month. Topics ranging from BYOD and
audit analytics to career management and cybersecurity guidance helped attendees
prepare for the latest issues affecting our field. During the conference, ISACA
launched its new Cybersecurity Nexus program and previewed the upcoming online
version of COBIT 5. ISACA's Young Professionals were given VIP treatment at a
Spazmatics concert at the House of Blues, and photographers snapped free
headshots so attendees could update their ISACA and social media profile
pictures. Keynotes Harry Markopolos (Bernie Madoff whistle-blower) and Mike
Mullane (NASA shuttle astronaut) provided attendees with key insights on fraud
prevention and leadership. "To me, North America CACS is one of the best
conferences available," surmised Ferry Harris. "The energy level is high and
throughout three days I learned a great deal from experts and by networking with
other participants."

430 views • 2 years ago

VIDEO


INTRODUCING: CYBERSECURITY NEXUS

In enterprise IT, there is a single point where everything that matters in
information, technology and business converges: Cybersecurity Nexus (CSX), a new
security knowledge platform and professional program from ISACA. CSX is helping
shape the future of cybersecurity through cutting-edge thought leadership, as
well as training and certification programs for the professionals who are
leading it there. Building on the strength of ISACA's globally-recognized
expertise, it gives cybersecurity professionals a smarter way to keep
organizations and their information more secure. With CSX, business leaders and
cyber professionals can obtain the knowledge, tools, guidance and connections to
be at the forefront of a vital and rapidly changing industry. Because
Cybersecurity Nexus is at the center of everything that's coming next.
http://www.isaca.org/cyber

29K views • 2 years ago

VIDEO


CYBERSECURITY NEXUS GROUP PHOTO TIMELAPSE

Want to see how ISACA captured that CSX group photo? Take a look...

468 views • 2 years ago

VIDEO


ISACA SLOVENSKO CHAPTER ANNIVERSARY MESSAGE

ISACA Slovensko Chapter President Peter Borak shares his thoughts on the 15th
anniversary of the group. Congratulations on this milestone, Slovensko!

201 views • 2 years ago

VIDEO


THE BENEFITS OF CRISC: TROY STAIRWALT

Troy Stairwalt explains why he obtained ISACA's CRISC certification and details
the benefits he receives from it.

1K views • 2 years ago

VIDEO


WHY DO YOU USE ISACA'S KNOWLEDGE CENTER?

ISACA members explain why they use the Knowledge Center.

225 views • 2 years ago

VIDEO


TICHAONA ZORORO ON THE VALUE OF ISACA MEMBERSHIP

ISACA volunteer Tichaona Zororo describes the benefits he receives as an
association member.

1K views • 2 years ago

VIDEO


CAPTAIN RICHARD PHILLIPS AT ISACA'S ISRM

Captain Phillips previews his presentation at ISACA's North America ISRM
Conference.

137 views • 2 years ago

VIDEO


JACK CALLAGHAN ON BIG DATA AT ISACA'S NORTH AMERICA ISRM CONFERENCE

Live from ISACA's North America ISRM Conference, Jack Callaghan provides a
preview of his presentation.

125 views • 2 years ago

VIDEO


RENEE MURPHY PREVIEWS NA ISRM PRESENTATION

252 views • 2 years ago

VIDEO


BHAVESH BHAGAT ON EMERGING TECHNOLOGIES

Confident Governance Founder/CEO Bhavesh Bagat, a member of ISACA's Emerging
Business and Technology Committee, discusses emerging technologies,

265 views • 2 years ago

VIDEO


ISACA EUROCACS/ISRM 2013 CONFERENCE REVIEW

Take a look back at ISACA's EuroCACS/ISRM 2013 conference in London, England.
Then view the invite to EuroCACS/ISRM 2014 in Barcelona, Spain.

268 views • 2 years ago

VIDEO


ISACA/THE IIA'S GOVERNANCE, RISK AND CONTROL CONFERENCE 2013 RECAP

Take a look back at the Governance, Risk and Control 2013 conference, cohosted
by ISACA and The IIA in Phoenix, Arizona.

211 views • 2 years ago

VIDEO


ISACA'S COBIT AND CISA IN THE MAURITIUS GOVERNMENT

ISACA Mauritius Chapter President Kris Seeburn explains how his government is
using COBIT and CISA.

719 views • 2 years ago

VIDEO


EDDIE SCHWARTZ INVITES YOU TO ISACA'S NORTH AMERICA ISRM

Eddie Schwartz, chief information security officer for RSA, will deliver the
opening keynote address at ISACA's North America Information Security and Risk
Management conference this November in Las Vegas. Here, he invites you to join
him.

215 views • 2 years ago

VIDEO


INVITATION TO 2013 GOVERNANCE, RISK AND CONTROL CONFERENCE

Nelson Gibbs invites you to join him at the 2013 Governance, Risk and Control
2013 conference in Phoenix, Arizona, co-hosted by ISACA and The IIA.

134 views • 2 years ago

VIDEO


PREVIEW: COBIT 5 FOR RISK

Elza Adams describes his work with COBIT 5 for Risk and previews the framework.

1K views • 2 years ago

VIDEO


INSIGHTS 2013 SLIDESHOW

INSIGHTS 2013 was a great success. Here, we take a look back.

170 views • 2 years ago

VIDEO


ISACA STUDENT ACADEMIC SUBCOMMITTEE

Dr. Hubert Glover, ISACA Student Academic Subcommittee chair, details the
group's mission to welcome more students to the association.

205 views • 2 years ago

VIDEO


LIVE FROM INSIGHTS 2013

ISACA volunteer and CA Technologies Vice President Robert Stroud shares
highlights of ISACA's INSIGHTS 2013 conference in Berlin.

101 views • 2 years ago

VIDEO


ISACA'S NORTH AMERICA CACS 2013 SLIDESHOW

ISACA's North America CACS 2013 conference in Dallas, Texas was a great success.
Here we take a look back in pictures. To learn more about all of ISACA's
conferences, visit www.isaca.org.

311 views • 2 years ago

VIDEO


WE ARE ISACA

For more than 40 years, ISACA has been a pace-setting global organization for
information governance, control, security and audit professionals. View this
video to get to know ISACA and visit us at www.isaca.org.

10K views • 2 years ago

VIDEO


NORTH AMERICA CACS 2013 RECAP

ISACA's North America CACS 2013 conference welcomed more than 750 professionals
for three days of inspiration, education, networking and some Texas-sized fun.
Take a look...

316 views • 2 years ago

VIDEO


NORTH AMERICA CACS TESTIMONIAL

Nelson Gibbs provides a highlight of today's sessions at ISACA's North America
CACS conference.

73 views • 2 years ago

VIDEO


FROM INSIGHTS 2012, ROB STROUD LOOKS AHEAD TO INSIGHTS 2013

While in San Francisco during ISACA's INSIGHTS 2012 conference, Rob Stroud
looked ahead to INSIGHTS 2013, taking place this June in Berlin, Germany. Learn
more about INSIGHTS 2013 here:
http://www.isaca.org/Education/Conferences/Pages/INSIGHTS-2013.aspx

186 views • 2 years ago

VIDEO


IT CHALLENGES AND OPPORTUNITIES IN 2013

At a recent ISACA conference, we asked attendees about the key business/tech
issues, challenges and opportunities facing them in 2013. Take a look.
www.isaca.org

502 views • 2 years ago

VIDEO


LOOKING BACK AT ISRM, LOOKING AHEAD TO NORTH AMERICA CACS

Take a look back at ISACA's ISRM/IT GRC conference, held in Las Vegas, Nevada in
November. And consider joining ISACA at North America CACS, this April in
Dallas, Texas. http://ht.ly/gRTrB

261 views • 2 years ago

VIDEO


ISACA AND ENISA DISCUSS SECURITY CHALLENGES AND OPPORTUNITIES

286 views • 2 years ago

VIDEO


THE VALUE OF SMART IT GOVERNANCE

1K views • 2 years ago

VIDEO


ISACA MEMBERSHIP

With 100,000+ constituents in 180 countries, ISACA is internationally recognized
as a high-performing nonprofit, independent membership association, that
addresses global, national and local information systems and business issues
related to IT Governance, IT Audit, IT Security and IT Risk.

4K views • 2 years ago

VIDEO


CRISC IS THE CERTIFICATION FOR RISK PROFESSIONALS

CRISC is the only certification that prepares and enables IT professionals for
the unique challenges of IT and enterprise risk management, and positions them
to become strategic partners to the enterprise.

42K views • 2 years ago

VIDEO


EL VICEPRESIDENTE DE ISACA LE INVITA A LA CONFERENCIA CACS/ISRM 2012 EN
LATINOAMÉRICA

Luis Carselle, Vicepresidente de ISACA, le invita a la Conferencia CACS/ISRM
2012 en Latinoamérica.

381 views • 2 years ago

VIDEO


CISM SECURITY MANAGEMENT CERTIFICATION OPENS DOORS

Garry Barnes, managing consultant at stratsec, discusses how the CISM
certification helps open doors to gain new career and business opportunities.

2K views • 2 years ago

VIDEO


CRISC: POSITIONING RISK AND CONTROL PROFESSIONALS FOR GROWTH

Shawna Flanders, Productivity Specialist at PSCU Financial Services, discusses
how the CRISC certification from ISACA can help Risk and Control professionals
advance their careers.

1K views • 2 years ago

VIDEO


INTRODUCING COBIT 5

IT is complicated. IT Governance doesn't have to be. COBIT 5 for Business
Management and Governance of Enterprise IT.

211K views • 2 years ago

VIDEO


COBIT 5 - GOVERN AND MANAGE ENTERPRISE IT

ISACA International President Ken Vander Wal discusses the 5 Principles of COBIT
5 and how the framework helps Govern and Manage Enterprise IT.

9K views • 2 years ago

VIDEO


ISACA CHINA HONG KONG CHAPTER CELEBRATES 30 YEARS

ISACA International President, Ken Vander Wal, congratulates the ISACA China
Hong Kong Chapter on its 30 year anniversary.

159 views • 2 years ago

VIDEO


THE BUSINESS BENEFITS OF COBIT 5

Derek Oliver, Member of the ISACA Framework Committee and Director at Ravenswood
Consultants UK, discusses the business benefits of using COBIT 5.

1K views • 2 years ago

VIDEO


U.S. EMPLOYEES REVEAL SECURITY CONCERNS OVER ONLINE SHOPPING HABITS

Ken Vander Wal, ISACA International President, discloses security concerns from
U.S. employees over online shopping habits uncovered in the 2011 ISACA Shopping
on the Job Survey.

193 views • 2 years ago

VIDEO


INSIGHTS FROM ISACA'S RISK REWARD BAROMETER

Brian Barnier, Principal of ValueBridge Advisors discusses the insights from
ISACA's Risk Reward Barometer.

199 views • 2 years ago

VIDEO


COBIT 5: AN INTRODUCTION

John Lainhart, Partner IBM Global Business Solutions and Co-chair ISACA's COBIT
5 Task Force, discusses the upcoming release of COBIT 5.

5K views • 2 years ago

VIDEO


GET INVOLVED

Todd Weinman, President of The Weinman Group, discusses how his involvement with
ISACA has benefitted both his professional career and personal life.

219 views • 2 years ago

VIDEO


THREE REASONS TO VOLUNTEER FOR ISACA

Matt Snider, Manager IT Assurance Services, discusses the benefits he received
by volunteering for ISACA.

271 views • 2 years ago

VIDEO


THE VALUE OF BMIS

Ramses Gallego, General Manager of Entel Security and Risk Management at Entel
IT Consulting discusses the value of the BMIS framework. The Business Model for
Information Security is a framework available from ISACA.

1K views • 2 years ago

VIDEO


THE VALUE OF ISACA NETWORKING

ISACA members discuss the value of networking with other members and IT
professionals both locally and around the world.

147 views • 2 years ago

VIDEO


THE VALUE OF ISACA CREDENTIALS

ISACA certification holders discuss the value of CISA, CISM, CGEIT and CRISC
certifications.

1K views • 2 years ago

VIDEO


THE VALUE OF CRISC

Bruce Wilkins, CEO and President of TWM Associates Inc., talks about the value
of the CRISC certification.

1K views • 2 years ago

VIDEO


IT KNOWLEDGE CENTER

Marc Vael discusses the value of the ISACA Knowledge Center, which offers
forums, discussions, blogs, research and white papers for IT Professionals in
the fields of IT Governance, IT Auditing, IT Security and IT Risk.

273 views • 2 years ago

VIDEO


MOBILE DEVICE RISKS AND BENEFITS

Mark Lobel, Partner at PricewaterhouseCoopers, discusses the Risks and Benefits
of Mobile Devices and what companies can do to educate their employees about
internet safety.

346 views • 2 years ago

VIDEO


ONLINE SHOPPING RISKS

John Pironti, President of IP Architects, discusses Online Shopping Risks and
what measures companies can take to educate their employees on internet safety.

892 views • 2 years ago

VIDEO


IT PROFESSIONAL DEVELOPMENT

ISACA provides professional development to IT professionals engaged in IT audit,
security, governance and risk.

283 views • 2 years ago

VIDEO


IT COMMUNITY AND LEADERSHIP

ISACA provides a community and leadership for IT professionals engaged in IT
audit, security, governance, assurance and risk.

166 views • 2 years ago

VIDEO


IT RESEARCH AND KNOWLEDGE

ISACA provides IT research and knowledge related to IT audit, security,
governance and risk.

476 views • 2 years ago

VIDEO


CONNECT BUSINESS PROCESSES TO IT GOVERNANCE FOR BETTER SERVICE DELIVERY

249 views • 2 years ago

VIDEO


I AM A CISM - CERTIFIED INFORMATION SECURITY MANAGER

Testimonials on the benefits of being a CISM. Certified Information Security
Manager.

5K views • 2 years ago

VIDEO


I AM A CGEIT - CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT

Testimonials on the benefits of being a CGEIT. Certified in the Governance of
Enterprise IT.

4K views • 2 years ago

VIDEO


ISACA CPE - IT CONTINUING PROFESSIONAL EDUCATION

ISACA offers Continuing Professional Education credits for CISA, CISM, CGEIT and
CRISC certifications.

806 views • 2 years ago

VIDEO


I AM A CISA - CERTIFIED INFORMATION SYSTEMS AUDITOR

Testimonials on the benefits of being a CISA. Certified Information Systems
Auditor.

12K views • 2 years ago

VIDEO


2020 ISACA CHAPTER AWARDS PRESENTATION AT VIRTUAL GLS

Congratulations to the 2020 recipients of ISACA’s Chapter Awards! Learn more
about their accomplishments and watch the acceptance speeches in this recorded
awards presentation from the 2020 Global Leadership Summit. Outstanding Chapter
Leader Award: Cai Walters (Small Chapter), Peter Morin (Medium Chapter), and
Daniela Susanna Gschwend (Very Large Chapter) Innovative Chapter Program Award:
China Hong Kong Chapter (Very Large Chapter), Vancouver Chapter (Large Chapter),
and Amman Chapter (Medium Chapter) K. Wayne Snipes Best Chapter Award: Chicago
Chapter (Very Large Chapter), Middle Tennessee Chapter (Large Chapter),
Tallahassee Chapter (Medium Chapter), and Coimbatore Chapter (Small Chapter)
ISACA Chair’s Award: ISACA’s members, chapters, chapter leaders, and volunteers
Learn more at www.isaca.org/awards.

380 views • 2 years ago

VIDEO


2020 ISACA INNOVATIVE CHAPTER PROGRAM AWARDS

Congratulations to the 2020 recipients of the Innovative Chapter Program Award:
China Hong Kong Chapter (Very Large Chapter), Vancouver Chapter (Large Chapter),
and Amman Chapter (Medium Chapter). Learn more at www.isaca.org/awards.

297 views • 2 years ago

VIDEO


2020 ISACA OUTSTANDING CHAPTER LEADER AWARD

Congratulations to the 2020 recipients of the Outstanding Chapter Leader Award:
Cai Walters (Small Chapter), Peter Morin (Medium Chapter), and Daniela Susanna
Gschwend (Very Large Chapter). Learn more at www.isaca.org/awards.

344 views • 2 years ago

VIDEO


NAVIGATING THE CHALLENGES OF A PANDEMIC

ISACA CEO David Samuelson discusses how flexibility and new approaches allowed
ISACA to work through the challenges presented by the pandemic in 2020. Find out
more by downloading ISACA’s 2020 Annual Report at www.isaca.org/annual-report.

265 views • 2 years ago

VIDEO


#IAMISACA - DAVID SAMUELSON

773 views • 2 years ago

VIDEO


#IAMISACA: JAMES PAUL KAKEMBO

James Paul Kakembo talks about how emerging tech is changing the landscape of
his career in Uganda. For more #IamISACA stories, visit www.isaca.org/iamisaca.

242 views • 2 years ago

VIDEO


IAMISACA: RAVAKA RAKOTOZAFY

ISACA Quebec City Chapter member Ravaka Rakotozafy shares her #IamISACA story
about gaining early momentum in her career after relocating from Madagascar to
Canada. Don't forget to check out https://www.isaca.org/ for more information!

226 views • 2 years ago

VIDEO


IAMISACA: RAVAKA RAKOTOZAFY - SHORT VERSION

ISACA Quebec City Chapter member Ravaka Rakotozafy shares her #IamISACA story
about gaining early momentum in her career after relocating from Madagascar to
Canada. Don't forget to check out https://www.isaca.org/ for more information!

170 views • 2 years ago

VIDEO


WE ARE ISACA

ISACA members from around the world weigh in on why the association matters and
the impact it has had—from certifications and career advancement, to enterprise
training, tools and transformation. Don't forget to check out
https://www.isaca.org/ for more information!

695 views • 2 years ago

VIDEO


INTRODUCING ISACA'S STRATEGIC PLAN

ISACA CEO David Samuelson and ISACA Board Chair Greg Touhill share insights on
ISACA's new strategic plan, including digital trust, global impact, and reaching
early-career professionals.

688 views • 2 years ago

VIDEO


ISACA JOURNAL TURNS 50!

Two long-time ISACA Journal contributors, Michael Cangemi and Steven Ross, will
talk about the evolution of the industry--from what the pressing topics were
back when they started contributing to the Journal to the hot topics of today.
For more information, please check out -
https://www.isaca.org/resources/isaca-journal

180 views • 2 years ago

VIDEO


ISACA LIVE: CRITICAL INFRASTRUCTURE SECURITY

ISACA's Chris Dimitriadis and the US GAO's Nick Marinos discuss the current
state of critical infrastructure security, escalating threats and how to better
prepare. For more information check out www.isaca.org/heightened-threats
Subscribe for more ISACA content!

599 views • 2 years ago

VIDEO


ISACA LIVE: EMERGING TECH - CLOUD (SHORT VERSION)

Is cloud still considered an emerging technology in 2021? Will tablets replace
laptops in the remote office workforce and is cloud changing zero trust? ISACA’s
Dustin Brewer asks Julia Hermann (Head of Security Architecture and Cyber
Defense at Giesecke + Devrient) these questions and more in this episode of
ISACA Live! Don't forget to check out
https://www.isaca.org/resources/news-and-trends/isaca-podcast-library for more
information

115 views • 2 years ago

VIDEO


ISACA LIVE: EMERGING TECH - CLOUD

Why is the cloud still considered an emerging technology in 2021? Why is the
cloud both an enabler and catalyst for all other technologies? How has the cloud
changed our organizational eco-systems? What is the future of cloud services?
Join ISACA’s Chief Futurist, Dustin Brewer as he and Julia Hermann— Head of
Security Architecture and Cyber Defense at Giesecke + Devrient answer these
questions and more regarding our oldest emerging technology, the cloud! Don't
forget to check out
https://www.isaca.org/resources/news-and-trends/isaca-podcast-library for more
information!

228 views • 2 years ago

VIDEO


ISACA LIVE EMERGING TECH SESSION - AI

In our second LinkedIn Live stream on Emerging Tech, Dustin Brewer, Senior
Director of Emerging Technology and Innovation at ISACA, and guest, Frank Downs,
Senior Director of Proactive Series at BlueVoyant, discuss the ins and outs of
Artificial Intelligence including why it’s considered emerging technology, how
it’s used in cybersecurity and IT audit, the many different forms of AI
cyberattacks, and more. Check out the highlights here! Don't forget to check out
https://www.isaca.org/credentialing/cet/artificial-intelligence-fundamentals-certificate
for more information!

285 views • 2 years ago

VIDEO


ISACA LIVE: GLOBAL STRATEGY

Join ISACA’s CEO David Samuelson as he discusses ISACA’s Global Strategy with
ISACA’s Chief Global Strategy officer Chris Dimitriadis. Chris shares his career
path to ISACA, industry trends, advice to the next generation and how ISACA will
continue to innovate in the future! Don't forget to check out
https://www.isaca.org/ for more information!

224 views • 2 years ago

VIDEO


ISACA LIVE: RISK SCENARIOS

Paul Philips and Lisa Young will discuss how risk scenarios help decision-makers
understand how certain events can impact organizational strategy and objectives.
Good risk scenario building is a skill and can take some time to truly master.
Paul and Lisa will provide actionable advice on building the best possible
scenarios to help your organization better manage risk For more information
check out https://www.isaca.org/resources/it-risk

1K views • 2 years ago

VIDEO


ISACA LIVE: STATE OF CYBERSECURITY PT. 2

In honor of Cybersecurity month, ISACA’s Director of Communications, Kristen
Kessinger, and Information Security Practices Lead, Jon Brandt, discuss the
findings of this year’s ISACA State of Cybersecurity research study and what
they may mean for you as both members and leaders of your IT organization. Don't
forget to check out
https://www.isaca.org/resources/infographics/state-of-cybersecurity-2021-part-2
for more information

155 views • 2 years ago

VIDEO


ISACA LIVE: THE PRIVACY LANDSCAPE IN 2022

On Data Privacy Day, join ISACA's Safia Kazi and the "Privacy Professor,"
Rebecca Herold, as they discuss data privacy priorities for 2022, including:
Addressing Continuing Challenges from the Privacy Past, including fax and email
breaches Addressing Challenges from the Privacy Present, including IoT risk and
remote work risk Addressing Privacy Challenges Yet to Come, including AI/ML and
cryptocurrency For more information, be sure to check out:
https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2021/three-key-priorities-for-privacy-practitioners-in-2022

178 views • 2 years ago

VIDEO


ISACA LIVE: ULTRA EMERGING TECH (FULL VERSION)

Join ISACA's Kevin Keh, and guest, Ramses Gallego [ISACA Emerging Tech Committee
Member], in the latest session of our ISACA Live series on Emerging Technology
as they discuss four of the most prominent forms of ultra-emerging technologies
including Quantum Computing, Nanotechnology, Internet of Behavior (IoB) and
XR/VR. For each technology, they’ll dive deep into what the technology is, why
it’s considered emerging and ultimately, why it’s something your organization
should keep an eye on as it continues to evolve. Happy viewing! Don't forget to
check out ISACA’s Certified in Emerging Technology Certification:
https://www.isaca.org/credentialing/cet for more information

346 views • 2 years ago

VIDEO


ISACA LIVE: ULTRA EMERGING TECH PART I–WHAT IS QUANTUM COMPUTING?

Join ISACA's Kevin Keh, and guest, Ramses Gallego [ISACA Emerging Tech Committee
Member], in the latest session of our ISACA Live series on Emerging Technology
as they discuss four of the most prominent forms of ultra-emerging technologies
including Quantum Computing, Nanotechnology, Internet of Behavior (IoB) and
XR/VR. For each technology, they’ll dive deep into what the technology is, why
it’s considered emerging and ultimately, why it’s something your organization
should keep an eye on as it continues to evolve. Happy viewing! Don't forget to
check out ISACA’s Certified in Emerging Technology Certification:
https://www.isaca.org/credentialing/cet for more information

59 views • 2 years ago

VIDEO


ISACA LIVE: ULTRA EMERGING TECH PART II–WHY SHOULD QUANTUM COMPUTING MATTER TO
OUR VIEWERS?

Join ISACA's Kevin Keh, and guest, Ramses Gallego [ISACA Emerging Tech Committee
Member], in the latest session of our ISACA Live series on Emerging Technology
as they discuss four of the most prominent forms of ultra-emerging technologies
including Quantum Computing, Nanotechnology, Internet of Behavior (IoB) and
XR/VR. For each technology, they’ll dive deep into what the technology is, why
it’s considered emerging and ultimately, why it’s something your organization
should keep an eye on as it continues to evolve. Happy viewing! Don't forget to
check out ISACA’s Certified in Emerging Technology Certification:
https://www.isaca.org/credentialing/cet for more information

35 views • 2 years ago

VIDEO


ISACA LIVE: ULTRA EMERGING TECH PART III–WHAT IS NANO-TECHNOLOGY?

Join ISACA's Kevin Keh, and guest, Ramses Gallego [ISACA Emerging Tech Committee
Member], in the latest session of our ISACA Live series on Emerging Technology
as they discuss four of the most prominent forms of ultra-emerging technologies
including Quantum Computing, Nanotechnology, Internet of Behavior (IoB) and
XR/VR. For each technology, they’ll dive deep into what the technology is, why
it’s considered emerging and ultimately, why it’s something your organization
should keep an eye on as it continues to evolve. Happy viewing! Don't forget to
check out ISACA’s Certified in Emerging Technology Certification:
https://www.isaca.org/credentialing/cet for more information

33 views • 2 years ago

VIDEO


ISACA LIVE: ULTRA EMERGING TECH PART IV–WHY SHOULD NANO-TECHNOLOGY MATTER TO OUR
VIEWERS?

Join ISACA's Kevin Keh, and guest, Ramses Gallego [ISACA Emerging Tech Committee
Member], in the latest session of our ISACA Live series on Emerging Technology
as they discuss four of the most prominent forms of ultra-emerging technologies
including Quantum Computing, Nanotechnology, Internet of Behavior (IoB) and
XR/VR. For each technology, they’ll dive deep into what the technology is, why
it’s considered emerging and ultimately, why it’s something your organization
should keep an eye on as it continues to evolve. Happy viewing! Don't forget to
check out ISACA’s Certified in Emerging Technology Certification:
https://www.isaca.org/credentialing/cet for more information

39 views • 2 years ago

VIDEO


ISACA LIVE: ULTRA EMERGING TECH PART IX–WHAT IS NEXT WITH EMERGING TECHNOLOGY
AND QA

Join ISACA's Kevin Keh, and guest, Ramses Gallego [ISACA Emerging Tech Committee
Member], in the latest session of our ISACA Live series on Emerging Technology
as they discuss four of the most prominent forms of ultra-emerging technologies
including Quantum Computing, Nanotechnology, Internet of Behavior (IoB) and
XR/VR. For each technology, they’ll dive deep into what the technology is, why
it’s considered emerging and ultimately, why it’s something your organization
should keep an eye on as it continues to evolve. Happy viewing! Don't forget to
check out ISACA’s Certified in Emerging Technology Certification:
https://www.isaca.org/credentialing/cet for more information

246 views • 2 years ago

VIDEO


ISACA LIVE: ULTRA EMERGING TECH PART V–WHAT IS INTERNET OF BEHAVIORS?

Join ISACA's Kevin Keh, and guest, Ramses Gallego [ISACA Emerging Tech Committee
Member], in the latest session of our ISACA Live series on Emerging Technology
as they discuss four of the most prominent forms of ultra-emerging technologies
including Quantum Computing, Nanotechnology, Internet of Behavior (IoB) and
XR/VR. For each technology, they’ll dive deep into what the technology is, why
it’s considered emerging and ultimately, why it’s something your organization
should keep an eye on as it continues to evolve. Happy viewing! Don't forget to
check out ISACA’s Certified in Emerging Technology Certification:
https://www.isaca.org/credentialing/cet for more information

48 views • 2 years ago

VIDEO


ISACA LIVE: ULTRA EMERGING TECH PART VI–WHY SHOULD “INTERNET OF BEHAVIORS”
MATTER TO OUR VIEWERS?

Join ISACA's Kevin Keh, and guest, Ramses Gallego [ISACA Emerging Tech Committee
Member], in the latest session of our ISACA Live series on Emerging Technology
as they discuss four of the most prominent forms of ultra-emerging technologies
including Quantum Computing, Nanotechnology, Internet of Behavior (IoB) and
XR/VR. For each technology, they’ll dive deep into what the technology is, why
it’s considered emerging and ultimately, why it’s something your organization
should keep an eye on as it continues to evolve. Happy viewing! Don't forget to
check out ISACA’s Certified in Emerging Technology Certification:
https://www.isaca.org/credentialing/cet for more information

44 views • 2 years ago

VIDEO


ISACA LIVE: ULTRA EMERGING TECH PART VII–WHAT IS XR AND VR?

Join ISACA's Kevin Keh, and guest, Ramses Gallego [ISACA Emerging Tech Committee
Member], in the latest session of our ISACA Live series on Emerging Technology
as they discuss four of the most prominent forms of ultra-emerging technologies
including Quantum Computing, Nanotechnology, Internet of Behavior (IoB) and
XR/VR. For each technology, they’ll dive deep into what the technology is, why
it’s considered emerging and ultimately, why it’s something your organization
should keep an eye on as it continues to evolve. Happy viewing! Don't forget to
check out ISACA’s Certified in Emerging Technology Certification:
https://www.isaca.org/credentialing/cet for more information

109 views • 2 years ago

VIDEO


ISACA LIVE: ULTRA EMERGING TECH PART VIII–WHY SHOULD XR/VR MATTER TO OUR
VIEWERS?

Join ISACA's Kevin Keh, and guest, Ramses Gallego [ISACA Emerging Tech Committee
Member], in the latest session of our ISACA Live series on Emerging Technology
as they discuss four of the most prominent forms of ultra-emerging technologies
including Quantum Computing, Nanotechnology, Internet of Behavior (IoB) and
XR/VR. For each technology, they’ll dive deep into what the technology is, why
it’s considered emerging and ultimately, why it’s something your organization
should keep an eye on as it continues to evolve. Happy viewing! Don't forget to
check out ISACA’s Certified in Emerging Technology Certification:
https://www.isaca.org/credentialing/cet for more information

173 views • 2 years ago

VIDEO


ISACA LIVE WITH DUSTIN BREWER AND KRISTEN KESSINGER

Watch ISACA's Dustin Brewer tell you what you need to know about IoT now--why is
it still considered an emerging tech? What are the biggest cybersecurity
threats, and what opportunities will the Internet of Things bring in the next
five years? Watch to find out. Don't forget to check out
https://www.isaca.org/resources/news-and-trends/isaca-podcast-library for more
information!

158 views • 2 years ago

VIDEO


ISACA’S DIGITAL TRANSFORMATION PART I —POSITIVE POTENTIAL OF TECHNOLOGY

Join ISACA’s CEO David Samuelson as he discusses the positive potential of
technology with ISACA’s Chief Product Officer, Nader Qaimari. Listen in as Nader
explains how ISACA’s newest certifications (Emerging Technology and Information
Technology) were built with performance based testing and gamification to help
beginners and young professionals get started in the IT field. Providing this
new learning will help hiring managers who are struggling to find the right
candidates due to these missing skills gaps. David and Nader also discuss
ISACA’s new unified learning platforms that are scalable and supports the needs
of our global members. Don't forget to check out https://www.isaca.org/ for more
information!

345 views • 2 years ago

VIDEO


ISACA’S DIGITAL TRANSFORMATION PART II — PEOPLE, PROCESS, AND TECHNOLOGY

David Samuelson is back and continuing his discussion of ISACA’s Digital
transformation. This time David interviews members of ISACA’s IT team — CTO,
Simona Rollinson; Sr. Director, Application Development, Sean Ways; and Sr.
Director of Enterprise Project Management, Amy Witkowski. Listen in as they
discuss ISACA’s new, customer-centric CMS and how we have and will rely on
technology through the pandemic and beyond. The team also explains how ISACA has
recruited the right talent to staff up for the programs of the future through
the power of “people, process, and technology”. Don't forget to check out
https://www.isaca.org/ for more information!

239 views • 2 years ago

VIDEO


ISACA’S DIGITAL TRANSFORMATION PART III — THE DIGITAL MEMBER EXPERIENCE

David Samuelson and ISACA’s Chief Membership Officer, Julia Kanouse discuss the
positive impact of technology on our members and the ways in which our global
community has grown even closer despite the pandemic. Watch as Julia shares some
takeaways from the past year, including how the success of ISACA’s virtual
conferences led to the decision to make future events hybrid, showing ISACA’s
commitment to being digital first and allowing the opportunity for more people
to attend who may have not been able to before. David and Julia also talk about
how building digital trust between ISACA and our members will play a role in
areas such as future improvements to our website and its user experience. Don't
forget to check out https://www.isaca.org/ for more information!

238 views • 2 years ago

VIDEO


INDUSTRY SPOTLIGHT: MARK THOMAS

In 2019, Mark Thomas was on the road 40 weeks in 18 US states and 13 countries.
In 2020, he pivoted to a workstyle of 1 location, 1 state and 1 country. He
tells ISACA's Jessica Barnett that he was actually prepared for a pandemic-type
of event that stopped travel in his business plan. Mark and Jessica dive deep
into his career journey and their shared history of developing ISACA training
content. He also was the CIO of a telecommunications startup that was all remote
pre-pandemic. Mark is an accredited ISACA trainer and shares his advice on what
credential you should get and how to grow your career. Tune in now to hear
Mark's exciting story! Visit markthomasonline.com for more information on Mark.
Visit isaca.org/podcasts for my ISACA podcasts. Be sure to like, comment, and
subscribe for more ISACA Productions content!

410 views • 2 years ago

VIDEO


ISACA: INTRODUCTION TO DIGITAL TRUST ONLINE COURSE_38

What is Digital Trust? How can you use it for an organization, or use it in your
professional career? As an enabler for Digital Trust, ISACA can help you find
the answers. Check out the Introduction to Digital Trust Online course for more
information. https://www.isaca.org/go/online-course

299 views • 2 years ago

VIDEO


DIGITAL TRUST: THE BIGGER PICTURE

Imagine a digital world that's more transparent, that's more secure, that's more
honest. Where everyone can thrive. For more information, check out
https://isaca.org/digital-trust

279 views • 2 years ago

VIDEO


ISACA: INTRODUCTION TO DIGITAL TRUST ONLINE COURSE_25

What is Digital Trust? How can you use it for an organization, or use it in your
professional career? As an enabler for Digital Trust, ISACA can help you find
the answers. Check out the Introduction to Digital Trust Online course for more
information. https://www.isaca.org/go/online-course

209 views • 2 years ago

VIDEO


DIGITAL TRUST - MANY WAYS

For more information, check out http://isaca.org/digital-trust

716K views • 2 years ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO YOU?

What does Digital Trust mean to you? Hear from ISACA volunteers, members, and
contributors to get their thoughts on what Digital Trust means to them. For more
information, check out http://isaca.org/digital-trust

5K views • 2 years ago

VIDEO


DIGITAL TRUST REQUIRES ALL HANDS ON DECK—BUT THE ROI IS WORTH IT

Everyone has some responsibility for digital trust within an enterprise—from IT
to HR and marketing, and beyond. But the benefits are many, says ISACA Digital
Trust Task Force Member Mark Thomas. Watch this conversation with Thomas and
ISACA’s Karen Heslop to better understand what digital trust encompasses, how
all employees can advance the pursuit of digital trust, and the ROI companies
see as a result. For more information, check out -
http://isaca.org/digital-trust

371 views • 2 years ago

VIDEO


ISACA: INTRODUCTION TO DIGITAL TRUST ONLINE COURSE_70

What is Digital Trust? How can you use it for an organization, or use it in your
professional career? As an enabler for Digital Trust, ISACA can help you find
the answers. Check out the Introduction to Digital Trust Online course for more
information. https://www.isaca.org/go/online-course

281 views • 2 years ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO ISACA?

What does Digital Trust mean to ISACA? Join ISACA's CEO, David Samuelson as he
talks about what Digital Trust means for ISACA. David is also joined by Chief
Global Strategy Office, Chris Dimitriadis, and Chief Marketing & Membership
Officer, Julia Kanouse to discuss their views on what Digital Trust means for
ISACA. For more information, check out http://isaca.org/digital-trust

486 views • 2 years ago

VIDEO


CELEBRATING WOMEN IN TECH

ISACA women leaders in tech give their best career advice to women who are
looking to enter the field! Learn more about ISACA and ISACA Foundation’s
SheLeadsTech program, which empowers women to enhance their professional skills
and advocate for their career advancement.

426 views • 2 years ago

VIDEO


MD&M PANEL

Preview of the MDDAP program panel with the FDA, Medical Device Innovation
Consortium, ISACA, and the Medical Device Industry. More information can be
found at: isaca.org/mddap.

240 views • 2 years ago

VIDEO


ISACA 2022 NORTH AMERICA CONFERENCE

2 years ago

VIDEO


ISACA’S CERTIFIED IN EMERGING TECHNOLOGY CERTIFICATION

Build on your IT knowledge and skills in four leading-edge, in-demand emerging
technology domains. Obtain four knowledge- and performance-enhancing
certificates that stack up to earn you the career-accelerating ISACA® Certified
in Emerging Technology™ (CET) Certification. ISACA’s CET affirms you have what
it takes to apply in-demand emerging tech expertise to your current or future
role in IT audit, risk, security, cybersecurity, governance, privacy or business
growth. CET hands-on performance learning techniques build and reinforces vital
practical skills required to leverage emerging technology in your daily job. As
the next best thing to real-world experience, CET validates that you’re ready to
advise, assess and implement today’s leading-edge emerging technologies and
deliver their rewards to your enterprise or clients. For more information, check
out https://www.isaca.org/credentialing/cet

1K views • 2 years ago

VIDEO


ISACA’S CERTIFIED IN EMERGING TECHNOLOGY CERTIFICATION

Build on your IT knowledge and skills in four leading-edge, in-demand emerging
technology domains. Obtain four knowledge- and performance-enhancing
certificates that stack up to earn you the career-accelerating ISACA® Certified
in Emerging Technology™ (CET) Certification. ISACA’s CET affirms you have what
it takes to apply in-demand emerging tech expertise to your current or future
role in IT audit, risk, security, cybersecurity, governance, privacy or business
growth. CET hands-on performance learning techniques build and reinforces vital
practical skills required to leverage emerging technology in your daily job. As
the next best thing to real-world experience, CET validates that you’re ready to
advise, assess and implement today’s leading-edge emerging technologies and
deliver their rewards to your enterprise or clients. For more information, check
out https://www.isaca.org/credentialing/cet

896 views • 2 years ago

VIDEO


US DOD’S CMMC GUIDELINES — WHAT YOU NEED TO KNOW

Cybersecurity Maturity Model Certification or CMMC is a new security program
being released by the US DoD. If you are a DoD contractor, your livelihood could
be at stake as contract requirements and contractors will need to be certified
or a contract won’t be awarded. Listen in as TelaTek's Director of Operations,
Johann Dettweiler breaks down these new requirements published in his latest
journal article with ISACA's CMMI Professional Practice Lead, Kileen Harrison.
Johann discusses the importance of all organizations —big or small—going through
the different levels of security in the CMMC guidelines, starting at Level 1 and
working their way up. What is the most important thing an organization needs to
get started? The ability to read, familiarize and understand the different
levels of CMMC otherwise, they won’t know how to implement it in their
organization and will have to hire a third party. These CMMC requirements are
here to stay and will only continue to get more stringent the more hacks and
attacks keep increasing. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-4/what-government-contractors-should-know-about-the-us-dods-cmmc-guidelines
for more information!

124 views • 2 years ago

VIDEO


SECURITY AS A SERVICE

What is security as a service and when is it needed? Tune in as ISACA’s Cyber
Pros explain how the increase in hacks and attacks are forcing companies to take
cyber security more seriously. The bad news is, there is a lack of cyber
security professionals in the field and those who do have the necessary skillset
to manage a company’s security are becoming more and more costly. Academia is
trying to help get the security workforce up to speed quickly, but they are
failing. Until we see an influx of new and skilled cyber security professionals,
security as a service is an option that can save your company both time and
money and help assure that your company’s data and information is safe and
secure. For more information, check out ISACA’s State of Cybersecurity 2021:
https://www.isaca.org/go/state-of-cybersecurity-2021

85 views • 2 years ago

VIDEO


IT AUDIT IN PRACTICE: SURVIVAL WHEN YOU ARE SMALL-BUSINESS CONTINUITY AND
RESILIENCE

Everyone needs a resilient operating model, and the pandemic has been the
reality check showing how necessary it is to have a plan. Was your
small-business or corporation prepared for the shift to remote work in early
2020? If not, you probably realized that business continuity is more than having
the right systems and applications in place. The most important factor is
people! Although both large and small enterprises have accommodated and adapted,
the smaller organizations with fewer resources and time have faced equal or
greater hurdles when it comes to this type of planning. Join ISACA’s IT
Professional Practices Lead, Kevin Keh, as he interviews Cindy Baxter, Director,
What’s the Risk, LLC and discusses the importance of having a business
continuity and resilience plan for your business. Cindy discusses consistently
updating your crisis team and notification systems, the importance of allowing
an auditor to fully understand your business, accepting critical feedback
throughout the entire audit process vs. waiting for the final report and more!
Cindy also mentions how small business owners and employees shouldn’t get
defensive or take the findings personally. Remember, the value comes not in the
result, but in the adoption of the results and recommendations. For more
information on this topic, download ISACA’s IT Business Continuity/Disaster
Recover Audit Program here: shorturl.at/uLZ16

117 views • 2 years ago

VIDEO


PRIVACY-PRESERVING ANALYTICS AND SECURE MULTIPARTY COMPUTATION

Organizations are increasingly concerned about data security in several
scenarios, including collecting and retaining sensitive personal information;
processing personal information in external cloud environments, and information
sharing. Commonly implemented solutions do not provide strong protection from
data theft and privacy disclosures. Privacy and risk management professionals
are particularly concerned about the privacy and security of data analytics that
are shared externally. Compliance of privacy regulations such as the US State of
California Consumer Privacy Act (CCPA), the EU General Data Protection
Regulation (GDPR) and other emerging regulations around the world require
techniques for secure processing of sensitive data. Listen in as ISACA’s Safia
Kazi interviews Chief Security Strategist and data protection expert, Ulf
Mattsson on the latest on privacy-preserving techniques. Don't forget to check
out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-2/privacy-preserving-analytics-and-secure-multiparty-computation
for more information!

175 views • 2 years ago

VIDEO


WHY SHOULD I LISTEN TO YOU?

Why should you listen to ISACA’s CyberPros? Find out as Dustin Brewer and Frank
Downs explain how they got started in the cybersecurity field and grew their
knowledge and experience to become the cyber professionals they are today.
Dustin and Frank discuss their traditional and non-traditional paths to
learning, their experience working in the US government and the importance of
earning a certification and continuing your education. Want to know how to get
started in Cybersecurity? Start here by listening to this podcast. Don't forget
to check out
https://www.isaca.org/resources/news-and-trends/isaca-podcast-library for more
information!

73 views • 2 years ago

VIDEO


ISACA LIVE WITH DUSTIN BREWER AND KRISTEN KESSINGER (SHORT VERSION)

Watch ISACA's Dustin Brewer tell you what you need to know about IoT now--why is
it still considered an emerging tech?

2 years ago

VIDEO


CYBERSECURITY ISN’T REAL, RIGHT? WRONG!

Every day, the risk of cyber and ransomware attacks regularly increases in
frequency and danger. But despite the proof in numbers, many organizations still
don’t recognize the need to fortify their fortress and improve the strength of
their Cybersecurity practices. This is because the leadership of many
organizations don’t understand cybersecurity or even want to understand it. That
is —until it is too late. In this episode, ISACA’s Cyber Pros, Dustin Brewer and
Frank Downs explain the importance of cybersecurity and provide real world
examples of why it pays to be proactive, not reactive when it comes to your
company’s security. In the end, it will not only save your company a ton of time
and money, but may even save your company! Interested in learning more on this
topic Check out ISACA’s State of Cybersecurity 2021 report at
https://www.isaca.org/go/state-of-cybersecurity-2021 .

182 views • 2 years ago

VIDEO


JUST THE FAX ON CYBERSECURITY

Is your home printer or fax machine an IOT device? You bet it is! Dubbed
‘Faxploit’, research has shown how cyber criminals can infiltrate any home or
corporate network by exploiting wireless printers and fax machines. A fax
numbers is all it takes to launch this type of attack. Listen in as Cyber Pros,
Dustin Brewer and Frank Downs discuss the need for these home devices, how—they
too—are at risk of being hacked and their best suggestions on how to mitigate
this vulnerability. So fill your paper tray, test your fax connection and press
play…it’s time for a Cyber Pros breakdown! Don't forget to check out
https://www.isaca.org/resources/news-and-trends/isaca-podcast-library for more
information!

127 views • 3 years ago

VIDEO


ADVANCED SECURITY FOR SECRET INFORMATION

Listen in as ISACA Journal columnist, Steven Ross, CISA, CDPSE, AFBCI, CISSP,
MBCP, delves deeper into his latest article, “Advanced Security for Secret
Information.” As a follow up to his two previously published journals, “Keeping
Secrets,” and “Secrets and Privacy,” Ross continues to make the case that the
protection of secret information is becoming a significant issue in
cybersecurity. All companies —no matter how small— need some form of a security
program to protect their secret information. However, the security that is
currently in place to protect those secrets are oftentimes insufficient. Steven
discusses the use of encryption and extended monitoring to keep the “bad guys”
at bay from stealing your important information. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-3/advanced-security-for-secret-information
for more information!

210 views • 3 years ago

VIDEO


ISACA'S 50TH ANNIVERSARY CELEBRATION HIGHLIGHTS

ISACA celebrated its 50th anniversary throughout 2019 while looking ahead to an
even more promising future.

836 views • 4 years ago

VIDEO


ISACA IN THE 1970S

Take a look back at ISACA during the 1970s, a time when the association
established its roots in the IT community and marked many milestones, including
the hire of its first employee, the launch of its first national conference, the
opening of its first international chapter and the introduction of the CISA
certification. Learn how you can be part of the celebration!
http://bit.ly/2EV5oRZ

1K views • 5 years ago

VIDEO


ISACA IN THE 1980S

Revisit the 1980s, when the association, then known as EDPAA, continued to
expand, increasing its number of conferences and chapters, as well as marking
the milestone of its first CISA certification exam. Find out how you can be part
of the ISACA50 celebration! http://bit.ly/2EU2xsC

781 views • 5 years ago

VIDEO


ISACA IN THE 2000S

As ISACA entered into the new millennium, it successfully navigated Y2K,
provided impactful guidance around Sarbanes-Oxley, and introduced its CISM and
CGEIT certifications, while growing its membership to 186 chapters in 77
countries. Find out how you can be part of the ISACA50 celebration!
http://bit.ly/2EV2A7t

388 views • 5 years ago

VIDEO


ISACA IN THE 1990S

During the 1990s, the association celebrated its 25th anniversary and changed
its name from EDPAA to ISACA. ISACA also introduced COBIT to help professionals
govern and manage enterprise IT. Learn how you can be part of the celebration!
http://bit.ly/2ERwmKp

444 views • 5 years ago

VIDEO


ISACA IN THE 2010S

In a decade marked by increased cyber threats, ISACA introduced its CRISC
certification and launched Cybersecurity Nexus (CSX) for cybersecurity
professionals. The association has continued to expand with its acquisition of
CMMI Institute, new international office in Beijing, and a new headquarters in
Schaumburg, Illinois, as well as to reach its members in new ways, including
through the introduction of the SheLeadsTech program. Learn how you can be part
of the celebration! http://bit.ly/2EUkLtS

530 views • 5 years ago

VIDEO


CERTIFICATION THROUGH THE YEARS

Take a look back at the history of ISACA’s certifications for IT audit,
security, governance and risk professionals—CISA, CISM, CGEIT, CRISC and CSXP—
and listen to ISACA members reflect on the impact the certifications have had on
their careers. Find out how you can be part of the ISACA50 celebration!
http://bit.ly/2EW3AYK

589 views • 5 years ago

VIDEO


CYBERSECURITY

ISACA has provided an array of resources to help its professional community
adapt to the challenging cybersecurity landscape, including through its launch
of the Cybersecurity Nexus (CSX) and the introduction of its CSXP credential.
Learn how you can be part of the celebration! http://bit.ly/2EX9eKc

1K views • 5 years ago

VIDEO


INTRODUCING COBIT 2019—A SNEAK PEEK

The globally recognized COBIT framework, leader in ensuring effective and
strategic enterprise governance of information and technology (EGIT), has been
updated with new information and guidance—facilitating easier, tailored
implementation. COBIT 2019 debuts on 12 November 2019—but here’s a Sneak Peek of
this new release. Go to http://www.isaca.org/COBIT

9K views • 5 years ago

VIDEO


CSX 2018 EUROPE

Register today at http://bit.ly/2xdJu6n Make plans today to join the thought
(and action) leaders in cybersecurity on 29-31 October 2018 in London, U.K. This
is a great opportunity to amplify your knowledge and earn up to 32 CPE credits!
Brought to you by ISACA’s globally respected Cybersecurity Nexus™ (CSX), which
is dedicated to helping professionals like you build timely knowledge and
effective cyber skills. --More than 50+ sessions to customize for your goals
--More in-depth options for advanced learning --Enhanced networking
opportunities Register today at http://bit.ly/2xdJu6n

895 views • 5 years ago

VIDEO


CSX-P LAB BONANZA WORKSHOP AT CSX 2018 NORTH AMERICA

Register for CSX 2018 North America here: http://bit.ly/2wJ7Q7q The CSX
Practitioner Lab Bonanza workshop at CSX 2018 North America in Las Vegas,
Nevada, 15-17 October, offers attendees the opportunity to experience all of the
labs presented in the one week Bootcamp in two intensive, action-packed days!
ISACA staff instructors and program developers will guide you through these
technically advanced, hands-on labs where you will be dissecting typical problem
spots, and learning through detailed insight to ensure your comprehension and
application upon return to the office so you are better equipped to overcome
threats and create competitive advantages for your career and your organization.
Learn more and register today: http://bit.ly/2M56wRX

48 views • 5 years ago

VIDEO


FOCO DE LA INDUSTRIA - ARNULFO ESPINOSA DOMINGUEZ, PARTE I

El vicepresidente del Capítulo Monterrey de ISACA y Director de Auditoría y
Fraude de TI de uno de los Grupos Financieros más grandes de México, Arnulfo
Espinosa Domínguez, se une a Jocelyn Alcantar de ISACA para compartir muchas
cosas que ha aprendido durante sus 20 años de experiencia profesional en la
industria. Habiéndose dado cuenta del valor de la información a una edad
temprana, Arnulfo ha forjado su camino dentro de la comunidad de TI. Es un
formador acreditado para múltiples certificaciones, asesor independiente y
presidente de varios comités de Ciberseguridad, Riesgo y Auditoría, y es
reconocido mundialmente por un apodo que sus compañeros le han dado, "El
AudiTHOR". Como voluntario de ISACA desde hace mucho tiempo y orador de
conferencias, Arnulfo ha sido premiado en numerosas ocasiones por sus destacados
logros. En 2019, se le otorgó el "Premio al Líder de Capítulo Sobresaliente"
(Outstanding Chapter Leader Award) de ISACA, en 2020, recibió el "Premio John
Kuyers al Mejor Orador" (John Kuyers Award for Best), y recibió el mayor logro,
el "Premio Salón de la Fama de ISACA" (ISACA Hall of Fame Award) en 2021. 
¡Únase a la escucha de este episodio mientras Arnulfo ofrece sus mejores
consejos y prácticas para convertirse en un orador excepcional, consejos sobre
cómo los profesionales emergentes pueden entrar en la industria, y cómo su alter
ego, AudiTHOR, alimenta su pasión por la auditoría! Para leer más sobre Arnulfo,
visite
www.isaca.org/resources/news-and-trends/isaca-now-blog/2020/iamisaca-from-rock-star-to-speak-star
Para escuchar más Podcasts de ISACA, visite www.isaca.org/podcasts

159 views • 1 year ago

LAYOUT

List Layout Card Layout
Digital Trust

VIDEO


CMMI TECH TALK: MODEL DEEP DIVE: WORKFORCE EMPOWERMENT (WE) PRACTICE AREA

A deeper look into one of the new Practice Areas in the CMMI Model, Workforce
Empowerment (WE) https://www.isaca.org/cmmi

199 Views • 1 year ago

VIDEO


DATA QUALITY PRACTICE AREA OVERVIEW

In this video, you will get a brief overview of one of the new Practice Areas
from the CMMI Model, known as Data Quality (DQ).

19 Views • 1 year ago

VIDEO


IN PURSUIT OF DIGITAL TRUST – ALON AMIT

ISACA member Alon Amit says that education and safety should be the two greatest
areas of emphasis for professionals tasked with building digital trust.

559 Views • 1 year ago

VIDEO


IN PURSUIT OF DIGITAL TRUST – FRANCISCO GUIMARAES

ISACA member Francisco Guimaraes thinks providing digital trust is “the right
umbrella” for technology professionals to think about how they can positively
impact their organizations.

79 Views • 1 year ago

VIDEO


ISACA LIVE: ADVANCING DIGITAL TRUST THROUGH CYBERSECURITY

ISACA's Jon Brandt and Chris McGowan will discuss how cybersecurity
professionals can advance digital trust, share some consumer perspectives on
cybersecurity and outline new ISACA resources for cybersecurity professionals.

367 Views • 1 year ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO YOU? ALEX FENG TESTIMONIAL

ISACA members weigh in on what Digital Trust means to them. For more
information, check out https://www.isaca.org/digital-trust

253 Views • 1 year ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO YOU? SCOTT BAUMAN TESTIMONIAL

ISACA members weigh in on what Digital Trust means to them. For more
information, check out https://www.isaca.org/digital-trust

128 Views • 1 year ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO YOU? RIA BLUITT TESTIMONIAL

ISACA members weigh in on what Digital Trust means to them. For more
information, check out https://www.isaca.org/digital-trust

108 Views • 1 year ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO YOU? CHRIS MADEKSHO TESTIMONIAL

ISACA members weigh in on what Digital Trust means to them. For more
information, check out https://www.isaca.org/digital-trust

89 Views • 1 year ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO YOU? CHARLOTTE HARRIS TESTIMONIAL

ISACA members weigh in on what Digital Trust means to them. For more
information, check out https://www.isaca.org/digital-trust

111 Views • 1 year ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO YOU? MARTIN POIPOI TESTIMONIAL

ISACA members weigh in on what Digital Trust means to them. For more
information, check out https://www.isaca.org/digital-trust

85 Views • 1 year ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO YOU? JULIE CHATMAN TESTIMONIAL

ISACA members weigh in on what Digital Trust means to them. For more
information, check out https://www.isaca.org/digital-trust

84 Views • 1 year ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO YOU? TAMARA LAUTERBACH TESTIMONIAL

ISACA members weigh in on what Digital Trust means to them. For more
information, check out https://www.isaca.org/digital-trust

86 Views • 1 year ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO YOU?

ISACA members weigh in on what Digital Trust means to them. For more
information, check out https://www.isaca.org/digital-trust

373 Views • 1 year ago

VIDEO


ISACA LIVE | STATE OF DIGITAL TRUST 2022: WHAT IT MEANS FOR YOU AND YOUR
ORGANIZATION

ISACA's Vice President of Content Development and Karen Heslop and Cerby's Chief
Trust Officer Matt Chiodi look at the results of ISACA's global research on the
state of digital trust and what it means for enterprises worldwide. Learn more
at https://isaca.org/digital-trust

233 Views • 1 year ago

VIDEO


IN PURSUIT OF DIGITAL TRUST – TAMARA LAUTERBACH (SHORT)

ISACA member Tamara Lauterbach shares her perspective on why focusing on digital
trust is a must for companies to succeed in today’s world. Learn more at
https://isaca.org/digital-trust

127 Views • 1 year ago

VIDEO


IN PURSUIT OF DIGITAL TRUST – TAMARA LAUTERBACH

ISACA member Tamara Lauterbach shares her perspective on why focusing on digital
trust is a must for companies to succeed in today’s world. Learn more at
https://isaca.org/digital-trust

642 Views • 1 year ago

VIDEO


IN PURSUIT OF DIGITAL TRUST – ANTHONY AYO

ISACA member Anthony Ayo talks about how people, processes and technology can
come together to strengthen digital trust and how those dynamics play out in his
role at the local government level. For more information, check out
https://isaca.org/digital-trust

912 Views • 1 year ago

VIDEO


IN PURSUIT OF DIGITAL TRUST – ANTHONY AYO (SHORT)

ISACA member Anthony Ayo talks about how people, processes and technology can
come together to strengthen digital trust and how those dynamics play out in his
role at the local government level. For more information, check out
https://isaca.org/digital-trust

163 Views • 1 year ago

VIDEO


IN PURSUIT OF DIGITAL TRUST – SHEA NANGLE

ISACA member Shea Nangle shares his perspective on what he calls “the implicit
struggle between profit and what is done with consumer data,” and how that
factors into creating digital trust. For more information, check out
https://isaca.org/digital-trust

587 Views • 1 year ago

VIDEO


IN PURSUIT OF DIGITAL TRUST – SHEA NANGLE (SHORT)

ISACA member Shea Nangle shares his perspective on what he calls “the implicit
struggle between profit and what is done with consumer data,” and how that
factors into creating digital trust. For more information, check out
https://isaca.org/digital-trust

297 Views • 1 year ago

VIDEO


IN PURSUIT OF DIGITAL TRUST – JULIE CHATMAN

ISACA member Julie Chatman describes her eventful career journey, her passions
outside of work and why digital trust matters to her both professionally and
personally. For more information, check out https://isaca.org/digital-trust

318 Views • 2 years ago

VIDEO


IN PURSUIT OF DIGITAL TRUST – JULIE CHATMAN (SHORT)

ISACA member Julie Chatman describes her eventful career journey, her passions
outside of work and why digital trust matters to her both professionally and
personally. For more information, check out http://isaca.org/digital-trust

156 Views • 2 years ago

VIDEO


ISACA: INTRODUCTION TO DIGITAL TRUST ONLINE COURSE_38

What is Digital Trust? How can you use it for an organization, or use it in your
professional career? As an enabler for Digital Trust, ISACA can help you find
the answers. Check out the Introduction to Digital Trust Online course for more
information. https://www.isaca.org/go/online-course

299 Views • 2 years ago

VIDEO


DIGITAL TRUST: THE BIGGER PICTURE

Imagine a digital world that's more transparent, that's more secure, that's more
honest. Where everyone can thrive. For more information, check out
https://isaca.org/digital-trust

279 Views • 2 years ago

VIDEO


ISACA: INTRODUCTION TO DIGITAL TRUST ONLINE COURSE_25

What is Digital Trust? How can you use it for an organization, or use it in your
professional career? As an enabler for Digital Trust, ISACA can help you find
the answers. Check out the Introduction to Digital Trust Online course for more
information. https://www.isaca.org/go/online-course

209 Views • 2 years ago

VIDEO


DIGITAL TRUST - MANY WAYS

For more information, check out http://isaca.org/digital-trust

716K Views • 2 years ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO YOU?

What does Digital Trust mean to you? Hear from ISACA volunteers, members, and
contributors to get their thoughts on what Digital Trust means to them. For more
information, check out http://isaca.org/digital-trust

5K Views • 2 years ago

VIDEO


DIGITAL TRUST REQUIRES ALL HANDS ON DECK—BUT THE ROI IS WORTH IT

Everyone has some responsibility for digital trust within an enterprise—from IT
to HR and marketing, and beyond. But the benefits are many, says ISACA Digital
Trust Task Force Member Mark Thomas. Watch this conversation with Thomas and
ISACA’s Karen Heslop to better understand what digital trust encompasses, how
all employees can advance the pursuit of digital trust, and the ROI companies
see as a result. For more information, check out -
http://isaca.org/digital-trust

371 Views • 2 years ago

VIDEO


ISACA: INTRODUCTION TO DIGITAL TRUST ONLINE COURSE_70

What is Digital Trust? How can you use it for an organization, or use it in your
professional career? As an enabler for Digital Trust, ISACA can help you find
the answers. Check out the Introduction to Digital Trust Online course for more
information. https://www.isaca.org/go/online-course

281 Views • 2 years ago

VIDEO


WHAT DOES DIGITAL TRUST MEAN TO ISACA?

What does Digital Trust mean to ISACA? Join ISACA's CEO, David Samuelson as he
talks about what Digital Trust means for ISACA. David is also joined by Chief
Global Strategy Office, Chris Dimitriadis, and Chief Marketing & Membership
Officer, Julia Kanouse to discuss their views on what Digital Trust means for
ISACA. For more information, check out http://isaca.org/digital-trust

486 Views • 2 years ago

Member Benefits

VIDEO


DISCOVER THE VALUE OF AN ISACA MEMBERSHIP

Watch as members share how ISACA’s member-exclusive benefits have helped put
them on the fast track to a more rewarding career.

72K Views • 4 months ago

VIDEO


ISACA MEMBER BENEFITS AND COMMUNITY

ISACA CMO Julia Kanouse shares the many ISACA member benefits that strengthen
our community, expand your professional network, help you grow as a thought
leader and earn CPE, and enjoy exclusive discounts Learn more at
https://www.isaca.org/membership/become-a-member/member-benefits.

18 Views • last year

VIDEO


MOVE YOUR CAREER FORWARD WITH ISACA’S MEMBER-EXCLUSIVE BENEFITS

Discover how ISACA’s member-exclusive benefits can deliver you the knowledge,
skills and resources you need to ADVANCE YOUR CAREER. And for a limited time,
when you sign up for a 2024 membership, you get the rest of 2023 FREE. That’s
right—join ISACA for 2024 and start your membership today! To JOIN & SAVE,
visit: www.isaca.org/advanced-membership To explore ISACA’s member-exclusive
benefits, visit:
https://www.isaca.org/membership/become-a-member/member-benefits

186 Views • 340 days ago

VIDEO


MEMBER GET A MEMBER (MGAM) - TESTIMONIALS

In this video, you will hear firsthand from members on the immense value of
ISACA’s Member Get a Member (MGAM) referral program. Members discuss why they
choose to participate and what they learn in return. The 2023 MGAM program
provides members an opportunity to recruit new members by sharing the benefits
of being part of a 165,000 community of likeminded professionals and earn
cash-based rewards while doing it.

134 Views • 340 days ago

VIDEO


SPOTLIGHTING THE MEMBER-EXCLUSIVE SPEAKER SERIES

ISACA is proud to offer member-exclusive access to series of leadership skill
building webinars in the Member-Exclusive Speaker Series. Led by industry
experts, you can learn how to lead an organization, others and most importantly
– yourself. Not an ISACA member? Join today to register for the next event.

76 Views • 349 days ago

VIDEO


3 KEYS TO ENGAGEMENT!

Register now to attend the next Member-Exclusive Speaker Series. Not a member?
Join today to attend and enjoy a variety of member benefits.

83 Views • 352 days ago

VIDEO


DISCOVER THE VALUE OF AN ISACA MEMBERSHIP

Watch as members share how ISACA’s member-exclusive benefits have helped put
them on the fast track to a more rewarding career. And for a limited time, take
advantage of ISACA’s LARGEST MEMBERSHIP DISCOUNT OF THE YEAR. Become a member
for the second half of 2023 and pay only HALF PRICE. To JOIN & SAVE, visit:
https://www.isaca.org/campaigns/half-year-half-price To explore ISACA’s
member-exclusive benefits, visit:
https://www.isaca.org/membership/become-a-member/member-benefits

611 Views • 1 year ago

VIDEO


HOW TO BECOME AN ISACA MEMBER

A complete guide on becoming a member of ISACA. Get helpful instructions and
tips in this video. Join a global community of 180,000+ members.

1K Views • 1 year ago

VIDEO


WHY I RENEW MY MEMBERSHIP WITH ISACA

In this video, we hear from various ISACA members on why they renew their
membership with ISACA year after year. The value of membership and the exclusive
benefits it offers, that keeps bringing them back. For more information, visit:
https://www.isaca.org/renewals.

900 Views • 1 year ago

VIDEO


ISACA MENTORSHIP PROGRAM - TESTIMONIALS

In this video, ISACA members share their personal experience with the ISACA
Mentorship Program (exclusive to members) which facilitates one-to-one
mentorship connections and brings together ISACA members at all stages of their
careers, to give or receive professional development support. Mentorship is a
two-way opportunity, and we hear perspectives from both mentors and mentees on
how the program has allowed them to expand their networks, gain new knowledge
and build new skills. For more information, visit: https://mentorship.isaca.org

2K Views • 1 year ago

VIDEO


ISACA ENGAGE: WHY ENGAGE?

Get involved in your professional community and expand your network through
ISACA Engage. Engage offers many opportunities to get involved in ways that
align with your time, talent, and interests. To learn more, go to
https://engage.isaca.org/home

242 Views • 1 year ago

VIDEO


ISACA ENGAGE: LEARN MORE ABOUT ISACA ENGAGE

Get involved in your professional community and expand your network through
ISACA Engage. Engage offers many opportunities to get involved in ways that
align with your time, talent, and interests. To learn more, go to
https://engage.isaca.org/home

244 Views • 1 year ago

VIDEO


ISACA ENGAGE: OTHER ENGAGE OPPORTUNITIES

Get involved in your professional community and expand your network through
ISACA Engage. Engage offers many opportunities to get involved in ways that
align with your time, talent, and interests. To learn more, go to
https://engage.isaca.org/home

181 Views • 1 year ago

VIDEO


ISACA ENGAGE: HOW TO GET INVOLVED

Get involved in your professional community and expand your network through
ISACA Engage. Engage offers many opportunities to get involved in ways that
align with your time, talent, and interests. To learn more, go to
https://engage.isaca.org/home

268 Views • 1 year ago

VIDEO


ISACA ENGAGE: WHAT MAKES ISACA'S VOLUNTEER PROGRAM DIFFERENT?

Get involved in your professional community and expand your network through
ISACA Engage. Engage offers many opportunities to get involved in ways that
align with your time, talent, and interests. To learn more, go to
https://engage.isaca.org/home

127 Views • 1 year ago

VIDEO


ISACA ENGAGE: BENEFITS OF ISACA ENGAGE

Get involved in your professional community and expand your network through
ISACA Engage. Engage offers many opportunities to get involved in ways that
align with your time, talent, and interests. To learn more, go to
https://engage.isaca.org/home

127 Views • 1 year ago

VIDEO


ISACA ENGAGE: ISACA’S VOLUNTEER BOARD

Get involved in your professional community and expand your network through
ISACA Engage. Engage offers many opportunities to get involved in ways that
align with your time, talent, and interests. To learn more, go to
https://engage.isaca.org/home

238 Views • 1 year ago

VIDEO


ISACA ENGAGE: WHAT IS ISACA ENGAGE?

Get involved in your professional community and expand your network through
ISACA Engage. Engage offers many opportunities to get involved in ways that
align with your time, talent, and interests. To learn more, go to
https://engage.isaca.org/home

144 Views • 1 year ago

VIDEO


ISACA ENGAGE: ISACA ENGAGE & VOLUNTEERISM

Get involved in your professional community and expand your network through
ISACA Engage. Engage offers many opportunities to get involved in ways that
align with your time, talent, and interests. To learn more, go to
https://engage.isaca.org/home

138 Views • 1 year ago

VIDEO


BUILDING EARLY CAREER MOMENTUM WITH ISACA

Young professionals accelerate their career growth and expand their networks by
getting involved with ISACA early in their careers.
www.isaca.org/young-professionals

1K Views • 1 year ago

VIDEO


WHY VOLUNTEER AS AN ISACA CHAPTER LEADER?

Learn from those who have benefitted from serving on an ISACA chapter board. To
learn more, check out https://www.isaca.org/

529 Views • 1 year ago

VIDEO


LEARN MORE ABOUT ISACA CHAPTERS

ISACA chapters foster a sense of community at the local level. Contact the
chapter in your area (www.isaca.org/chapters), or send an email to
chapters@isaca.org to learn how you can get involved.

586 Views • 2 years ago

VIDEO


ISACA CHAPTERS: HOW TO JOIN AN ISACA CHAPTER

ISACA chapters foster a sense of community at the local level. Contact the
chapter in your area (www.isaca.org/chapters), or send an email to
chapters@isaca.org to learn how you can get involved.

415 Views • 2 years ago

VIDEO


ISACA CHAPTERS: GET INVOLVED WITH AN ISACA CHAPTER

ISACA chapters foster a sense of community at the local level. Contact the
chapter in your area (www.isaca.org/chapters), or send an email to
chapters@isaca.org to learn how you can get involved.

283 Views • 2 years ago

VIDEO


ISACA CHAPTERS: BENEFITS OF JOINING AN ISACA CHAPTER

ISACA chapters foster a sense of community at the local level. Contact the
chapter in your area (www.isaca.org/chapters), or send an email to
chapters@isaca.org to learn how you can get involved.

256 Views • 2 years ago

VIDEO


ISACA CHAPTERS: CHAPTER AWARDS

ISACA chapters foster a sense of community at the local level. Contact the
chapter in your area (www.isaca.org/chapters), or send an email to
chapters@isaca.org to learn how you can get involved.

219 Views • 2 years ago

VIDEO


ISACA CHAPTERS: ISACA CHAPTERS GO VIRTUAL

ISACA chapters foster a sense of community at the local level. Contact the
chapter in your area (www.isaca.org/chapters), or send an email to
chapters@isaca.org to learn how you can get involved.

192 Views • 2 years ago

VIDEO


ISACA CHAPTERS: THE HISTORY OF ISACA CHAPTERS

ISACA chapters foster a sense of community at the local level. Contact the
chapter in your area (www.isaca.org/chapters), or send an email to
chapters@isaca.org to learn how you can get involved.

222 Views • 2 years ago

VIDEO


ISACA CHAPTERS - WHAT IS AN ISACA CHAPTER?

ISACA chapters foster a sense of community at the local level. Contact the
chapter in your area (www.isaca.org/chapters), or send an email to
chapters@isaca.org to learn how you can get involved.

317 Views • 2 years ago

VIDEO


SHORTER VERSION 3 - CYBERSECURITY: A PERFECT FIT FOR RISING PROFESSIONALS

Stanford University student Kyla Guru says Gen Z members are especially
well-equipped to thrive in cybersecurity. Don't forget to check out
https://www.isaca.org/ for more information!

166 Views • 2 years ago

VIDEO


SHORTER VERSION 2 - CYBERSECURITY: A PERFECT FIT FOR RISING PROFESSIONALS

Stanford University student Kyla Guru says the challenges posed when working in
cybersecurity can seem like a surreal experience. Don't forget to check out
https://www.isaca.org/ for more information!

125 Views • 2 years ago

VIDEO


SHORT VERSION 1 - CYBERSECURITY: A PERFECT FIT FOR RISING PROFESSIONALS

Stanford University student Kyla Guru explains the problem-solving mindset that
helps rising professionals succeed in cybersecurity. Don't forget to check out
https://www.isaca.org/ for more information!

163 Views • 2 years ago

VIDEO


CYBERSECURITY: A PERFECT FIT FOR RISING PROFESSIONALS

Stanford University student Kyla Guru makes the case that cybersecurity skills
come naturally to members of Gen Z who want to impact the future. Don't forget
to check out https://www.isaca.org/ for more information!

387 Views • 2 years ago

VIDEO


BUILDING EARLY CAREER MOMENTUM WITH ISACA

Find out how starting early with ISACA can make a difference for young
professionals and other newcomers to IT careers. Don't forget to check out
https://www.isaca.org/ for more information!

375 Views • 2 years ago

ISACA Community

VIDEO


ISACA COMMUNITY SPOTLIGHT

Want to feel engaged and inspired? Watch our Community Spotlight; a video
highlighting a variety of our initiatives and contributions showcasing who we
are at the core.

196 Views • 347 days ago

VIDEO


TOGETHER WE ARE STRONGER

In this video short, a soft-spoken professional finds their voice through ISACA.

438 Views • 1 year ago

VIDEO


ISACA HALL OF FAMERS SHARE THEIR INSPIRATIONS

Recent ISACA Hall of Fame inductees Allan Boardman, Jo Stewart-Rattray, Mike
Hughes, Lily Shue and Robert Parker share what motivated them to make such large
impacts on ISACA and their favorite ISACA memories.

320 Views • 1 year ago

VIDEO


ISACA VOLUNTEER APPRECIATION WEEK 2023

Learn more about the impact made by ISACA volunteers.

283 Views • 1 year ago

VIDEO


CMMI TECH TALK: COURSE TAILORING GUIDANCE

In this tech talk we will explore how CMMI classes can be tailored by
instructors based on student needs and instructor preferences according to ISACA
tailoring rules.

68 Views • 1 year ago

VIDEO


HOW TO BE AN ISACA VOLUNTEER

Take a tour of ISACA's volunteer program on Engage, and learn how to get
involved. For more information visit https://engage.isaca.org

275 Views • 1 year ago

VIDEO


WE ARE ISACA, EPISODE 05

In the fifth episode of We Are ISACA, Joseph Kachiliko from Zambia/UAE and Abbas
Kudrati from India/Australia, chat with Megan Moritz about doing a TedX talk,
writing several books, taking breaks from technology, and the one candy they
cannot live without. (5 Star and Snickers for the wins!) This episode also
feature Sri Srinivasa’s incredible voice acting talents, showcased in English
and his native language, Tamil. Intros & locations: 0:00-1:43 Joseph’s TEDx
talk: 1:44-7:13 Abbas’s best-selling books: 7:14-9:11 Staying connected to
yourself and others: 9:12-11:22 Setting better habits: 11:23-15:05 ISACA student
groups: 15:06-18:25 The importance of mentoring: 18:26-24:21 One candy for the
rest of your life: 24:22-25:54 Voice actor, Sri Srinivasa: 25:55-31:39 Until
next time: 31:40-32:14

156 Views • 1 year ago

VIDEO


THE EQUITY GEM: ACTIONABLE STEPS TO HELP CLOSE THE EQUITY GAP

In celebration of International Women's Day, themed #EmbraceEquity, Limor
Bergman and Willena Lon will share tips on actionable steps to help close the
equity gap.

63 Views • 1 year ago

VIDEO


ISACA. COMMUNITY. RESILIENCE.

ISACA's Global Community is bigger and stronger than you may realize...and more
resilient than you probably ever dreamed. Hear how ISACA members around the
world have supported fellow members in Ukraine, and discover how it is never too
late to make a difference. A very special thanks to those who took the time to
share their personal stories. https://www.isaca.org/ To donate:
https://bank.gov.ua/en/

771 Views • 1 year ago

VIDEO


ISACA COMMUNITY - CALL TO ACTION

Attention all past and current ISACA chapter leaders: If you or someone you know
within the ISACA community has done something awesome to help make the world a
better place, I want to share that story. Help us bring attention to what you
and others are doing so we can elevate the importance of helping others. To
learn more, reach out to mmoritz@isaca.org

142 Views • 1 year ago

VIDEO


ISACA COMMUNITY DAY 2022

In this video, Pam Nigro, ISACA Board Chair welcomes members to attend ISACA’s
4th Annual CommunITy Day to be held on Saturday, 1 October 2022. A one-day
initiative to foster relationships between members and offer opportunities for
networking and leadership. Members along with their friends and family are
encouraged to give back to their local or global communities, individually or
collectively to make a lasting global impact. For more information, check out
https://engage.isaca.org/communityday/about

852 Views • 1 year ago

VIDEO


ICNA - IN-PERSON BUZZ WITH ALEX HOLDEN

In-Person Buzz interview with Alex Holden from 2022 ICNA For more information,
go to https://www.isaca.org/

276 Views • 1 year ago

VIDEO


ICNA - IN-PERSON BUZZ WITH ROB CLYDE

In-Person Buzz interview with Rob Clyde from 2022 ICNA. For more information, go
to https://www.isaca.org/

222 Views • 1 year ago

VIDEO


ISACA COMMUNITY DAY 2021

Join is on Saturday, 2 October 2021 for the 3rd Annual ISACA CommunITy Day! For
more information, visit https://engage.isaca.org/communityday

879 Views • 1 year ago

VIDEO


DIGITAL BODY LANGUAGE

What is digital body language, and why does it matter? Join ISACA's Director of
Global Volunteer Engagement, Megan Moritz, as she speaks with Erica Dhawan,
author of Digital Body Language: How to Build Trust and Connection, No Matter
the Distance. Megan and Erica discuss our modern digital environments and how we
can prioritize thoughtfulness over hastiness, building trust from behind a
computer screen, and how collective conversations are now possible in the
digital world. Book: Digital Body Language: How to Build Trust and Connection No
Matter the Distance: https://us.macmillan.com/books/9781250246523

430 Views • 1 year ago

VIDEO


ISACA JOURNAL TURNS 50

Celebrating a Half-Century of Insights. For 50 years, the ISACA Journal has
helped shape IT. Here’s to 50 more. For more information, don't forget to check
out https://www.isaca.org/resources/isaca-journal

3K Views • 2 years ago

VIDEO


ISACA STANDS FOR SOMETHING BIGGER, SHORT VERSION 2

Find out what ISACA truly stands for to members of its global learning
community. Learn more at www.isaca.org/go/stand-for-something-bigger.

110 Views • 2 years ago

VIDEO


ISACA STANDS FOR SOMETHING BIGGER, SHORT VERSION 1

Find out what ISACA truly stands for to members of its global learning
community. Learn more at www.isaca.org/go/stand-for-something-bigger.

97 Views • 2 years ago

VIDEO


ISACA STANDS FOR SOMETHING BIGGER

Find out what ISACA truly stands for to members of its global learning
community. Learn more at www.isaca.org/go/stand-for-something-bigger.

1K Views • 2 years ago

VIDEO


CAREER PROGRESS DURING THE PANDEMIC

Members of the ISACA community explain what they’ve been doing to keep their
careers moving forward with more flexible schedules during the pandemic. Don't
forget to check out https://www.isaca.org/ for more information

741 Views • 2 years ago

VIDEO


DIGITAL DUNKIRK: USING CYBER SKILLS TO SAVE LIVES

ISACA Pittsburgh Chapter board member Dan Desko and his Echelon Risk + Cyber
team put their cybersecurity skills to good use in a humanitarian effort to help
endangered people flee Afghanistan as part of the Digital Dunkirk project. Don't
forget to check out https://engage.isaca.org/pittsburghchapter/home for more
information!

656 Views • 2 years ago

VIDEO


ISACA ANTHEM – MEGA RAN CUSTOM RAP

Rapper Mega Ran drops straight fire bars about ISACA’s IT credentialing programs
and community of experts, taking you on a journey “from a new member to the
latest IT star”. ISACA! Video made on commission through Event Rap. Explore
ISACA’s programs: https://www.isaca.org/ Follow Mega Ran:
https://www.eventrap.com/artist/mega-ran/ Learn more about Event Rap and custom
rap videos: https://www.eventrap.com

6K Views • 2 years ago

VIDEO


ISACA'S VOLUNTEER APPRECIATION WEEK 2021

Don't forget to check out https://www.isaca.org/ for more information!

536 Views • 2 years ago

VIDEO


#IAMISACA: ANDREA TANG

In her #IamISACA story, Andrea Tang explains how her privacy expertise positions
her to be to a bridge between China and the rest of the world. Don't forget to
check out https://www.isaca.org/ for more information!

250 Views • 2 years ago

VIDEO


#IAMISACA: ANDREA TANG - SHORTER VERSION

In her #IamISACA story, Andrea Tang explains how her privacy expertise positions
her to be to a bridge between China and the rest of the world. Don't forget to
check out https://www.isaca.org/ for more information!

97 Views • 2 years ago

VIDEO


WELCOME TO THE NEW ISACA!

For more information: https://www.isaca.org/

243K Views • 2 years ago

VIDEO


NAVIGATING THE CHALLENGES OF A PANDEMIC

ISACA CEO David Samuelson discusses how flexibility and new approaches allowed
ISACA to work through the challenges presented by the pandemic in 2020. Find out
more by downloading ISACA’s 2020 Annual Report at www.isaca.org/annual-report.

265 Views • 2 years ago

VIDEO


WE ARE ISACA

ISACA members from around the world weigh in on why the association matters and
the impact it has had—from certifications and career advancement, to enterprise
training, tools and transformation. Don't forget to check out
https://www.isaca.org/ for more information!

695 Views • 2 years ago

VIDEO


#IAMISACA: JAMES PAUL KAKEMBO

James Paul Kakembo talks about how emerging tech is changing the landscape of
his career in Uganda. For more #IamISACA stories, visit www.isaca.org/iamisaca.

242 Views • 2 years ago

VIDEO


IAMISACA: RAVAKA RAKOTOZAFY

ISACA Quebec City Chapter member Ravaka Rakotozafy shares her #IamISACA story
about gaining early momentum in her career after relocating from Madagascar to
Canada. Don't forget to check out https://www.isaca.org/ for more information!

226 Views • 2 years ago

VIDEO


IAMISACA: RAVAKA RAKOTOZAFY - SHORT VERSION

ISACA Quebec City Chapter member Ravaka Rakotozafy shares her #IamISACA story
about gaining early momentum in her career after relocating from Madagascar to
Canada. Don't forget to check out https://www.isaca.org/ for more information!

170 Views • 2 years ago

VIDEO


#IAMISACA - DAVID SAMUELSON

773 Views • 2 years ago

Credentialing

VIDEO


EXPLORING CISA MOTIVATIONS

CISA-certified professionals share what motivated them to pursue ISACA’s CISA
credential.

13 Views • 3 months ago

VIDEO


BENEFITS OF OBTAINING YOUR CISA

From meeting job requirements to more pay to increased standing in their
careers, CISA-holders detail some of the benefits they have gained from earning
the CISA.

16 Views • 3 months ago

VIDEO


TIPS ON PREPARING FOR YOUR ISACA CERTIFICATION

ISACA-certified professionals offer tips of how certification candidates can
position themselves for success on exam day.

29 Views • 3 months ago

VIDEO


HOW TO PROPEL YOUR IT AUDIT CAREER

IT auditors and audit leaders share insights from their careers and tips for
auditors new to the field and those looking to advance. Watch this video to
learn how to boost your audit career. To learn more, go to
https://www.isaca.org/campaigns/career-pathways

31 Views • last year

VIDEO


HOW TO PROPEL YOUR IT AUDIT CAREER

IT auditors and audit leaders share insights from their careers and tips for
auditors new to the field and those looking to advance. Watch this video to
learn how to boost your audit career. To learn more, go to
https://www.isaca.org/campaigns/career-pathways

22 Views • last year

VIDEO


ISACA IT AUDIT CAREER PATHWAYS

ISACA provides you with the resources you need to take the next step in your IT
Audit career. Click to learn more,
https://www.isaca.org/campaigns/career-pathways

166 Views • last year

VIDEO


THE ISACA CERTIFICATION ACRONYM CHALLENGE: NO WRONG ANSWERS!

No matter how you pronounce the acronyms, ISACA's certifications are highly
regarded and in-demand by digital trust professionals and their organizations
around the globe.

571 Views • 361 days ago

VIDEO


LEARN ABOUT THE VALUE OF BECOMING AN ISACA ACCREDITED TRAINING ORGANIZATION

We invite you to view this short video to learn more about the ISACA Accredited
Training Partner Program and how it can help IT Training organizations
differentiate themselves by delivering ISACA’s globally recognized Credentials
and Training. For more information, check out:
https://www.isaca.org/partnerships/become-a-training-partner

251 Views • 1 year ago

VIDEO


CREATE A SUCCESSFUL CAREER PATH WITH ISACA

ISACA has the resources, credentials and training options to guide IT
professionals in their steps to create a successful, fulfilling career path at
any level.

221 Views • 1 year ago

VIDEO


ISACA PRIVACY MONTH - JANUARY 2023!

Privacy Awareness Month is here–as are continuing threats to your organization.
Today’s privacy practitioners are challenged to keep pace with the ever-evolving
technology space. ISACA is raising awareness about the importance of privacy and
Digital Trust by offering valuable resources for understanding trends and
solutions to overcome privacy challenges. Learn More: http://www.isaca.org/cdpse

162 Views • 1 year ago

VIDEO


WHAT CAN ISACA CERTIFICATIONS DO FOR YOU?

ISACA certification holder Bruno Horta Soares shares how ISACA certifications
gave him credibility and recognition in his career. Bruno, a CISA, CRISC, and
CGEIT certification holder, shares what motivated him to get certified. Hear
how, no matter how his career focus changed, he could o benefit from ISACA
certifications, prove his commitment to high standards of professionalism and be
successful across multiple aspects such as IS/IT audit, security, risk, and
governance. Learn more about ISACA certifications:
https://www.isaca.org/credentialing 00:00:01 What's your current role in your
organization? 00:00:44 How long have you been certified, and what motivates you
to stay certified? 00:01:54 How likely are you to recommend getting certified?

1K Views • 1 year ago

VIDEO


CYBERSECURITY AT ISACA

Our ever-changing world relies on the power of professionals like you to defend
against potential cybersecurity threats. ISACA has the training, credentialing,
networking, resources and so much more that prepare you for what tomorrow
brings. Learn more at isaca.org/resources/cybersecurity

18K Views • 1 year ago

VIDEO


WHAT CAN ISACA CERTIFICATIONS DO FOR YOU? HEAR FROM CERTIFICATION HOLDERS

ISACA certification holders share how ISACA certifications gave them credibility
and recognition in their careers. http://bit.ly/2P3Xz2i Bruno, CISA, CRISC,
CGEIT shares what motivated him to get certified. Hear how, no matter how his
career focus changed, he was able to benefit from ISACA certifications, prove
his commitment to high standards of professionalism and be successful across
multiple aspects such as IS/IT audit, security, risk and governance. Learn more
about ISACA certifications: http://bit.ly/2P3Xz2i

5K Views • 1 year ago

VIDEO


IS/IT CERTIFICATIONS VALIDATE CREDIBILITY AND COMMITMENT TO LEARNING

ISACA certification holders share their experience, citing significant
improvements in engagement and performance in themselves as well as their
mentees and staff. http://bit.ly/2P3Xz2i Hear from a Certified Information
Systems Auditor® (CISA®) certification holder on how CISA brings built-in brand
recognition, validates his expertise, and helps him be nimble in an
ever-evolving technology landscape. Since CISA’s inception in 1978, ISACA now
has 151,000+ CISA holders worldwide. CISA is a building block for your career
success, no matter which aspect of IS/IT you are focused on. Learn more about
ISACA certifications: http://bit.ly/2P3Xz2i

904 Views • 1 year ago

VIDEO


ISACA'S CET - CLOUD CERTIFICATE

By successfully passing the Cloud Fundamentals exam, you’ll obtain the
certificate that affirms your understanding of basic cloud computing principles,
concepts and more. The knowledge and performance-affirming CET Cloud
Fundamentals Certificate validates your know-how and practical skills in cloud
governance and service supporters and your ability to use open-source cloud
technologies. Like the other modules of ISACA’s CET, Cloud Fundamentals helps
you hone and prove expertise, and moves you farther down the road to obtaining
your CET Certification. For more information, visit:
https://www.isaca.org/credentialing/cet/cloud-fundamentals-certificate

1K Views • 1 year ago

VIDEO


WHY EMPLOYERS VALUE THE CDPSE

CDPSE-holder Yunique Demann explains how the CDPSE certification demonstrates
technical privacy skills to prospective employers.

1K Views • 2 years ago

VIDEO


ISACA’S CERTIFIED IN EMERGING TECHNOLOGY CERTIFICATION

Build on your IT knowledge and skills in four leading-edge, in-demand emerging
technology domains. Obtain four knowledge- and performance-enhancing
certificates that stack up to earn you the career-accelerating ISACA® Certified
in Emerging Technology™ (CET) Certification. ISACA’s CET affirms you have what
it takes to apply in-demand emerging tech expertise to your current or future
role in IT audit, risk, security, cybersecurity, governance, privacy or business
growth. CET hands-on performance learning techniques build and reinforces vital
practical skills required to leverage emerging technology in your daily job. As
the next best thing to real-world experience, CET validates that you’re ready to
advise, assess and implement today’s leading-edge emerging technologies and
deliver their rewards to your enterprise or clients. For more information, check
out https://www.isaca.org/credentialing/cet

1K Views • 2 years ago

VIDEO


ISACA’S CERTIFIED IN EMERGING TECHNOLOGY CERTIFICATION

Build on your IT knowledge and skills in four leading-edge, in-demand emerging
technology domains. Obtain four knowledge- and performance-enhancing
certificates that stack up to earn you the career-accelerating ISACA® Certified
in Emerging Technology™ (CET) Certification. ISACA’s CET affirms you have what
it takes to apply in-demand emerging tech expertise to your current or future
role in IT audit, risk, security, cybersecurity, governance, privacy or business
growth. CET hands-on performance learning techniques build and reinforces vital
practical skills required to leverage emerging technology in your daily job. As
the next best thing to real-world experience, CET validates that you’re ready to
advise, assess and implement today’s leading-edge emerging technologies and
deliver their rewards to your enterprise or clients. For more information, check
out https://www.isaca.org/credentialing/cet

896 Views • 2 years ago

Enterprise Performance

VIDEO


ACADEMIC AND WORKFORCE DEVELOPMENT PARTNERSHIP PROGRAM

Learn more about ISACA’s Academic and Workforce Program and how it can benefit
your institution and its students. Our customizable program provides in-demand
skills and credentials to begin a career in IT audit, risk, security,
cybersecurity, governance, or privacy. For more information, please visit
https://www.isaca.org/academic-partnership

39 Views • last year

VIDEO


CMMI TECH TALK: USING THE ORGANIZATIONAL BEHAVORIAL TOOLKIT

Learn how to use the CMMI Organizational Behavior Toolkit. For more information,
visit https://cmmiinstitute.com/

106 Views • last year

VIDEO


THE VALUE OF INTERNAL APPRAISAL TEAM MEMBERS (ATMS) IN MDDAP

Hear the benefits of training your internal staff to become experts on the CMMI
model and participate on your next MDDAP Appraisal.

131 Views • 1 year ago

VIDEO


CMMI LEAD APPRAISERS: WHAT THEY DO AND THE VALUE THEY OFFER

Learn what a CMMI Lead Appraiser is, their goals, and the value they can bring
organizations through CMMI and MDDAP appraisals. For more information, go to
https://www.isaca.org/enterprise/performance-improvement-solutions

128 Views • 1 year ago

VIDEO


CASE STUDY: HOW INNOVIZE WAS ABLE TO GENERATE HIGHER QUALITY OUTPUTS MORE
RELIABLY

See how Contract Manufacturer Innovize improved organizational performance with
participation in the Case for Quality collaborative community Voluntary
Improvement Program (VIP) using the Medical Device Discovery Appraisal Program
(MDDAP). For more information, go to
https://www.isaca.org/enterprise/performance-improvement-solutions

149 Views • 1 year ago

VIDEO


CMMI TECH TALK: DATA MANAGEMENT PRACTICE AREA OVERVIEW

In this video, you will get a brief overview of one of the new Practice Areas
from the CMMI Model, known as Data Management (DM).
https://cmmiinstitute.com/cmmi/data

139 Views • 1 year ago

VIDEO


CMMI TECH TALK: COURSE TAILORING GUIDANCE

In this tech talk we will explore how CMMI classes can be tailored by
instructors based on student needs and instructor preferences according to ISACA
tailoring rules.

68 Views • 1 year ago

VIDEO


CMMI TECH TALK: DATA QUALITY PRACTICE AREA OVERVIEW

In this video, you will get a brief overview of one of the new Practice Areas
from the CMMI Model, known as Data Quality (DQ).
https://cmmiinstitute.com/cmmi/data

146 Views • 1 year ago

VIDEO


CMMI TECH TALK: LEARNER CENTERED PRINCIPLES

In this CMMI Tech Talk, we’ll summarize the seven Learner Centered Principles
used in CMMI classes.
https://www.isaca.org/enterprise/cmmi-performance-solutions

87 Views • 1 year ago

VIDEO


CMMI TECH TALK: WHAT IS A SOLUTION?

In this video, we will explore what the term “solution” means in the context of
a CMMI Practice Area or Practice.
https://www.isaca.org/enterprise/cmmi-performance-solutions

103 Views • 1 year ago

VIDEO


CMMI TECH TALK: USING CMMI TO IMPROVE AN ISO9001 OR AS9100 QMS

In this CMMI Tech Talk, we are going to explore how CMMI, ISO9001, and AS9100
work together to improve a quality management system.
https://www.isaca.org/enterprise/cmmi-performance-solutions

135 Views • 1 year ago

VIDEO


CMMI TECH TALK: APPRAISING GOVERNANCE (GOV) AND IMPLEMENTATION INFRASTRUCTURE
(II)

In this tech talk we will explore the role that senior management plays in
supporting performance and process improvement efforts and how the Sustaining
Habit and Persistence Practice Areas are appraised.
https://cmmiinstitute.com/learning/appraisals

448 Views • 1 year ago

VIDEO


VALUE OF ISACA: ENTERPRISE SOLUTIONS

Discover how ISACA’s enterprise solutions enhance the ability of people,
organizations, processes, and technology to create and maintain a better digital
world. Our enterprise offerings in team training, performance improvement
solutions and partnership opportunities have helped drive innovation and
education globally. Learn more at isaca.org/enterprise

151 Views • 1 year ago

VIDEO


CMMI TECH TALK: NAVIGATING THE DIFFERENT FRAMEWORKS

Understand and navigate the different models and frameworks. Understand how CMMI
fits in the different models and frameworks and how it can be used alongside the
other models and frameworks.
https://www.isaca.org/enterprise/cmmi-performance-solutions

252 Views • 1 year ago

VIDEO


CMMI TECH TALK: CMMI AND AGILE

Learn more about integrating CMMI and agile.
https://www.isaca.org/enterprise/cmmi-performance-solutions

328 Views • 1 year ago

VIDEO


CMMI TECH TALK: USING THE PERFORMANCE REPORT TO PROVIDE VALUE

Discover how the appraisal team can use the Performance Report to provide value
to the appraised organization.
https://www.isaca.org/enterprise/cmmi-performance-solutions

183 Views • 1 year ago

VIDEO


CMMI TECH TALK: THE PERFORMANCE REPORT: VALIDATING THE PERFORMANCE REPORT

Learn more about how an appraisal team validates the performance report during
the conduct phase of an appraisal.
https://www.isaca.org/enterprise/cmmi-performance-solutions

204 Views • 1 year ago

VIDEO


CMMI TECH TALK - APPRAISAL ROLES: APPRAISAL SPONSOR: AFTER THE APPRAISAL

The Appraisal Sponsor's responsibilities and expectations after an appraisal
have concluded. Click here for more information:
https://www.isaca.org/enterprise/cmmi-cybermaturity-platform?gclid=Cj0KCQiAm5ycBhCXARIsAPldzoX0ko3MgtB-Um8MC3Jrri2qFkCv7aFokT1ZN8G5mWiCXzJZuZSdOtkaAjPyEALw_wcB

373 Views • 1 year ago

VIDEO


CMMI TECH TALK - APPRAISAL ROLES: APPRAISAL SPONSOR: DURING THE APPRAISAL

The Appraisal Sponsor's responsibilities during the conduct phase of the
appraisal. Click here for more information:
https://www.isaca.org/enterprise/cmmi-cybermaturity-platform?gclid=Cj0KCQiAm5ycBhCXARIsAPldzoX0ko3MgtB-Um8MC3Jrri2qFkCv7aFokT1ZN8G5mWiCXzJZuZSdOtkaAjPyEALw_wcB

214 Views • 1 year ago

VIDEO


CMMI TECH TALK: APPRAISAL ROLES: APPRAISAL SPONSOR: BEFORE THE APPRAISAL

In this CMMI Tech Talk, we talk about the role and expectations of the Appraisal
Sponsor before an appraisal begins.

260 Views • 1 year ago

VIDEO


HOW TO GET STARTED WITH CMMI: ADOPTION AND TRANSITION GUIDANCE

A review of the Adoption and Transition Guidance, one of the many adoption
guidance materials available from with the CMMI Product Suite. The Adoption and
Transition Guidance is a great tool to help organizations new to CMMI or those
who are evolving with CMMI new content. Additional CMMI Content:
https://youtu.be/qImzALUL9kY
https://cmmiinstitute.com/resource-files/public/v2-0-materials/cmmi-v2-0-adoption-and-transition-guide

540 Views • 1 year ago

VIDEO


CMMI TECH TALK: HOW TO PROPERLY IDENTIFY STRENGTHS

Discover how to identify a gratuitous strength and learn how to write proper
strength statements. For more information, check out
www.isaca.org/enterprise/cmmi-cybermaturity-platform

328 Views • 1 year ago

VIDEO


CMMI TECH TALK: HOW TO HANDLE COMMON APPRAISAL ISSUES

How to handle appraisal issues and understand when to stop an appraisal. For
more information, check out www.isaca.org/enterprise/cmmi-cybermaturity-platform

341 Views • 1 year ago

VIDEO


CMMI TECH TALK: QUALITY AUDITS

A review of the quality audit process from what triggers an audit, what an audit
entails, and what are the possible results of the audit. For additional
information, check the links below:
https://cmmiinstitute.com/resource-files/public/quality/quality/cmmi%C2%A9-appraisal-%E2%80%93-sponsor-role-and-responsibilitie
https://cmmiinstitute.com/resource-files/public/quality/quality/cmmi%c2%a9-appraisal-%e2%80%93-sponsor-role-and-responsibilitie
https://cmmiinstitute.com/resource-files/public/quality/quality/quality-remedial-and-corrective-actions-policy
https://cmmiinstitute.com/resource-library/public/quality/policies/cmmi-quality-audit-policy
https://cmmiinstitute.com/partners/policies
https://cmmiinstitute.com/resource-files/public/quality/quality/policies/code-of-professional-conduct

640 Views • 1 year ago

VIDEO


LEARN ABOUT THE VALUE OF BECOMING AN ISACA ACCREDITED TRAINING ORGANIZATION

We invite you to view this short video to learn more about the ISACA Accredited
Training Partner Program and how it can help IT Training organizations
differentiate themselves by delivering ISACA’s globally recognized Credentials
and Training. For more information, check out
https://www.isaca.org/en/enterprise/partner-with-isaca

335 Views • 1 year ago

VIDEO


ELEVATE ORGANIZATIONAL PERFORMANCE WITH CMMI

CMMI’s performance improvement model has helped thousands of globally recognized
companies over the last 30+ years. Watch how CMMI can help organizations quickly
understand their current level of capability and performance and offer a guide
to optimize business results.

767 Views • 1 year ago

VIDEO


HOW TO GET STARTED WITH CMMI

How to properly get started with CMMI adoption and how to choose a reputable
consultant to help your organization on its performance improvement journey.
https://www.isaca.org/enterprise/cmmi-performance-solutions

2K Views • 2 years ago

VIDEO


MARK THOMAS: BENEFITS OF ENTERPRISE TEAM TRAINING

Mark Thomas, founder of Escoute Consulting, provides his perspectives on the
benefits and positive outcomes of ISACA Team Training for students, teams, and
team leaders, why it is worth the investment, and the ROI for organizations.
Watch as Mark Thomas addresses these quick questions about ISACA Team Training.
For more information, check out isaca.org/enterprise/enterprise-training

308 Views • 2 years ago

VIDEO


ENTERPRISE DIRECT SERIES

ISACA is globally known for professional IT credentials. But did you know we
help enterprises train IT teams for the changing technology landscape? Make your
teams work better and smarter. For more information check out
isaca.org/enterprise-training

489 Views • 2 years ago

VIDEO


WHAT IS MDDAP?

In highly regulated industries like health care, it is imperative to meet
compliance standards. ISACA, in collaboration Medical Device Innovation
Consortium, the Food & Drug Administration, and industry stakeholders have
developed the Case for Quality Voluntary Improvement Program, or VIP, to help
shift the mindset of medical device manufacturers beyond compliance and towards
continuous improvement. VIP leverages ISACA's Medical Device Discovery Appraisal
Program, or MDDAP, which is a tailored version of the CMMI Maturity Model
Framework and appraisal methodology for the medical device industry. For more
information, check out
https://www.isaca.org/enterprise/medical-device-discovery-appraisal-program

597 Views • 2 years ago

VIDEO


CMMI TECH TALK: THE PERFORMANCE REPORT

For more information, check out -
https://www.isaca.org/enterprise/cmmi-cybermaturity-platform?gclid=Cj0KCQjw5-WRBhCKARIsAAId9Fm-gpm9jvXuMys6p0p6qqiEdUBhBz7VcAWY4FWbOyoHHSTrMfj2H3AaAou2EALw_wcB

1K Views • 2 years ago

VIDEO


CMMI TECH TALK: HOW TO APPRAISE SMALL VS. LARGE ORGANIZATIONS

For more information, check out -
https://www.isaca.org/enterprise/cmmi-cybermaturity-platform?gclid=Cj0KCQjw5-WRBhCKARIsAAId9Fm-gpm9jvXuMys6p0p6qqiEdUBhBz7VcAWY4FWbOyoHHSTrMfj2H3AaAou2EALw_wcB

427 Views • 2 years ago

ISACA Foundation

VIDEO


2023 ACADEMIC SCHOLARSHIP PROGRAM RECAP

Read more about the scholarship program:
https://isaca.secure-platform.com/a/page/oitscholarship/aboutscholarships

11 Views • 6 months ago

VIDEO


SHELEADSTECH CHAPTER LIAISON QUARTERLY MEETING, MAY 2023

Recording of SheLeadsTech Chapter Liaison Quarterly Meeting held virtually on 18
May 2023 at 10:00 AM CDT. Please visit the Chapter Leader Exchange via ISACA's
Engage Online Platform to access accompanying slide deck and further discussion.
Please also email info@oneintech.org to access the SheLeadsTech Liaison
Quarterly Report.

33 Views • 1 year ago

VIDEO


SHELEADSTECH AMBASSADOR SEMI-ANNUAL MEETING, MAY 2023

Recording of SheLeadsTech Ambassador Semi-Annual Meeting held virtually on 16
May 2023 at 11:00 AM. Please visit the SheLeadsTech community via ISACA's Engage
Online Platform to access accompanying slide deck and further discussion. Please
also email info@oneintech.org to access the SheLeadsTech Ambassador Quarterly
Report.

21 Views • 1 year ago

VIDEO


LEARN MORE ABOUT ISACA FOUNDATION, PART 4

Building diversity and inclusion in Cyber and IT Audit careers is one of the
ways to address the workforce crisis and ensure innovation that meets all
perspectives. ISACA Foundation is a way for ISACA to philanthropically support
the mission of advancing the professional space. ISACA Foundation seeks to
create a healthy digital world that is safe, secure, and accessible for all.

171 Views • 1 year ago

VIDEO


LEARN MORE ABOUT ISACA FOUNDATION, PART 3

Building diversity and inclusion in Cyber and IT Audit careers is one of the
ways to address the workforce crisis and ensure innovation that meets all
perspectives. ISACA Foundation is a way for ISACA to philanthropically support
the mission of advancing the professional space. ISACA Foundation seeks to
create a healthy digital world that is safe, secure, and accessible for all.

114 Views • 1 year ago

VIDEO


LEARN MORE ABOUT ISACA FOUNDATION, PART 2

Building diversity and inclusion in Cyber and IT Audit careers is one of the
ways to address the workforce crisis and ensure innovation that meets all
perspectives. ISACA Foundation is a way for ISACA to philanthropically support
the mission of advancing the professional space. ISACA Foundation seeks to
create a healthy digital world that is safe, secure, and accessible for all.

112 Views • 1 year ago

VIDEO


LEARN MORE ABOUT ISACA FOUNDATION, PART 1

Building diversity and inclusion in Cyber and IT Audit careers is one of the
ways to address the workforce crisis and ensure innovation that meets all
perspectives. ISACA Foundation is a way for ISACA to philanthropically support
the mission of advancing the professional space. ISACA Foundation seeks to
create a healthy digital world that is safe, secure, and accessible for all.

124 Views • 1 year ago

VIDEO


ISACA FOUNDATION: BUILDING THE FUTURE OF DIGITAL TRUST

By building pathways and pipelines into digital trust careers for the
under-represented, we can make real progress in bridging the workforce gap.
ISACA Foundation works globally with ISACA chapters, enterprises, and key
stakeholders to remove barriers by providing scholarships, resources, and tools
that will change the face of digital trust.

745 Views • 1 year ago

VIDEO


SHELEADSTECH KEYNOTE: POWER OF AUTHENTICITY IN THE WORKPLACE

There is a human side to technology. Professionals at all levels have struggles,
personal priorities, goals and obligations. Many have expertise, knowledge,
gifts, and talents that are deactivated, underutilized, untapped, or unknown in
the workplace, yet very valuable. This session will discuss the power of
authenticity in the workplace and why leadership should intentionally embrace
multipotentiality. ISACA member, Executive Coach, and Empowerment Speaker,
Belinda Enoma discusses the struggles people face in their careers in their
quest for elevation and empowers the audience to value their brilliance and
fearlessly pursue their goals. For more information, check out
https://oneintech.org/

579 Views • 2 years ago

VIDEO


ISACA FOUNDATION: A RE-INTRODUCTION & MASTERCLASS: WOMEN IN TECH, AUTHENTIC
ALLYSHIP AND INTENTIONAL LEADERSHIP

Ginger Spitzer shares the new strategic direction of the foundation. Later,
ISACA Member, Cybersecurity Leader, and Empowerment Speaker Belinda Enoma
converses with Hollee Mangrum-Willis. This discussion focuses on the issues
women face in the industry and strategies for purposeful and impactful
improvement/change.

481 Views • 2 years ago

VIDEO


DIVERSITY BY DESIGN

Why is the achievement of gender balance critical to the viability and trust of
the industry? Jenai Marinkovic, Virtual CISO & CTO of Tiro Security, answers
this question in a short clip from ISACA's latest live video, "Breaking the Bias
for Women in Tech." Watch the full video at https://youtu.be/24n7K-pKTEU

205 Views • 2 years ago

VIDEO


BREAKING THE BIAS FOR WOMEN IN TECH

On International Women's Day, ISACA Foundation hosted a conversation on breaking
the bias for women in tech. What biases are still prevalent? How can male allies
help? Why is intersectionality a crucial part of this conversation? Watch this
episode of ISACA Live for these answers and more.

243 Views • 2 years ago

VIDEO


ISACA FOUNDATION 2021 YEAR IN REVIEW

Our first year of programming has been a transformative time for ISACA
Foundation, and we have much more to come. Thank you for your support and
dedication to making cyber professions accessible to all.

243 Views • 2 years ago

VIDEO


ISACA LIVE - ONEINTECH

In this episode of ISACA Live, join Hollee Mangrum-Willis as she talks to Jo
Stewart-Rattray (Vice President, Communities - Australian Computer Society)
about the state of women in Cybersecurity in Oceania and worldwide and how we
can bring awareness to the issue of gender balance in the Cybersecurity field.
Jo and Hollee also discuss how they have worked to set work/life balance
boundaries during the pandemic, changing the language within your sphere of
influence, career pathing for women and what allies can do for all genders in
Cybersecurity.

200 Views • 2 years ago

VIDEO


CELEBRATING WOMEN IN TECH

ISACA women leaders in tech give their best career advice to women who are
looking to enter the field! Learn more about ISACA and ISACA Foundation’s
SheLeadsTech program, which empowers women to enhance their professional skills
and advocate for their career advancement.

426 Views • 2 years ago

IT Trends

VIDEO


CCP CMMI EXPLAINER

Cybersecurity is a huge challenge for companies today. Every organization has
unique vulnerabilities. Cyber threats are growing and so are the costs of
failure. ISACA's CMMI Cyber Maturity Platform meets these challenges head on.
For more information, check out
https://www.isaca.org/enterprise/cmmi-cybermaturity-platform

302 Views • 1 year ago

VIDEO


STATE OF PRIVACY 2023

Privacy is an essential component of digital trust—so how does your organization
compare to others when it comes to privacy trends, challenges, budgets, and
approaches? Learn about the latest global ISACA research and get key findings on
the privacy workforce, privacy skills, privacy by design, and the future of
privacy.

1M Views • 1 year ago

VIDEO


2023 TECH PREDICTIONS AND PRIORITIES

Chris Dimitriadis, Chief Global Strategy Officer at ISACA, shares his
predictions for the industry for 2023. Listen in as Chris explains his
predictions around digital trust, the skills gap, securing the supply chain, and
quantum computing. Please like and subscribe for more updates from ISACA.

585 Views • 1 year ago

VIDEO


ISACA STATE OF PRIVACY 2022

Join Safia Kazi, Privacy Professional Practices Associate at ISACA, as she
breaks down the key findings, stats and figures from the latest ISACA State of
Privacy 2022 report. With over 27,000 participants, the recent study reveals
exciting discoveries and shocking truths regarding the current state of the
industry, the differences in funding and staffing between technical privacy
teams and legal/compliance privacy teams and so much more. For more information,
be sure to check out
https://store.isaca.org/s/community-event?id=a334w000004cmroAAA

531 Views • 1 year ago

VIDEO


EPIC FAILS OF THE CYBERSECURITY INDUSTRY

The cyber security industry was founded to protect businesses from getting
breached. Simple. Yet, since the first computer virus was reported more than
three decades ago – breaches have increased exponentially year after year, after
year. In the last year alone just over eight and a half billion records were
reported as breached. At ISACA Oceania Conference 2021, Richard Hollis, Director
of Risk Crew, spoke on “Epic Fails of the Cybersecurity Industry” and started a
controversial conversation. Mr. Hollis believes and clearly showcases his
feeling that the industry has failed with its core objective – miserably. Could
it be that the cyber security industry is, in fact, NOT designed to stop
breaches? Check out this video as Mr. Hollis breaks down the statistics that are
everywhere and overwhelming. For More Information, Don't Forget to Check Out -
https://www.isaca.org/training-and-events/conferences

1K Views • 1 year ago

VIDEO


PRIVACY IN PRACTICE 2021 REPORT

Don't forget to check out https://www.isaca.org/ for more information!

722 Views • 2 years ago

VIDEO


TOP TECH RISKS FOR 2021

As organizations plan for the year ahead, the COVID-19 world has reshaped the
landscape of technology risks. In September/October 2020, ISACA and Protiviti
conducted a global survey of more than 7,400 IT audit leaders and professionals
to obtain their perspectives on the top technology risks their organizations
will face in 2021. Explore these in this video and the new report:
https://www.isaca.org/go/2020-isaca-protiviti-global-it-audit-benchmarking-survey.

981 Views • 2 years ago

VIDEO


JOIN PRIVACY IN PRACTICE EMCEE SAFIA KAZI ONLINE, 8 DECEMBER 2020

459 Views • 2 years ago

VIDEO


MANAGE AND CONQUER DATA AND PRIVACY ISSUES WITH ISACA

Chief Product Officer, Nader Qaimari, talks about ISACA’s current and future
plans to help IS/IT professionals overcome privacy issues that keep them up at
night.

407 Views • 2 years ago

VIDEO


TECHNICAL PRIVACY KNOWLEDGE: IN-DEMAND

CDPSE-holder Yunique Demann offers her perspective on why privacy has become one
of the hottest areas of job growth for information and technology professionals.

325 Views • 2 years ago

VIDEO


UNDERSTANDING PRIVACY AT THE DESIGN LEVEL

Mohammed J. Khan says that ISACA’s CDPSE certification enables professionals to
understand how privacy works at the design level throughout the enterprise.

466 Views • 2 years ago

Podcasts

VIDEO


THE CYBER STANDARD PODCAST | EPISODE 4

Welcome to Episode 4 of "The Cyber Standard Podcast"! Join host Ameet Jugnauth,
Vice President of the London Chapter of ISACA, as he delves into the world of
cybersecurity standardization. In this episode, titled "Becoming a License
Body," Ameet is joined by esteemed guests Bryan Lillie, Strategic Technical Lead
at the UK Cyber Security Council, and Peter Leitch, Co-Founder and Managing
Partner at ANSEC. Together, they explore the intricacies of licensed bodies in
shaping the cyber profession. Don't miss this insightful conversation! Explore
Further: Delve deeper into the subject with additional resources provided in the
episode description.
https://www.isaca.org/about-us/newsroom/press-releases/2023/uk-cyber-security-council-partners-with-isaca-for-audit-and-assurance-pilot-scheme

18 Views • 9 days ago

VIDEO


ISACA LIVE: THE AI REALITY--WHERE WE ARE NOW AND WHERE WE NEED TO BE

ISACA's Karen Heslop and Jon Brandt share the results of ISACA's 2024 AI Pulse
Poll, including where organizations are now in terms of policy, training, ethics
and more--and where they need to be. Get the survey results, see how your
organization compares, and learn about the resources ISACA has to help you
navigate your future in an AI world.

13 Views • 2 months ago

VIDEO


ISACA LIVE | 2024 NORTH AMERICA CONFERENCE PREVIEW WITH AADEEL AKHTAR

Aadeel Akhtar, PhD, CEO and Founder of PSYONIC, a company developing advanced
bionic limbs that are accessible to humans and robots, will speak at ISACA 2024
North America Conference on Friday, 10 May, hosted both in Phoenix, AZ, and
virtually. Aadeel speaks to ISACA's Paul Phillips about the upcoming conference,
how AI is revolutionizing prosthetics, and the risks of integrating AI and
robotics into healthcare.

21 Views • 2 months ago

VIDEO


EFFECTIVE THIRD PARTY RISK MANAGEMENT IN 2024: AI’S IMPACT AND FUTURE TRENDS

Traditional security questionnaires just aren't cutting it anymore. Tune into
this ISACA Podcast episode, Chris McGowan chats with VISO TRUST CEO and
Co-founder, Paul Valente as they delve into the evolving landscape of
Third-Party Risk Management (TPRM), exposing the limitations of current methods
and exploring how emerging AI trends are shaping a more secure future and
driving more effective third-party risk management programs. To learn more about
VISO Trust please go to https://visotrust.com/

22 Views • 3 months ago

VIDEO


UNLOCKING STRATEGIC VALUE FROM A BUG BOUNTY PROGRAM

Are you curious about how to maximize the strategic value and impact of your bug
bounty program? In this episode, you can learn how Adobe continuously develops
and improves its bounty program to engage security researchers and hackers
globally and improve its security posture from an adversary perspective. In this
ISACA Podcast, Chris McGown, ISACA's Information Security Professional Practices
Principal, chats with Alex Stan, Product Security Engineer and member of the
Product Security Incident Response Team (PSIRT), discusses the value of bug
bounty programs and shares how you can develop a metrics-driven approach to
enhance the internal security testing and detection capabilities of your
organization. Explore Further: Delve deeper into the subject with additional
resources
https://blog.developer.adobe.com/adobe-announces-researcher-hall-of-fame-initiative-for-security-researchers-5e677286dbd6
https://blog.developer.adobe.com/researcher-q-a-aem-solution-architect-by-day-adobe-bug-bounty-hunter-by-night-aed39a4750e4
https://blog.developer.adobe.com/attention-security-researchers-level-up-your-skills-and-join-our-private-bug-bounty-program-2da9d5979d8b
https://blog.developer.adobe.com/adobe-recap-2023-ambassador-world-cup-final-four-df701e1a1b12

27 Views • 4 months ago

VIDEO


THE CYBER STANDARD PODCAST | EPISODE 2

Welcome to Episode 2 of "The Cyber Standard Podcast"! Join host Ameet Jugnauth,
Vice President of the London Chapter of ISACA, as he delves into the intricacies
of cybersecurity standardization. In this episode, titled "Audit and Assurance,"
Ameet is joined by esteemed guests Leanne Sperry, Project Manager for Standards
Development at the UK Cyber Security Council, and Mike Hughes, the ISACA
Immediate Past President for ISACA Central UK. Together, they explore key
challenges, lessons learned, and insights from related workshops in the realm of
Audit and Assurance. Don't miss this insightful conversation! Explore Further:
Delve deeper into the subject with additional resources provided in the episode
description.
https://www.isaca.org/about-us/newsroom/press-releases/2023/uk-cyber-security-council-partners-with-isaca-for-audit-and-assurance-pilot-scheme

28 Views • 4 months ago

VIDEO


THE CYBER STANDARD PODCAST | EPISODE 3

Welcome to Episode 3 of "The Cyber Standard Podcast"! Join host Ameet Jugnauth,
Vice President of the London Chapter of ISACA, as he delves into the essential
aspects of applying for and assessing candidates in the cybersecurity field. In
this episode, titled "How to Apply," Ameet is joined by distinguished guests
Ethan Duffell, representing the UK Cyber Security Council, and Allan Broadman,
Director of CyberAdvisor London. Together, they shed light on the launch of
specializations and the significance of professional standards in the
cybersecurity sector. Don't miss this insightful conversation! Explore Further:
Delve deeper into the subject with additional resources provided in the episode
description.
https://www.isaca.org/about-us/newsroom/press-releases/2023/uk-cyber-security-council-partners-with-isaca-for-audit-and-assurance-pilot-scheme

11 Views • 4 months ago

VIDEO


ISACA LIVE | SHELEADSTECH - INTERNATIONAL WOMEN'S DAY

Join Kristine O'Sullivan from ISACA as she celebrates International Women's Day
alongside SheLeadsTech Advisory Council member Anna Murray and Sushila Nair,
Vice President of ISACA's Greater Washington D.C. Chapter.

17 Views • 4 months ago

VIDEO


THE CYBER STANDARD PODCAST - EPISODE 1

Tune in to the inaugural episode of "The Cyber Standard Podcast", “The Vision”!
Join host Ameet Jugnauth as he interviews Robin Lyons, ISACA Principal, IT Audit
Professional Practices, and Annmarie Dann, Director of Professional Standards at
the UK Cyber Security Council, in a compelling discussion about the
standardization of specialisms in cybersecurity. Explore the Council's and
ISACA's visions for the future, the significance of the Audit & Assurance
specialism, and the collaborative efforts between the two organizations. Don't
miss this insightful conversation that sets the stage for the podcast's journey
into the world of cybersecurity standardization. Explore Further: Delve deeper
into the subject with additional resources provided in the episode description.
https://www.isaca.org/about-us/newsroom/press-releases/2023/uk-cyber-security-council-partners-with-isaca-for-audit-and-assurance-pilot-scheme

2 Views • 5 months ago

VIDEO


REFLECTING ON 25 YEARS OF INFORMATION SECURITY MATTERS

ISACA recently marked the 25th anniversary of Steve Ross’ ISACA Journal
Information Security Matters column. Over the last quarter century, technology,
security, and the workforce have evolved, while certain challenges remain the
same. In this ISACA Podcast episode, Safia Kazi speaks to Steve about how he
started writing for the Journal, societal shifts in security’s perception, and
how writing skills are invaluable for anyone in the security industry.

28 Views • 5 months ago

VIDEO


A VIEW INTO CTEM EXPOSURE MANAGEMENT: REDUCING YOUR ATTACK SURFACE 3X

Organizations can no longer rely on legacy vulnerability management solutions to
protect against even basic attacks. Instead, vulnerability management is just
one small component in a unified continuous threat exposure management (CTEM)
approach to securing an enterprise from malicious intruders and ransomware. In
addition to vulnerability management, security around misconfigurations,
patching, identity, software, external attack surfaces, and more must be
included. In this ISACA Podcast, Nanitor Chief Strategist Derek Melber explains
that an organization can prevent breaches and ransomware by taking an
asset-centric prioritized-security approach that includes all of these security
areas.

11 Views • 5 months ago

VIDEO


ISACA LIVE | ISACA 2024 VIRTUAL CONFERENCE KEYNOTES PREVIEW

Our regional conference, 20-22 February, features three remarkable keynotes: RV
Raghu (Asia-Pac, 20 Feb), Mike Echols (Americas, 21 Feb) and Tichaona Zororo
(EMEA, 22 Feb). They are joined by ISACA's Paul Phillips for a preview of their
keynote presentations and the region-focused content at our upcoming event.

4 Views • 5 months ago

VIDEO


ISACA LIVE | DATA PRIVACY PRIORITIES IN 2024

Join Lisa McKee and Safia Kazi as they discuss the latest data privacy
challenges, priorities and opportunities, and share insights from ISACA's latest
Privacy in Practice 2024 research report.

27 Views • 6 months ago

VIDEO


LEVERAGING AGILE CONCEPTS FOR NEURODIVERSE AUDITORS

In this ISACA Podcast episode, we’ll delve into how leveraging Agile concepts
can mitigate common challenges neurodiverse auditors face in the workplace.
Neurodivergent auditors can bring a fresh and dynamic energy to projects if
given appropriate accommodation. Join us as ISACA's Robin Lyons chats with
Program External Audit IT Program Manager Amanda Tucker as they explore small
changes that can significantly impact not only neurodiverse individuals on your
team but the entire team itself.

18 Views • last year

VIDEO


IMPROVING SECURITY WHILE ENABLING MARKET ACCESS WITH A CCF

Software-as-a-Service (SaaS) providers continue to face increasing customer
demand to attain security compliance certifications that demonstrate commitment
to security, privacy, confidentiality, and more. Pursuing every national and
international certification individually results in a repetitive cycle of
ongoing walkthroughs, interviews, testing, and evidence requests (i.e., audits).
A central CCF can be considered a one-stop shop response to the complex alphabet
soup of compliance standards on the market today. In this ISACA Podcast episode,
ISACA's Chris McGowan listens in as James Huang, Global Cloud Compliance Senior
Manager explains why having a central CCF can help various product engineering
teams meet their security compliance needs and understand the level of effort
required for each compliance certification.

24 Views • last year

VIDEO


ISSUE MANAGEMENT CONFIDENTIAL: TOOLS AND BEST PRACTICES FOR IMPROVING IT ISSUE
MANAGEMENT

Effective IT issue management is crucial for organizations to mitigate financial
loss, reputational damage, and operational disruptions. Issue management tools
streamline the process by tracking and resolving issues, while risk rating helps
prioritize responses based on their impact and likelihood. In this ISACA Podcast
episode, ISACA's GRC Professional Practices Principal, Lisa Cook chats with IT
Risk Manager, Eric Peck about why acknowledging and addressing high-risk issues
with a structured approach empowers organizations to protect themselves and
ensure compliance in today's complex regulatory landscape.

40 Views • last year

VIDEO


ISACA PODCAST | MINIMIZING RISK AND AUDIT REQUESTS

With the increasing demand for audits and risk assessments, artifact requests
will not be going away anytime soon. However, the burden these activities bring
to the organization can be drastically reduced when audit and risk work
together. In this ISACA Podcast episode, Paul Phillips, Director of Event
Content Development at ISACA, hosts Staff Governance, Risk, and Compliance
Analyst, Benjamin Bartz. Ben takes a deeper dive and elaborates on some of the
must-haves for this partnership to live to its full potential.

25 Views • last year

VIDEO


ISACA LIVE: GENERATIVE AI: RISKS, OPPORTUNITIES AND CRITICAL NEXT STEPS

AI expert and author Raef Meeuwisse will share insights from ISACA's brand-new
generative AI research and outline the top concerns, opportunities and next
steps organizations should be taking.

18 Views • last year

VIDEO


EXPLORING THE BENEFITS OF NEURODIVERSITY WITHIN CYBERSECURITY

Neurodiversity within cybersecurity offers many benefits but requires
organizations and hiring managers re-evaluate hiring practices and job
descriptions typically structured for neurotypical applicants. Join ISACAs
Director of Professional Practices and Innovation as he hosts a conversation
with a company helping to remove barriers and maximize the value neurodiverse
talent bring to cybersecurity.

31 Views • last year

VIDEO


ISACA LIVE | CMMI MYTHBUSTING: MISCONCEPTIONS VS. REALITIES

ISACA's COO Simona Rollinson and CMMI Lead Appraisers discuss common
misconceptions around CMMI and what the reality is. Think CMMI is only for large
organizations? Think again. Is CMMI only for government contractors or software
development companies? No! Organizations from all industries across the globe
are using it. Watch for more! For more information, visit:
https://cmmiinstitute.com/

119 Views • last year

VIDEO


INTERNAL AUDITS THAT CREATE STAKEHOLDER VALUE ADOPTING AN AGILE MINDSET

Agile Scrum is a lightweight framework that promises to significantly improve
internal audits by creating a mindset that generates stakeholder value through
adaptive solutions for complex auditing problems. This mindset is needed as
organizations face unprecedented changes and pressures in today's business
landscape. Internal audits must keep leaders informed and aware of potential
risks. Such a mindset addresses some of the often-experienced auditing
challenges such as a lack of senior management support, insufficient audit
preparation time, difficult auditees and lack of time needed to write audit
results. Featuring special guest Thomas Bell and hosted by ISACA's Robin Lyons.

204 Views • last year

VIDEO


STRATEGIES FOR AVOIDING BURNOUT

Chronic workplace stress can lead to burnout, which poses a significant risk to
the mental health of busy professionals, such as auditors. But how can these
professionals protect themselves from burnout? And how can their employers help
them do so? If you are interested in learning the answers to these questions,
then watch as ISACA’s Robin Lyons and Dr. Elena Klevsky, Assistant Professor of
Accounting at the University of Tampa, discuss strategies for avoiding burnout.
Inspired by the Sustainable Model of Human Energy proposed by Ryan Quinn,
Gretchen Spreitzer and Chak Fu Lam, these strategies focus on managing your
personal energy by increasing resources, decreasing job demands, practicing
skills and tasks, and monitoring energy. Properly implementing these strategies
has the potential to help busy professionals ensure that they have sufficient
resources to meet their job demands, and, therefore, increase the likelihood
that they feel energized instead of exhausted.

219 Views • last year

VIDEO


THE DANGER OF DISTRACTION IN AUGMENTED REALITY

While users of technology are becoming more educated in how to avoid
cyberattacks such as phishing, a distracted user might be more prone to missing
signs of social engineering. This project explored whether users immersed in
augmented reality applications were more inclined to fall for an on-screen text
message that prompted familiarity (such as a friend calling in) or urgency (such
as a warning to update software or be subject to an automatic device re-boot
within a certain timeframe). Featuring special guest Sarah Katz and hosted by
ISACA's Collin Beder.

161 Views • 335 days ago

VIDEO


MANAGING HUMAN RISK REQUIRES MORE THAN JUST AWARENESS TRAINING

A comprehensive information security awareness program must be in place to
ensure that employees are aware of and educated about the threats they may
encounter at the workplace. The workforce needs to be prepared to know how to
respond to these threats. It all starts with a risk assessment to identity the
most critical of risks that need to be mitigated through preparedness. Making
security a part of the organization’s culture reduces these risks to an
acceptable level. Featuring special guest Chris Madeksho and hosted by ISACA's
Lisa Cook.

202 Views • 341 days ago

VIDEO


PREPARING FOR INTERRUPTIONS, DISRUPTIONS AND EMERGENCE EVENTS

This podcast speaks about how an Information Systems (IS) Auditor can prepare
for the Interruptions, Disruptions and the Emergence events that happen to the
business and to technology. Describing the features of Interruptions,
Disruptions and Emergence events and distinguishing the differences between
them, special guest Anantha Sayana outlines how the IS Auditor can prepare,
react, and contribute to all the three. Hosted by ISACA's Hollee Mangrum-Willis.

401 Views • 348 days ago

VIDEO


IS AUDIT IN PRACTICE: DATA INTEGRITY ON DEMAND

On this podcast, ISACA's Hollee Mangrum-Willis and special guest Cindy Baxter
discuss the disparities between American communities and access to electronic
health records. From there, they examine how key data insights from the ISACA
community can help us all be healthier.

205 Views • 356 days ago

VIDEO


PROCESSES OF ENGAGEMENT WITH SCOTT GOULD

Scott Gould is the author of 'The Shape of Engagement: The Simple Process Behind
how Engagement Works.' In this podcast, Scott gives a sneak peak at his upcoming
member-exclusive, CPE-eligible event. Scott will discuss the essential
frameworks for understanding and operationalizing engagement and building
enduring connections with your networks and communities.

241 Views • 1 year ago

VIDEO


DELIVERING SECURITY VALUE TO PRODUCT TEAMS USING THE POWER OF DATA

In security, aligning with product teams has never been more important,
especially when outmaneuvering adversaries. To foster a truly productive and
action-oriented cybersecurity culture, security teams must begin addressing
their product engineering counterparts as customers they serve rather than
entities they govern. In this podcast, ISACA’s Chris McGowan listens in as
Adobe’s Manager of Adversary Intelligence Gurpartap “GP” Sandhu provides unique
insight into how he’s bringing intrapreneurship to life in product security
through a key project that delivers actionable data that product teams can use
to enhance their security posture more rapidly. They’ll also discuss how his
team is harnessing strong adversary focus using the power of data and share
advice on how you can stay ahead of adversaries by better predicting their next
move in the ever-changing threat landscape. Tune into this ISACA Podcast to
learn more! Check out more from Adobe, https://www.adobe.com/trust.html For more
ISACA podcasts, www.isaca.org/podcasts

160 Views • 1 year ago

VIDEO


AI ETHICS AND THE ROLE OF IT AUDITORS

We, as a society, have always lived by certain norms that are driven by our
communities. These norms are enforced by rules and regulations, societal
influence and public interactions. But is the same true for artificial
intelligence (AI)? In this podcast we discuss and explore the answers to some of
the key questions related to the rapid adoption of AI, such as: What are the
risks associated with AI and the impact of its increasing adaption within almost
every industry? And, what role should we as IT Auditors should play in this fast
changing technological landscape? Hosted by ISACA's Hollee Mangrum-Willis and
featuring special guest Jai Sisodia.

502 Views • 1 year ago

VIDEO


USING A RISK-BASED APPROACH TO PRIORITIZE VULNERABILITY REMEDIATION

Organizations today struggle with vulnerability management. More specifically,
remediating vulnerabilities in a timely manner poses a challenge. With
vulnerability remediation backlogs growing at an alarming rate, what can
organizations do to meet their established remediation timelines and to protect
the organization from cybersecurity threats. Cybersecurity leader Ray Payano
will discuss the exponential increase in published vulnerabilities, the lack of
resources in cybersecurity to perform remediation and balancing remediation with
reduced maintenance windows. These challenges contribute to organizations
struggling with remediation backlogs. Ray will explain how calculating
vulnerability risk can help organizations prioritize their vulnerabilities based
on risk level to help determine the order in which vulnerabilities are
addressed. Hosted by ISACA's Chris McGowan.

324 Views • 1 year ago

VIDEO


THE TRUE COST OF A DATA BREACH

Guests Jack Freund and Natalie Jorion discuss the need for additional data for
quantitative risk analyses and methods to derive that data when it does not
exist. They cover how this was done in the past and their updated method for
interpolation of such data from record losses and other firmographic data. They
end with a discussion of the role of model validation and how it can enable
reliable risk management decision making. Hosted by ISACA's Safia Kazi.

270 Views • 1 year ago

VIDEO


2023 IT COMPLIANCE AND RISK BENCHMARK REPORT

Are you wondering about the ever-changing landscape of IT compliance and risk
management? Look no further. Hyperproof, a leading SaaS compliance operations
provider, conducts an annual survey of over 1,000 IT risk, compliance, and
security professionals to uncover their top challenges. Tune in to this
exclusive episode to hear about the top five most important statistics uncovered
from the survey and get an overview of how your industry peers are managing IT
risk and compliance programs within their organizations. We’ll cover: ● The top
five findings from the survey ● How your peers are planning to handle
compliance, audit management, and risk management in the midst of this year’s
volatile economy ● What companies are doing differently in response to recent
and highly publicized security breaches to avoid security lapses and compliance
violations Download Hyperproof’s 2023 IT Compliance and Risk Benchmark Report
https://hyperproof.io/it-compliance-benchmarks/

241 Views • 1 year ago

VIDEO


WHAT KIND OF GLASSES ARE YOU WEARING? YOUR VIEW OF RISK MAY BE YOUR BIGGEST RISK
OF ALL

The world of business has changed dramatically over the past few years. Our
digital world is more connected than ever, leaving security and technology teams
stretched even thinner. Privacy and data regulations are increasing on a state
and national level, threat actors are learning and evolving, and cybersecurity
has finally become a boardroom priority! Now that you have leadership’s
attention- what will you do? If your answer is “risk management as usual”, that
may be holding you back. Traditional risk management approaches make a lot of
promises, but most of them are myths. Do any of these sound familiar? ● You can
make better-informed decisions by using a single platform. ● You can use
automation to achieve continuous compliance. ● You can implement risk management
by creating a risk register. ● You can use qualitative attributes to measure and
assess risk. In this episode, we’ll assess risk management myths and discuss how
to establish scalable, quantifiable, and always-on risk management for the
future. Hosted by Lisa Cook and featuring special guest Meghan Maneval.

264 Views • 1 year ago

VIDEO


HOW ORGANIZATIONS CAN CONSISTENTLY REDUCE CYBERRISK

Cyber threats are now a “clear and present danger” to most organizations,
companies and governments of the world. A good cyber defense involves many,
intricate layers. You can never have enough layers, just like you can never
remove all the risk. In order for organizations to reduce as much risk as
possible, in a rapidly shifting threat landscape, they must constantly make
improvements. The threat groups are making rapid improvements and increasing
their expertise at a steady rate. They are investing in R&D and Zero-Day
exploits. To offer a good defense, we must make progress at the same rate as the
threat groups or we may fall behind, increasing risks and allowing the cyber
world to become like the “wild-wild west.”

173 Views • 1 year ago

VIDEO


KEY CONSIDERATIONS FOR CONDUCTING REMOTE IT AUDITS

Conducting adequate preparation including risk assessments, assessing resource
requirements and ensuring ongoing communication to harness both the benefits and
to address the potential challenges faced when conducting hybrid or fully
virtual audits.

210 Views • 1 year ago

VIDEO


UNDERSTANDING AND ASSESSING ORGANIZATION CULTURE

Organizational culture is crucial because it shapes behaviors and attitudes in
the workplace, which can profoundly impact operations and overall success.
However, it is sometimes difficult for CISOs and other infosec managers to fully
understand their culture because they are inside it constantly. In this ISACA
Podcast episode, author and journalist Mark Tarallo chats with ISACA's Safia
Kazi about how infosec managers can assess the organizational culture by using a
culture model to examine the behaviors, relationships, attitudes, values, and
environment that the culture sustains. It also discusses possible ways to lead a
culture change initiative. To read Mark's full ISACA Journal article,
"Understanding, Assessing, Aligning and Transforming Organizational Culture,"
click the link https://www.isaca.org/organizational-culture For more ISACA
Podcasts: https://www.isaca.org/podcasts

176 Views • 1 year ago

VIDEO


SEVEN THINGS TO KNOW BEFORE AUTOMATING IT GENERAL CONTROL AUDITS

This podcast is a practical discussion with two IT Internal Auditors, Frans
Geldenhuys and Gustav Silvo, that have automated IT General Controls across
their highly diversified and decentralized group. They will share some of the
pitfalls they have experienced in their automation roll out and advise on how to
avoid or manage these pitfalls with host, Robin Lyons. Check out Frans and
Gustav’s full ISACA Industry News article, “Seven Things to Know Before
Automating IT General Control Audits,”
http://www.isaca.org/automating-it-general-control-audits For more ISACA
Podcasts, https://www.isaca.org/podcasts

280 Views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT - JULIA KANOUSE

Get to know Chief Membership and Marketing Officer Julia Kanouse as she sits
down with childhood best friend and ISACA VP Amanda Raible. The duo discuss
everything from leadership to motherhood while competing in Mario Kart! Tune in!

142 Views • 1 year ago

VIDEO


ISACA LIVE | MEASURING & COMMUNICATING CYBER CAPABILITIES

There are many standards describing cybersecurity outcomes to achieve and
capabilities to implement, but what does success look like, and how do we know
if we’re doing enough? In this video, Kelly Hood, CDPSE, Cybersecurity Engineer
at Optic Cyber Solution, shares different types of measurements, such as metrics
and performance indicators, to help you understand how and when to use each of
them when measuring your cyber capabilities and communicating the outcomes of
your cybersecurity programs.

207 Views • 1 year ago

VIDEO


WHAT IS YOUR IP ADDRESS CYBERSECURITY IQ? THE ROLE OF IP ADDRESS DATA IN A
DIGITAL WORLD

There are literally thousands of VPN services on the market. Some are undeniably
benign, but others offer a slate of features that are friendly to cyber
criminals. Keeping your network safe from hackers requires you to understand the
VPN market, and make decisions based on your company’s appetite for risk.
Fortunately, by analyzing IP address data associated with these devices,
security professionals can get access to a wealth of VPN contextual data that
helps them distinguish between perfectly legitimate providers and those that
turn a blind eye toward crime. In today’s world, it is vital for security
professionals to know how to leverage IP address data and its contextual
insights to protect enterprise networks.

192 Views • 1 year ago

VIDEO


ISACA LIVE | THE EQUITY GEM: ACTIONABLE STEPS TO HELP CLOSE THE EQUITY GAP

In celebration of International Women's Day, themed #EmbraceEquity, Limor
Bergman and Willena Lon will share tips on actionable steps to help close the
equity gap.

63 Views • 1 year ago

VIDEO


CONFERENCE CHATS WITH CHELSEY & ROBYN

Tune in to listen to ISACA’s very own Chelsey Byrd and Robyn Franko as they
discuss the upcoming fun at ISACA Conference North America 2023: Digital Trust
World.  Listeners will  get some insider information into future conferences and
some laughs as the ladies discuss past, present & future ISACA events!
Additional event information can be found
https://www.isaca.org/training-and-events/isaca-digital-trust-world-conference

129 Views • 1 year ago

VIDEO


EIGHT CYBERSECURITY TRENDS TO WATCH FOR IN 2023

With the start of a new year, it is a key time for all organizations, small
through enterprise, to examine their IT infrastructure and review cyber security
policies. With the new digital transformations and an evolving regulatory
landscape, organizations are more prone to cyberattacks. In fact, statistics
released in Nov 2022, show that approximately 52 million data breaches occurred
globally during the second quarter of this year alone. So what do businesses
need to know to be able to try and mitigate these issues?

334 Views • 1 year ago

VIDEO


MEASURING SECURITY RESILIENCE FROM THE LENS OF THE ADVERSARY COMMUNITY

In a world where adversaries are constantly adapting to improve tactics,
techniques, and procedures (TTPs), it is crucial to understand the unique traits
and goals of various types of adversaries that actively seek to cause harm to an
organization. The personification of these threats will ultimately help measure
resilience against specific threat actors, identify investment and hardening
opportunities, and improve trust with customers. In this podcast, Daniel
Ventura, Manager of Product Security Incident Response Team (PSIRT), shares
insight into Adobe’s approach to adversary personification as well as provides
guidance on how you can better measure the security resilience of your products.
He’ll also talk about Adobe’s bug bounty program which helps his team identify
new trends in adversary interest and defend against real incident response
events.

106 Views • 1 year ago

VIDEO


THE FUTURE OF TECHNOLOGY RISK: 4 WAYS TO BUILD STAKEHOLDER TRUST IN THE
TECHNOLOGY RISK IMPERATIVE

Today, the pace of change across industries is quicker than ever before.
Economic, political, and social unrest and a global climate crisis have placed
unprecedented disruption and pressures on organizations looking to navigate a
rapidly changing environment. Firms are being out-innovated and entire
industries are being disrupted in a matter of months or years, as opposed to
decades. Shifting regulations, data as an asset, dynamic customer behavior and
employee expectations of continued flexibility in a more virtual workplace add
to the challenge. Technology risk and compliance needs to adjust to this new
reality. The strategy and value of an organization’s technology risk management
are becoming essential to build and secure stakeholder trust. That means moving
closer to the point where the risk events occur and using preventative,
detective, and automated controls as much as possible. In this podcast, Beth
McKenney, a Principal in the KPMG Technology Risk service network, offers a game
plan for companies to meet these today’s challenges with an eye on building
stakeholder trust. That means having a proactive, rather than a reactive,
approach to risk management.

101 Views • 1 year ago

VIDEO


RISKY BUSINESS – JON BRANDT

For the average person, life moves quickly. But for business leaders and anyone
involved in any aspect of IT, the pace at which technology is changing is
overwhelming. Technology can help businesses and individuals do more with less
and increase profit margins. However, technological advances carry tremendous
risk and increase the criticality of risk management. No longer can business and
personal use of technology be viewed in siloes. ISACAs Director of Professional
Practices and Innovation, Jon Brandt, is joined by Ryan Cloutier as they discuss
some of the latest headlines and impact to intellectual property.

174 Views • 1 year ago

VIDEO


ADVERTISING INFORMATION SECURITY

In this episode, executive principal at Risk Masters International’s Steven Ross
discusses why vendors of IT products and services are advertising information
security, why businesses are not advertising their security and how to use
information security as a component of organizations’ public images with host
Safia Kazi.

155 Views • 1 year ago

VIDEO


BUILDING DIGITAL TRUST THROUGH ADVOCACY

If you thought ISACA was only about certification and education, get ready to
listen to this podcast and see how ISACA advocates for the IT Audit and Risk
Management professions! Join Cindy Baxter, author of the Audit in Practice
column in the ISACA Journal, as she interviews two members of the ISACA New
England Board of Directors who attended ISACA’s Hill Day in Washington DC. Hear
how they met with their government representatives and with ISACA’s help,
discussed legislation that supports our profession! It’s an opportunity to think
about the impacts you can have in your own back yard and with civic leaders!

130 Views • 1 year ago

VIDEO


RETHINKING IDENTITY GOVERNANCE

SaaS is eating the world even more than we think. Companies are dealing with
SaaS sprawl: hundreds of apps distributed across different owners that store
sensitive data and which are used to orchestrate critical business workflows.
Security-minded teams are turning to external compliance frameworks to help
protect their customers and data. However, traditional identity governance
controls have fallen short of delivering real security outcomes in this
digital-first world. They’re missing a critical piece: automation. In this
episode, ConductorOne’s CEO and Co-Founder, Alex Bovee joins this episode to
discuss why we need to change the way we think about compliance and risk and
what a security-led governance program could look like. Learn more about
ConductorOne at https://www.linkedin.com/company/conductorone/ or
https://www.conductorone.com/blog/automating-compliance-controls-least-privilege-access/

236 Views • 1 year ago

VIDEO


2023: THE YEAR OF RISK

A review of the events of 2022 shows that 2023 will not be the year of dire new
cyber attacks waged by hoodie-wearing cyber criminals or office-bound
nation-state APTs. Instead, 2023 will be when multiple regulatory bodies express
their mounting frustration with public and private companies' collective
inability to reduce the volume and impact of prior cyber attacks. Tune into this
ISACA Episode as Hyperproof’s Field CISO, Kayne McGladrey, speaks with ISACA’s
Jeff Champion on how 2023 will be the year of risk. Learn more about Hyperproof
at: https://twitter.com/Hyperproof https://www.linkedin.com/company/hyperproof/
https://www.instagram.com/hyperproof/ Additional Hyperproof Resources:
https://hyperproof.io/resource/the-ultimate-guide-to-enterprise-risk-management/
https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2022/three-key-predictions-for-2023-the-year-of-risk
https://hyperproof.io/resource/risk-management-software-buyer-guide/
https://hyperproof.io/case-studies/pythian-uses-hyperproof-to-get-time-back-and-improve-its-risk-management-maturity/

341 Views • 1 year ago

VIDEO


IMPROVING CYBER RESILIENCE IN AN AGE OF CONTINUOUS ATTACKS

We live in the age of continuous compromise. This podcast dives into why so many
organizations continue to be breached even after spending money on cybersecurity
point solutions. Many organizations gravitate towards silver bullet solutions
without understanding the threat and impact. In this ISACA Podcast episode,
Chris McGown speaks to Rex Johnson and Hamlet Khodaverdian about why a holistic
and collaborative approach is absolutely critical to creating cyber-resilience. 
For more information check out
www.isaca.org/improving-cyberresilience-in-an-age-of-continuous-attacks

292 Views • 1 year ago

VIDEO


ISACA LIVE | DIGITAL TRUST PRIORITIES FOR PRIVACY AND EMERGING TECH

ISACA Digital Trust Advisory Council Members Anne Toth and Michelle Finneran
Dennedy will discuss privacy concerns and priorities around emerging tech and
the most critical considerations for ensuring strong digital trust. Visit
isaca.org/privacy-month-2023

344 Views • 1 year ago

VIDEO


ISACA LIVE - CAREER CHANGING IMPACT OF MENTORSHIP

To celebrate International Mentorship Day in January, we are hosting an ISACA
Live hosted by Liz Pisney, with panelists Veronica Rose (ISACA Board Director)
and career expert Caitlin McGaw.

188 Views • 1 year ago

VIDEO


INFORMATION PRIVACY CONTRADICTION: INTEREST-BASED POSTURE OF COMPLIANCE AND
VIOLATION

Why do individuals, organizations, institutions, nations, or responsible agents
work hard to preserve their personal and enterprise data, personnel information,
trade secrets, intellectual properties, technical know-how, or national data,
yet easily trade on the individual and enterprise data and national data of
others? To understand and answer the question appropriately, one must examine
the underlying of the Information Privacy Realities Contradiction Theory
(IPRCT), which is integral to (1) our natural unity of opposites, (2) our
material dialectic mechanism or struggle of choosing from the opposites, and (3)
the role of our self-interest in time and circumstance. Therefore, understanding
the intricacies of the IPRCT would be instrumental to the proper and timely
introduction of privacy requirements early in our system development lifecycle
and in the development and enactment of information privacy policies,
directives, guidance, and regulations around the world. In this ISACA Podcast
episode, Safia Kazi host Dr. Patrick Offor, Chief Warrant Officer Five Retired
(CW5(R)); Associate Faculty, to discuss his recently released ISACA Journal
article. To read Dr. Offor’s full article, please visit
https://www.isaca.org/resources/isaca-journal/issues/2022/volume-6/the-information-privacy-contradiction.
To listen to more ISACA podcasts, please visit www.isaca.org/podcasts.

272 Views • 1 year ago

VIDEO


SHOULD CYBERSECURITY BE SUBJECT TO A SOX-TYPE REGULATION?

Numerous laws and regulations have been passed to protect sensitive information,
both at the federal and state level, creating a patchwork of requirements for
companies to comply with. However, with limited resources for cybersecurity
investment, this uncoordinated approach has clouded objectives and led to
decision paralysis within firms. Could cybersecurity implementation benefit from
a Sarbanes-Oxley Act (SOX) type approach? This approach would create a
risk-based, internal control model focused on cybersecurity that includes
enforcement capabilities and requires third-party oversight and executive
accountability. To read Should Cybersecurity Be Subject to a SOX-Type
Regulation? Please visit
www.isaca.org/should-cybersecurity-be-subject-to-a-sox-type-regulation. To
listen to more ISACA podcasts, please visit www.isaca.org/podcasts.

280 Views • 1 year ago

VIDEO


BEWARE THE TRAPS OF DATA GOVERNANCE AND DATA MANAGEMENT PRACTICE

Guy Pearce joins ISACA’s Lisa Villanueva for a conversation about the traps of
Data Governance and management. Guy breaks down Lore vs. Data, reasons for not
using information for decision-making and why data is a shared benefit for the
organization. Stay tuned until the close to hear Guy’s advice on how to use
metaphor when communicating technical concepts to executive leadership. To read
Guy's full article, visit: To listen to more ISACA podcasts, please visit:
www.isaca.org/podcasts.

281 Views • 1 year ago

VIDEO


CONVERGENCE: WHERE NEXT?

ISACA’s Jeff Champion welcomes Steven Ross to the ISACA podcast. Steven asks
what the effect of Convergence on the Control Community and concludes that
everything is connected to every role, and it is becoming risky to have
employees siloed within their own practice. He also remarks on how he once wrote
an ISACA Journal article about companies creating a role for Chief Security
Officer and now that is becoming a reality within the industry. Tune in now! To
read Steven’s full-length article, visit: www.isaca.org/convergence-where-next.
To listen to more ISACA podcasts, visit: www.isaca.org/podcasts

169 Views • 1 year ago

VIDEO


DO DATA GO TO WASTE

The Impact of SOX on the Industry 20 Years Ago and Today. Opponents of Sarbanes
Oxley, (SOX) contend the law is too costly for companies to operationalize given
the small benefit that SOX regulation provide. Proponents say that a world
without SOX is a world in chaos. This article discusses how SOX measures up 20
years after the law was enacted. To read Cindy's ISACA Journal article, Do Data
Go to Waste, please visit: www.isaca.org/do-data-go-to-waste. To listen to more
ISACA Podcasts, please visit www.isaca.org/podcasts.

163 Views • 1 year ago

VIDEO


PROTECTING YOUR ENTERPRISE AND DETERRING FRAUD IN A NEW RISK ERA

As uncertainty persists due to the COVID-19 pandemic, the war in Ukraine,
international cyberthreats, inflation, and a looming recession, it is clear that
the world has entered a new era of risk. These factors have created the perfect
storm for rising fraud. In the past year, unauthorized digital account openings
increased by 21%, while smartphone-related cyberattacks soared by 71%,
reflecting a changing threat landscape impacting enterprises and consumers
alike. According to one global survey, nearly half of all respondents
experienced fraud in the past 24 months, 3 compromising financial resources,
personal data, and peace of mind with frightening rapidity. Recent research we
have completed also reflects that “60% of Consumers Don't Believe Companies Do
Enough to Protect Their Data as Demand for Security Grows". Listen to the CEO of
GBG Americas, Christina Luttrell, as she explains that, as a result, identity
verification is a priority for organizations and government agencies that view
it as a strategic differentiator that allows them to enhance the customer
experience while improving their defensive posture at a critical time in this
ISACA podcast episode. To read the ISACA Journal article, Protecting Your
Enterprise and Deterring Fraud in a New Risk Era, please visit:
https://www.isaca.org/protecting-your-enterprise To listen to more ISACA
Podcasts, please visit www.isaca.org/podcasts.

313 Views • 1 year ago

VIDEO


THE CIRCLE OF FAILURE: WHY THE CYBER SECURITY INDUSTRY DOESN’T WORK

Richard Hollis, Director of Rick Crew, is serious about asking the tough
questions. ISACA’s Jon Brandt welcomes him to the ISACA podcast to have a
conversation that challenges the status quo: Does the Cyber Security Industry
work? After decades of experience in the security industry, Richard asks, “have
I affected any change?” Richard points out that if we buy a toaster at the store
and it doesn’t work, we return it, but as security professionals, we don’t hold
products to the same standards. Why is this? Jon and Richard go back and forth
on FUD, vendors, false positives, and where accountability lies in the industry.
Join Richard and Jon in the conversation to think about how we can affect the
positive change that we want to see in our industry in the future! To read
Richard's full report, please visit www.isaca.org/the-circle-of-failure. To
listen to more ISACA podcasts, visit www.isaca.org/podcasts.

525 Views • 1 year ago

VIDEO


TAKING SECURITY STRATEGY TO THE NEXT LEVEL: THE CYBER KILL CHAIN VS. MITRE
ATT&CK

In an era of rampant ransomware and other malicious cyberattacks, it’s mandatory
to double down on cybersecurity analysis and strategy to ensure an optimal
security posture and the protection of critical assets and data. Today, two
models can help security professionals harden network resources and protect
against modern-day threats and attacks: the cyber kill chain (CKC)and the MITRE
ATT&CK framework. Tim Liu, long-term security technologist, co-founder, and CTO,
will provide an overview of these two frameworks and the limitations or benefits
of each approach. To read Taking Security Strategy to the Next Level, please
visit: www.isaca.org/taking-security-strategy-to-the-next-level To listen to
more ISACA podcasts, please visit: www.isaca.org/podcasts

448 Views • 1 year ago

VIDEO


AUDITEE BUY-IN—A KEY COMPONENT OF EFFECTIVE AUDITS

As you plan and execute your audit, do you take time to invest in the
stakeholder relationship? This can be an often-overlooked element but essential
in an effective audit. Tune into this ISACA Video Podcast as Steve Jackson, IT
Audit Manager at Airbnb, chats with ISACA’s Robin Lyons about ways to gain
auditee buy-in and have a successful and effective audit. To read Steve’s
full-length article, “Auditee Buy-In—A Key Component of Effective Audits,” visit
www.isaca.org/auditee-buy-in For more ISACA Podcasts, please visit:
www.isaca.org/podcasts

430 Views • 1 year ago

VIDEO


BREAKING DOWN THE ESET T2 2022 THREAT REPORT

In this ISACA Podcast episode, ESET’s Chief Security Evangelist, Tony Anscombe,
joins ISACA’s Principal, Emerging Technology Professional Practices, Collin
Beder to discuss ESET’s recently released T2 2022 Threat Report. As a global
leader in cybersecurity, ESET’s T2 2022 Threat Report summarizes the most
notable trends that have shaped the threat landscape for the past four months.
This report dives into CloudMensis, the previously unknown macOS malware
discovered by ESET researchers. To read the full ESET report:
https://www.welivesecurity.com/wpcontent/uploads/2022/10/eset_threat_report_t22022.pdf.
For more information, check out ESET’s award-winning blog: WeLiveSecurity. Make
sure to follow ESET Research on Twitter for the latest news from ESET Research.
To listen to more ISACA Podcasts, please visit www.isaca.org/podcasts.

162 Views • 1 year ago

VIDEO


ENABLING DIGITAL TRUST THROUGH CANADA'S DIGITAL CHARTER

Data are the lifelines of a digital economy. They drive innovation, enabling
cutting-edge research and next-generation technologies, including artificial
intelligence (AI), robotics, and the Internet of things (IoT). But these
opportunities introduce new sources of risk that must be managed appropriately.
Canadians are raising important questions such as, “How will personal data be
used?” and “What controls are in place to safeguard privacy and security?” To
encourage innovation within the digital economy while managing this risk, the
Government of Canada has established the need for digital trust between citizens
and organizations as an enabler by implementing a Digital Charter. As the
Canadian government cites, “Trust is the foundation on which our digital and
data-driven Canadian economy will be built.” This digital trust is defined by
the “confidence that users have in the ability of people, technology, and
processes to create a secure digital world. Tune into this ISACA Podcast as the
Acting Director of Internal Assurance at the Office of Enterprise Risk &
Assurance of the University of British Columbia (UBC), Mary Carmichael, join’s
ISACA’s Safia Kazi to explore topics including what is the Digital Charter and
how it supports digital trust; what are critical elements of the Digital Charter
(e.g., AI Ethics, Privacy, Principles for the Digital Economy); what are the
implications for organizations and the public. To read Mary’s full-length
article, visit
https://www.isaca.org/enabling-digital-trust-with-canadas-digital-charter. To
listen to more ISACA podcasts, visit https://www.isaca.org/podcasts.

160 Views • 1 year ago

VIDEO


IT'S ABOUT (DOWN) TIME

It is all about the system's downtime. In this ISACA Podcast episode, Risk
Masters International's Steven Ross tells ISACA's Collin Beder that
organizations should start focusing on hours of unavailable systems and data
when measuring the cost of a cyber-attack. Steven also discusses the causes and
targets of system downtime and why he thinks the IT world is currently living in
a dangerous time. To read Steven's full-length article, visit:
www.isaca.org/its-about-down-time To listen to more ISACA Podcasts, visit:
www.isaca.org/podcasts

179 Views • 1 year ago

VIDEO


HOW SOCIAL ENGINEERING BYPASSES TECHNICAL CONTROLS

We are subjected to phishing scams almost every day, and even the most seasoned
professional must examine an email to ensure the links included are safe. Brown
University and Federal Reserve Bank of Cleveland's Allen Dziwa says people are
the weakest link and that customized messaging using regional language for
targeted attacks are becoming more prevalent. Allen breaks down the many types
of attacks (phishing, spear phishing, smishing, vishing, whaling) with ISACA's
Kevin Keh. Tune into this ISACA Podcast to learn how to be vigilant when facing
potential attacks from scammers. To read Allen’s full article, please visit:
www.isaca.org/how-social-engineering-bypasses-technical-controls To listen to
more ISACA Podcasts, please visit: www.isaca.org/podcasts

481 Views • 1 year ago

VIDEO


WHAT MAKES RISK ASSESSMENTS SO UNPLEASANT AND HOW TO CHANGE THAT

Ryan Cloutier's child came home from school one day and told him that he had
figured out the staff Wi-Fi password. Frustrated that the security wasn't better
for a school network, Ryan decided to do something about it. Since then, his
career has been focused on serving K12, local government and socio-economically
disadvantaged communities with his company Security Studio. ISACA's Jeff
Champion asks him about ways to overcome technical language barriers when
completing risk assessments, and Ryan discusses key issues with risk assessments
and a path forward to resolving them. Tune in to start thinking about more
interesting ways to approach risk assessments! To read Ryan's full-length
article, visit: www.isaca.org/what-makes-risk-assessments-so-unpleasant To
listen to more ISACA Podcasts, visit: www.isaca.org/podcasts

291 Views • 1 year ago

VIDEO


ISACA CYBERPROS – NAOMI BUCKWALTER

Executive Director of Cybersecurity Gatebreakers Foundation, Naomi Buckwalter,
joins ISACA’s Jon Brandt to discuss burnout. There are many factors at play when
discussing burnout: company culture, work-from-home flexibility, unrealistic
expectations from supervisors, and industry pressure, but Naomi gives you
multiple action plans for combatting workplace burnout and creating healthy
boundaries with your colleagues. Tune into this ISACA Podcast now! To learn more
about Naomi, please visit: https://www.linkedin.com/in/naomi-buckwalter/ To
listen to more ISACA podcasts, please visit: www.isaca.org/podcasts

808 Views • 1 year ago

VIDEO


QUANTIFYING THE QUALITATIVE RISK ASSESSMENT

In this ISACA podcast episode, IT Risk Director and Senior Vice President Mike
Powers, joined by IT Segment Risk Manager Julie Ebersbach to discuss the use of
the qualitative risk assessment as part of an organization's enterprise risk
framework, focusing on the use of data to inform subjective judgments. The value
and accuracy of a qualitative risk assessment, based on subject matter expert
judgment, can be improved with focused data. Tune in now to hear Mike and Julie
chat with ISACA’s Jeff Champion about how using quantifiable data increases the
reliability, accuracy, and credibility of the qualitative risk assessment. To
read Quantifying the Qualitative Technology Risk Assessment, please visit:
www.isaca.org/quantifying-the-qualitative-technology-risk-assessment To listen
to more ISACA Podcasts, please visit: www.isaca.org/podcasts

495 Views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT WITH ALI PABRAI

There is no denying the passion that ecfirst's CEO, Ali Pabrai has for
cybersecurity. In this ISACA Podcast, Ali tells ISACA's Hollee Mangrum-Willis
that after all his years in the industry, he is still more excited than a
two-year-old at the entrance to Disneyland. Listen in as Ali discusses his
origin story as a first-generation American working for Fermi National
Accelerator Laboratory, creating a startup soon after the new millennium and how
he has balanced all his career accomplishments while raising a neurodivergent
child. Tune in now to hear about why Ali thinks we should compare the human body
to cybersecurity and much more! To learn more about Ali, please visit:
https://www.linkedin.com/in/pabrai/.  To listen to more ISACA Podcasts, please
visit: www.isaca.org/podcasts

487 Views • 1 year ago

VIDEO


HOW TO MATURE YOUR PRIVACY COMPLIANCE PROGRAM: A CONVERSATION WITH ONETRUST DPO
LINDA THIELOVA

Compliance with the world’s ever-increasing list of privacy laws can be a tricky
undertaking for any organization, but by taking a few simple steps, you can
begin to mature your privacy program from a series of check-box exercises into
an intelligent compliance program that can help organizations to build consumer
trust and protect brand reputation. Join this conversation with OneTrust DPO
Linda Thielova and ISACA's Paul Phillips to learn how to operationalize privacy
compliance within your organization and get practical tips on how to mature your
privacy compliance program.

330 Views • 1 year ago

VIDEO


MANAGING CYBERSECURITY RISK AS ENTERPRISE RISK

Cybersecurity incidents like ransomware can potentially bring operations to a
standstill. Recent regulatory changes by the FTC and proposed changes by the SEC
show that both agencies are drafting cybersecurity rules similar to ERM
concepts. This would include board oversight of cybersecurity and the
responsibility of senior management to implement cybersecurity policies and
procedures and provide training for information security staff that is
sufficient for them to address relevant security risks. In addition, this could
mean that your organization may be required to report incidents and disclose
cybersecurity policies and procedures. Tune in to this ISACA Podcast episode to
listen in as Cyber Defense Labs’ Manager of Cybersecurity Advisory Services Tom
Schneider tells ISACA’s Jeff Champion that any threat to this essential
information is an enterprise risk that needs to be managed by the enterprise
through teamwork, with leadership from both the board and senior management. Tom
also gives insights into managing cybersecurity risk as an enterprise risk. To
read Managing Cybersecurity Risk as Enterprise Risk, please visit:
www.isaca.org/managing-cybersecurity-risk-as-enterprise-risk. To listen to more
ISACA Podcasts, please visit: www.isaca.org/podcasts.

501 Views • 1 year ago

VIDEO


IMPLEMENTING ARTIFICIAL INTELLIGENCE: CAPABILITIES AND RISK

University of Florida's Ivy Munoko is passionate about AI and has plenty to
share regarding implementation and usage, but ISACA's Collin Beder asks, "is it
ethical"? Ivy breaks down the ethical considerations for AI and the four types
of intelligence (Mechanical, Analytical, Intuitive, Empathetic), and she shares
her take on why she thinks AI won't be replacing our jobs for a very long time
to come. To read Ivy's article, please visit
www.isaca.org/implementing-ai-capabilities-and-risk. To listen to more ISACA
Podcasts, please visit www.isaca.org/podcasts.

270 Views • 1 year ago

VIDEO


AUDIT IN PRACTICE: AUDITING CULTURE

What’s The Risk LLC’s Cindy Baxter sits down with ISACA’s Robin Lyons to discuss
auditing culture, which can be one of the most interesting areas to audit. We
all have things we want out of our work environment like remote work, flexible
hours or as Cindy comments: “I’d love to take my dog to work with me!”, but she
and Robin question what is really important to workplace culture, and does it
start with a “tone at the top”? Cindy gives advice on auditing approaches and
key assessments when auditing as culture can be a critical part of an
organization, making or breaking its effectiveness. To read Cindy’s full length
article, please visit: www.isaca.org/auditing-culture To listen to more ISACA
Podcasts, please visit: www.isaca.org/podcasts

368 Views • 1 year ago

VIDEO


INCIDENT REPORT & CONTINUOUS CONTROL MONITORING

This episode of the ISACA Podcast is all about incident reporting. Lesotho
Postbank's Relebohile Kobeli talks to ISACA's Collin Beder about mitigating
risk, minimizing losses from events, and good communication. As Relebohile says:
"as we carry out our daily tasks at work, we should always be proactive... and
recognize abnormal behavior". Tune in now! To read Relebohile's full article,
please visit: www.isaca.org/how-enterprises-can-leverage-incident-reporting To
listen to more ISACA Podcasts, please visit: www.isaca.org/podcasts

165 Views • 1 year ago

VIDEO


ISACA LIVE | ADVANCING DIGITAL TRUST THROUGH IT

On National IT Professionals Day, ISACA's Kevin Keh explains how IT
professionals can advance digital trust in their organizations and in their
industries. Learn more at isaca.org/digital-trust

190 Views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT - LISA YOUNG

Netflix's Lisa Young started as a bank teller that learned tech by fixing and
servicing ATMs, which transitioned to her joining the network ops field and
leading her to "help organizations understand what could keep them from meeting
their strategy, objectives or mission". After rough telecom layoffs, she
re-educated herself with ISACA certifications and started leading a chapter,
which included the honor of hosting an ISACA conference and she has developed
content with ISACA's Paul Phillips. In this episode she sits down with Paul to
discuss their shared work on ISACA-related projects, cyber careers and why you
should be curious and ask how things work. Lisa loves the idea of continuous
learning and asks, "what is a good next step for you?" To listen to more ISACA
Podcasts, go to isaca.org/podcasts Be sure to like, comment, and subscribe for
more ISACA Productions content.

306 Views • 1 year ago

VIDEO


ISACA LIVE | THE DARK FUTURE OF PRIVACY

Privacy Mining will increase because of billions of IoT devices being connected
every day. Combined with advanced psychologic research, this can be a very
powerful tool for manipulating people's behavior. A Fake reality also poses a
big threat to our future of privacy. Software, such as Deep Fakes, has the
ability to use someone's facial structure and create fake videos featuring
digitally created characters with an uncanny resemblance of real people, such as
celebrities. This technology is so advanced, that our minds aren't sophisticated
enough to comprehend the difference between real and fake data created by it,
which leads to the next point. We are entering a trust crisis. Trust is the
foundation for innovation and technological advance. If people don't trust
autonomous cars - they won't use them; if people don't certain websites - they
won't read their news; Without trust, we cannot move forward, which is why we
need to raise awareness about the dark future of privacy.

105 Views • 1 year ago

VIDEO


FOCO DE LA INDUSTRIA - ARNULFO ESPINOSA DOMINGUEZ, PARTE II

El vicepresidente del Capítulo Monterrey de ISACA y Director de Auditoría y
Fraude de TI de uno de los Grupos Financieros más grandes de México, Arnulfo
Espinosa Domínguez, se une a Jocelyn Alcantar de ISACA para compartir muchas
cosas que ha aprendido durante sus 20 años de experiencia profesional en la
industria. Habiéndose dado cuenta del valor de la información a una edad
temprana, Arnulfo ha forjado su camino dentro de la comunidad de TI. Es un
formador acreditado para múltiples certificaciones, asesor independiente y
presidente de varios comités de Ciberseguridad, Riesgo y Auditoría, y es
reconocido mundialmente por un apodo que sus compañeros le han dado, "El
AudiTHOR". Como voluntario de ISACA desde hace mucho tiempo y orador de
conferencias, Arnulfo ha sido premiado en numerosas ocasiones por sus destacados
logros. En 2019, se le otorgó el "Premio al Líder de Capítulo Sobresaliente"
(Outstanding Chapter Leader Award) de ISACA, en 2020, recibió el "Premio John
Kuyers al Mejor Orador" (John Kuyers Award for Best), y recibió el mayor logro,
el "Premio Salón de la Fama de ISACA" (ISACA Hall of Fame Award) en 2021. 
¡Únase a la escucha de este episodio mientras Arnulfo ofrece sus mejores
consejos y prácticas para convertirse en un orador excepcional, consejos sobre
cómo los profesionales emergentes pueden entrar en la industria, y cómo su alter
ego, AudiTHOR, alimenta su pasión por la auditoría! Para leer más sobre Arnulfo,
visite
www.isaca.org/resources/news-and-trends/isaca-now-blog/2020/iamisaca-from-rock-star-to-speak-star
Para escuchar más Podcasts de ISACA, visite www.isaca.org/podcasts

225 Views • 1 year ago

VIDEO


ETHICAL AI SHIFTING THE CONVERSATION LEFT

Many organizations prioritize goals such as gains and profits, which often
require rich data sets, but fail to consider the eventual impact of their data
handling methodologies on foundational social justice issues. ISACA's Collin
Beder talks to Josh Scarpino about his recently released article Evaluating
Ethical Challenges in AI and ML. Josh discusses issues such as ethical behavior,
systemic issues and how to create trusted systems. Collin also asks what is the
future for humans in regards to AI. Tune in now! To read Evaluating Ethical
Challenges in AI and ML, visit:
www.isaca.org/evaluating-ethical-challenges-in-ai-and-ml To listen to more ISACA
Podcasts, visit: www.isaca.org/podcasts

98 Views • 1 year ago

VIDEO


FOCO DE LA INDUSTRIA - ARNULFO ESPINOSA DOMINGUEZ, PARTE I

El vicepresidente del Capítulo Monterrey de ISACA y Director de Auditoría y
Fraude de TI de uno de los Grupos Financieros más grandes de México, Arnulfo
Espinosa Domínguez, se une a Jocelyn Alcantar de ISACA para compartir muchas
cosas que ha aprendido durante sus 20 años de experiencia profesional en la
industria. Habiéndose dado cuenta del valor de la información a una edad
temprana, Arnulfo ha forjado su camino dentro de la comunidad de TI. Es un
formador acreditado para múltiples certificaciones, asesor independiente y
presidente de varios comités de Ciberseguridad, Riesgo y Auditoría, y es
reconocido mundialmente por un apodo que sus compañeros le han dado, "El
AudiTHOR". Como voluntario de ISACA desde hace mucho tiempo y orador de
conferencias, Arnulfo ha sido premiado en numerosas ocasiones por sus destacados
logros. En 2019, se le otorgó el "Premio al Líder de Capítulo Sobresaliente"
(Outstanding Chapter Leader Award) de ISACA, en 2020, recibió el "Premio John
Kuyers al Mejor Orador" (John Kuyers Award for Best), y recibió el mayor logro,
el "Premio Salón de la Fama de ISACA" (ISACA Hall of Fame Award) en 2021. 
¡Únase a la escucha de este episodio mientras Arnulfo ofrece sus mejores
consejos y prácticas para convertirse en un orador excepcional, consejos sobre
cómo los profesionales emergentes pueden entrar en la industria, y cómo su alter
ego, AudiTHOR, alimenta su pasión por la auditoría! Para leer más sobre Arnulfo,
visite
www.isaca.org/resources/news-and-trends/isaca-now-blog/2020/iamisaca-from-rock-star-to-speak-star
Para escuchar más Podcasts de ISACA, visite www.isaca.org/podcasts

159 Views • 1 year ago

VIDEO


WHY (AND HOW TO) DISPOSE OF DIGITAL DATA

The stakes are too high for organizations not to comply with data privacy
regulations,” Bassel Kablawi states in his article, "Why (and How to) Dispose of
Digital Data." As the Information Security and Data Privacy Consultant for
System Solutions, Bassel Kablawi has the knowledge and experience to determine
that the value of data disposal can help an organization protect personal data
from being exposed and why the final step in the Data Lifecycle could be
considered the most crucial. Bassel takes us on a deep dive into digital data
with ISACA's Safia Kazi on the five stages of data disposal in this ISACA
podcast episode. He explains why it is essential to understand that destruction
should be performed based on an organization’s retention policy and the five
main disposal methods of data, which include date anonymization, data deletion,
data crypto shredding (for encrypted data), data degaussing, and data
destruction. Tune in to hear Bassel explain why data destruction is critical to
developing digital trust with customers and stakeholders and could save an
organization’s reputation. To read Bassel's article, please visit:
www.isaca.org/resources/news-and-trends/industry-news/2022/why-and-how-to-dispose-of-digital-data
To listen to more ISACA Podcasts, please visit: www.isaca.org/podcasts

236 Views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT - JOHANN DETTWEILER, PART II

Link to Part I: https://youtu.be/jWGT03ftV58 In this ISACA podcast episode, we
connect with TalaTek Director of Operations Johann Dettweiler to discuss his
almost two decades of experience across multiple industry fields, his
involvement in FEDRAMP compliance, and why the next generation should focus on
adding certifications to their resumes. Johann tells ISACA's Keith Karlsson that
it was his work ethic and guidance of a trusted mentor that provided an
opportunity in the IT security field. In less than 12 months, he racked up
multiple impressive certifications such as CISSP, CCSP, and CEH that rapidly
advanced his career and, as he explains it, allows him to be “the person that
everyone hates because I tell you what is wrong with your system.” Johann’s
strong background in research and his constant quest for knowledge about this
evolving industry, he is more than willing to provide listeners with his
efficiency hacks to stay productive, motivational career advice, and why the
next-generation cyber professionals may have an advantage over him. Tune in now
to meet Senior Security Information Security Consultant Johann Dettweiler. To
learn more about Johann, visit https://talatek.com/project/johann-dettweiler/ To
listen to other ISACA Podcast episodes, visit www.isaca.org/podcast

201 Views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT - JOHANN DETTWEILER, PART I

Link to Part II: https://youtu.be/Dhr-VAFid-E In this ISACA podcast episode, we
connect with TalaTek Director of Operations Johann Dettweiler to discuss his
almost two decades of experience across multiple industry fields, his
involvement in FEDRAMP compliance, and why the next generation should focus on
adding certifications to their resumes. Johann tells ISACA's Keith Karlsson that
it was his work ethic and guidance of a trusted mentor that provided an
opportunity in the IT security field. In less than 12 months, he racked up
multiple impressive certifications such as CISSP, CCSP, and CEH that rapidly
advanced his career and, as he explains it, allows him to be “the person that
everyone hates because I tell you what is wrong with your system.” Johann’s
strong background in research and his constant quest for knowledge about this
evolving industry, he is more than willing to provide listeners with his
efficiency hacks to stay productive, motivational career advice, and why the
next-generation cyber professionals may have an advantage over him. Tune in now
to meet Senior Security Information Security Consultant Johann Dettweiler. To
learn more about Johann, visit https://talatek.com/project/johann-dettweiler/ To
listen to other ISACA Podcast episodes, visit www.isaca.org/podcast

463 Views • 1 year ago

VIDEO


ACHIEVING EFFECTIVE CLOUD RISK MANAGEMENT

Cloud is ubiquitous now. From small enterprises to large companies, all are
moving a part of their technology operations to cloud. Initial reluctance is now
nowhere to be seen. There is more confidence among the user for the use of cloud
technology. Join ISACA’s Jeff Champion as he talks with Risk and Control
Specialist, Upesh Parekh about cloud deployment models, the various risks
involved with cloud storage, and what to know when using cloud technology for an
organization. Read Achieving Effective Cloud Risk Management at:
www.isaca.org/achieving-effective-cloud-risk-management Listen to more ISACA
Podcasts at: www.isaca.org/podcasts

743 Views • 1 year ago

VIDEO


ADVANCING DIGITAL TRUST THROUGH DATA PRIVACY

For more information, check out https://www.isaca.org/digital-trust

413 Views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT - DR. BLAKE CURTIS PART II

Link to Part I: https://youtu.be/AE-FykwzviU Author, editor, speaker, and
educator, Dr. Blake Curtis is joined by Red Cross’s Senior Internal Auditor Niki
Gomes to talk about everything from growing up in a small town to completing his
master’s degree in 10 weeks and publishing his 600-page dissertation in this
ISACA Industry Spotlight episode. In a meaningful conversation, Blake discusses
how surviving a near-death experience transformed and motivated him to expand
his understanding of what it means to be a human. He was inspired to supercharge
his learning, career journey, and personal growth. Making the decision to become
intentional in every interaction and giving 100% of his effort in every
initiative, he blazed his path to success. At the 2022 ISACA North America
Conference, Blake presented his findings from his ground-breaking and
internationally known dissertation, "The Next Generation Cybersecurity Auditor.”
His research discovered a technical competency gap in Big Four IT Auditors and
SMEs and debunked the 10,000-hour rule and "years of experience" fallacy. His
study proved that task-based experience is more objective than time-based
experience. Blake is also the author of "How to Complete Your Master's Degree in
One Semester," which has assisted over 150 students to complete their master’s
degrees in record-setting times. Along his journey, he has earned over 30 IT
certifications and gained additional impressive certificates for engineering,
advising, managing, and leadership. Blake has an abundance of experience to
share with ISACA’s audience. Tune in now to be inspired, uplifted, and
enlightened by his techniques, advice, and wisdom that can help boost your
career! Below you can find materials and resources that Blake would like to
share with our audience. Links: How to regulate a profession pg. 261 and 265 of
Creating the Next Generation Cybersecurity Auditor: Examining the Relationship
between It Auditors’ Competency, Audit Quality, & Data Breaches - ProQuest
Debunking Years of Experience:
https://www.linkedin.com/posts/reginaldblakecurtis_science-hiring-experience-activity-6951573321901621248-cygl?utm_source=linkedin_share&utm_medium=member_desktop_web
Videos Equitable Hiring YouTube Series link:
https://www.youtube.com/watch?v=IsnoCNIA2WU&list=PLfr4LANhCPrCXIc6V_h_k2dyKwPP7wJJa
Tools Inoreader: Inoreader - Take back control of your newsfeed Anki Notecards
(Spaced Repetition): About - AnkiWeb Notion Books Art of Conversation – Judy
Apps Verbal Judo – George Thompson The Science of Self-Learning – Peter Hollins
Finish What Your Start – Peter Hollins The Power of Discipline – Daniel Walter

357 Views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT - DR. BLAKE CURTIS, PART I

Link to Part II: https://youtu.be/zlrGdTRP-OA Author, editor, speaker, and
educator, Dr. Blake Curtis is joined by Red Cross’s Senior Internal Auditor Niki
Gomes to talk about everything from growing up in a small town to completing his
master’s degree in 10 weeks and publishing his 600-page dissertation in this
ISACA Industry Spotlight episode. In a meaningful conversation, Blake discusses
how surviving a near-death experience transformed and motivated him to expand
his understanding of what it means to be a human. He was inspired to supercharge
his learning, career journey, and personal growth. Making the decision to become
intentional in every interaction and giving 100% of his effort in every
initiative, he blazed his path to success. At the 2022 ISACA North America
Conference, Blake presented his findings from his ground-breaking and
internationally known dissertation, "The Next Generation Cybersecurity Auditor.”
His research discovered a technical competency gap in Big Four IT Auditors and
SMEs and debunked the 10,000-hour rule and "years of experience" fallacy. His
study proved that task-based experience is more objective than time-based
experience. Blake is also the author of "How to Complete Your Master's Degree in
One Semester," which has assisted over 150 students to complete their master’s
degrees in record-setting times. Along his journey, he has earned over 30 IT
certifications and gained additional impressive certificates for engineering,
advising, managing, and leadership. Blake has an abundance of experience to
share with ISACA’s audience. Tune in now to be inspired, uplifted, and
enlightened by his techniques, advice, and wisdom that can help boost your
career! Below you can find materials and resources that Blake would like to
share with our audience. Links: How to regulate a profession pg. 261 and 265 of
Creating the Next Generation Cybersecurity Auditor: Examining the Relationship
between It Auditors’ Competency, Audit Quality, & Data Breaches - ProQuest
Debunking Years of Experience:
https://www.linkedin.com/posts/reginaldblakecurtis_science-hiring-experience-activity-6951573321901621248-cygl?utm_source=linkedin_share&utm_medium=member_desktop_web
Videos Equitable Hiring YouTube Series link:
https://www.youtube.com/watch?v=IsnoCNIA2WU&list=PLfr4LANhCPrCXIc6V_h_k2dyKwPP7wJJa
Tools Inoreader: Inoreader - Take back control of your newsfeed Anki Notecards
(Spaced Repetition): About - AnkiWeb Notion Books Art of Conversation – Judy
Apps Verbal Judo – George Thompson The Science of Self-Learning – Peter Hollins
Finish What Your Start – Peter Hollins The Power of Discipline – Daniel Walter

866 Views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT - ARNULFO ESPINOSA DOMINGUEZ, PART II

Link to Part I: https://youtu.be/yNQvbf9onik Vice President of the ISACA
Monterrey Chapter and IT Audit & Fraud Director of one of the largest Financial
Groups in México, Arnulfo Espinosa Dominguez, joins ISACA’s Jocelyn Alcantar to
share some of the many things he has learned over his 20 years of professional
experience in the industry. Having realized the value of information at an early
age, Arnulfo has forged his path within the IT community. He is an accredited
trainer for multiple certifications, an independent advisor and chairman for
various Cybersecurity, Risk, and Audit committees, and is globally recognized by
a nickname his peers have given him, "The AudiTHOR.” As a long-time ISACA
volunteer and conference speaker, Arnulfo has been awarded on numerous occasions
for his outstanding achievements. In 2019, he was given the ISACA “Outstanding
Chapter Leader Award,” in 2020, he received the “John Kuyers Award for Best
Speaker”, and he received the highest achievement, the “ISACA Hall of Fame
Award” in 2021. Tune into this episode as Arnulfo offers his best tips and
practices for becoming an exceptional keynote speaker, advice on how the
up-and-coming professionals can get into the industry, and how his alter ego,
AudiTHOR, fuels his passion for auditing! To read more about Arnulfo, visit
www.isaca.org/resources/news-and-trends/isaca-now-blog/2020/iamisaca-from-rock-star-to-speak-star.
To listen to more ISACA Podcasts, visit www.isaca.org/podcasts.

107 Views • 1 year ago

VIDEO


CAREER COACH ADVICE: HOW TO LAUNCH YOUR IT AUDIT CAREER

Career coach Caitlin McGaw will share her top tips for young professionals and
career changes on how to launch a successful career in IT audit--from acing your
first interview and landing your first job to career resources to help your
career continue to grow and thrive. To learn more, check out
https://www.caitlinmcgaw.com/

518 Views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT - ARNULFO ESPINOSA DOMINGUEZ, PART I

Link to Part II: https://youtu.be/plxD2frpYk0 Vice President of the ISACA
Monterrey Chapter and IT Audit & Fraud Director of one of the largest Financial
Groups in México, Arnulfo Espinosa Dominguez, joins ISACA’s Jocelyn Alcantar to
share some of the many things he has learned over his 20 years of professional
experience in the industry. Having realized the value of information at an early
age, Arnulfo has forged his path within the IT community. He is an accredited
trainer for multiple certifications, an independent advisor and chairman for
various Cybersecurity, Risk, and Audit committees, and is globally recognized by
a nickname his peers have given him, "The AudiTHOR.” As a long-time ISACA
volunteer and conference speaker, Arnulfo has been awarded on numerous occasions
for his outstanding achievements. In 2019, he was given the ISACA “Outstanding
Chapter Leader Award,” in 2020, he received the “John Kuyers Award for Best
Speaker”, and he received the highest achievement, the “ISACA Hall of Fame
Award” in 2021.   Tune into this episode as Arnulfo offers his best tips and
practices for becoming an exceptional keynote speaker, advice on how the
up-and-coming professionals can get into the industry, and how his alter ego,
AudiTHOR, fuels his passion for auditing! To read more about Arnulfo,
visit www.isaca.org/resources/news-and-trends/isaca-now-blog/2020/iamisaca-from-rock-star-to-speak-star.
To listen to more ISACA Podcasts, visit www.isaca.org/podcasts.

270 Views • 1 year ago

VIDEO


CURRENT STATE OF CYBERSECURITY IN K12

ISACAs Director of Professional Practices and Innovation Jon Brand hosts Doug
Levin, co-founder and National Director of K12 Security Information eXchange
(K12 SIX), a national non-profit dedicated solely to helping schools protect
themselves from emerging cybersecurity threats. Levin's work includes
development and implementation of the nations initial and subsequent technology
plans and well as creation of K-12 Cyber Incident Map, the most comprehensive
database of publicly-disclosed K-12 cybersecurity incidents. Throughout this
episode they discuss the often unique challenges for the underrepresented sector
of U.S. critical infrastructure and current initiatives to bolster K-12
cybersecurity and privacy. For more information, check out
https://www.k12six.org/ Be sure to like, comment and subscribe for more ISACA
Productions content

386 Views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT - TODD FITZGERALD

Cybersecurity leader, author, and host of the CISO Stories podcast, Todd
Fitzgerald sits down with ISACA’s Chelsey Byrd to discuss his extensive career
journey in security, his best-selling book, CISO COMPASS, and how a make-believe
FBI club connects directly to his career passions today. As one of ISACA’s
top-rated speakers, Todd gives tips and techniques for the best way to prepare
for a speaking event, how to engage the audience, and some entertaining moments
and behind-the-scenes accounts from conferences! Named the Chicago CISO of the
Year and ranked Top 50 IS Executive in 2016 and 2017, Todd offers listeners his
best career advice, ways to stay aware of current business trends, and much
more. Listen now to this episode of ISACA’s Industry Spotlight. To listen to
CISO Stories, visit
https://securityweekly.com/category-shows/the-ciso-stories-podcast/ To listen to
more ISACA Podcasts, visit www.isaca.org/podcasts

262 Views • 1 year ago

VIDEO


MANAGING SECURITY ACROSS DISPARATE DATABASE TECHNOLOGIES

We usually think about the most efficient way to do things while working in
production environments. Still, often employees forget about an insecure
environment once the work has been completed and they have moved on to another
project. “We don’t always need to audit things; sometimes you can gauge risk by
having a conversation with stakeholders…on how they manage databases,” says Adam
Kohnke, Cybersecurity Architect for Charter Next Generation. Adam joins ISACA’s
Jon Brandt in this episode to discuss his recently released ISACA Journal
article, “Managing Security Across Disparate Database Technologies.” Adam breaks
down best practices for User Access Management, Encryption, and Logging. He
comments on the best ways to start the conversation about security beyond what
management considers vital for IT. Tune in now for the full episode! To read the
full article, visit
www.isaca.org/managing-security-across-disparate-database-technologies. To
listen to more ISACA podcasts, visit: www.isaca.org/podcasts

323 Views • 1 year ago

VIDEO


ADVANCING DIGITAL TRUST THROUGH AUDIT AND ASSURANCE

A strong audit and assurance function is critical to achieving digital trust in
an organization. This conversation spotlights audit's role in digital trust and
outlines key priorities. It also shares new ISACA resources for auditors. For
more information, go to https://isaca.org/digital-trust

405 Views • 1 year ago

VIDEO


IMPLEMENTING EMERGING TECHNOLOGIES: AGILE SDLC STILL WORKS

AI is a part of our everyday life. What's The Risk LLC's Cindy Baxter gives
ISACA's Kevin Keh examples of modern media like the movies Free Guy, Ron’s Gone
Wrong and The Matrix, and how they relate to AI-related risk factors, and they
ask the questions, what is true? what is the data we are looking at? AI is about
data accuracy and reputational risk, and Cindy discusses how to manage
frameworks, create meaningful check points and intended outcomes six months or 2
years later that are spot on for what an organization intended. Cindy strongly
believes that you always get a better outcome with diversity, because people
from diverse backgrounds and life experiences create different ways to learn and
produce innovative ideas and avoid rework. To read Cindy's full article, visit:
www.isaca.org/implementing-emerging-technologies To listen to more ISACA
podcasts, visit: www.isaca.org/podcasts

203 Views • 1 year ago

VIDEO


ISACA LIVE | MANAGING SUPPLY CHAIN RISK WITH RICHARD HOLLIS

ISACA's risk expert Paul Phillips and Richard Hollis, CEO of Risk Factory and an
ISACA Conference Europe speaker, examine top cyber risks impacting the supply
chain, steps organizations need to take to manage supply chain risk, and
important steps to take in the contract process. For more information, check out
https://www.isaca.org/supply-chain-security Be sure to like, comment, and
subscribe for more ISACA Productions content.

305 Views • 1 year ago

VIDEO


INDUSTRY SPOTLIGHT - PAM NIGRO

On this episode of Industry Spotlight, ISACA's outgoing Board Chair, Greg
Touhill, introduces the 2022-23 Board Chair, Pam Nigro. They trade stories from
their careers, Pam's thoughts on the future of ISACA, how Game of Thrones
relates to Cybersecurity, and Greg shares his favorite moments from his tenure.
To read Pam's welcome letter, go to:
www.isaca.org/letter-from-the-incoming-board-chair To listen to more ISACA
Podcasts, go to: www.isaca.org/podcasts

245 Views • 1 year ago

VIDEO


THE IMPACT OF PEOPLE ON THE INFORMATION TECHNOLOGY LANDSCAPE

In this episode, ISACA’s Jon Brandt chats with Thomas Lenzenhofer, Business
Development Manager at Cisco, about his new ISACA article titled, “The Impact of
People on Today’s Information Security Landscape.” With over 20 years of
industry experience and named 2016–17 Chicago CISO of the Year, ranked Top 50 IS
Executive, Thomas has a wealth of knowledge to share with ISACA listeners.
Security of an organization is a serious matter and Thomas gives a vivid
scenario from his recent ISACA Journal article about how an attack of a
country's health care system could be massively disruptive to daily functions of
staff computer systems, possibly causing employees to not receive payroll.
Thomas also gives examples of how to properly train staff to avoid an event like
this and says that from the top-down security is a business enabler. Tune in
now! To read Thomas' ISACA article, visit:
www.isaca.org/impact-of-people-on-information-security-landscape To listen to
more ISACA podcasts, visit: www.isaca.org/podcasts

125 Views • 1 year ago

VIDEO


GRC FOR INTELLIGENT ECOSYSTEMS (GRCIE): AN INNOVATIVE APPROACH TO WORKFORCE
ENABLEMENT PART II

Executive Director for GRC for Intelligent Ecosystem (GRCIE) Jenai Marinkovic
joins ISACA Director of Professional Practices and Innovation Jon Brandt to
address key findings in ISACA's 2022 State of Cybersecurity report and talk
about GRCIE program. In this two-part program, they delve into program creation,
services offered, student selection and how ISACA research continues to shape
their work.  For more information about GRCIE, visit https://www.grcie.org/ Be
sure to like, comment, and subscribe for more ISACA Productions content Direct
Link to Part I: https://youtu.be/S4U1e9PMlmg

58 Views • 1 year ago

VIDEO


GRC FOR INTELLIGENT ECOSYSTEMS (GRCIE): AN INNOVATIVE APPROACH TO WORKFORCE
ENABLEMENT PART I

Executive Director for GRC for Intelligent Ecosystem (GRCIE) Jenai Marinkovic
joins ISACA Director of Professional Practices and Innovation Jon Brandt to
address key findings in ISACA's 2022 State of Cybersecurity report and talk
about GRCIE program. In this two-part program, they delve into program creation,
services offered, student selection and how ISACA research continues to shape
their work. For more information about GRCIE, visit https://www.grcie.org/ Be
sure to like, comment, and subscribe for more ISACA Productions content Direct
Link to Part II: https://youtu.be/Bg7_Oh3Ifow

294 Views • 1 year ago

VIDEO


SMARTER TESTING = SAFER DIGITAL EXPERIENCES

Application testing is a critical component of a software development lifecycle.
A complete testing battery for any application includes not only functionality
and usability testing but security and reliability testing as well. However,
helping ensure that security testing in particular produces results that focus
on actionable items – with accurate relative priorities – has been a persistent
challenge. Are actionable items from testing actually going to move the needle
in terms of product quality and resilience – especially in how they manage
evolving threats? While the “OWASP Top 10” and “CWE/SANS Top 25” are still
important, they represent merely a reasonable beginning to a security testing
strategy. How do you go beyond those lists and become truly more
“adversary-aware” in testing? In addition, how do you make sure that these
testing efforts genuinely help your development teams “shift left” in their
thinking and implementation of better security controls in your applications?
These are challenges Adobe set out to solve by not just making our testing
efforts more extensive or frequent – but smarter, and with as tight of alignment
as possible to the software development lifecycle and even closer in modeling
real-world adversary threats. We invite you to join Shannon Lietz, VP, Adobe
Security, as she speaks with ISACA's IT Audit Professional Practices Principal,
Robin Lyons for a discussion of these issues and others that we must address as
an industry to make us genuinely more “DevSecOps”-minded in our approach to
application security testing. Robin and Shannon will discuss Adobe’s overall
strategy around our application testing efforts and how smarter testing is
fundamental to achieving a true “shift left” approach around application
security. They will also talk about how this effort is really going to help us
deliver the safer digital experiences users are demanding. For more information
go to https://trust.adobe.com Be sure to like, comment, and subscribe for more
ISACA Productions content.

388 Views • 1 year ago

VIDEO


DATA RESILIENCE

Ensuring That Your Organization Is Data Resilient Part I--Data is something we
constantly interact with. What happens when an adverse event occurs, thus
compromising your organization? Guy Pearce is the Chief Data Officer and Chief
Digital Officer at Convergence Tech. Guy sits down with ISACA's Kevin Keh to dig
into everything you'll want to know to keep your organization's data safe.
Listen is as Guy defines data resilience, understanding what the 4 aspects of
the data operating model are and how to utilize them, and the importance of data
governance. Kevin and Guy will also cover the resilience
attributes—availability, usability, robustness interoperability and
performance—as well as the need for enterprise risk officers to assure they
actually perform data risk assessments. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-3/data-resilience-is-data-risk-management
for more information!

250 Views • 1 year ago

VIDEO


TWO PERSPECTIVES ON DATA RESILIENCE: DATA OPERATING MODEL AND DATA CAPABILITIES

Ensuring That Your Organization Is Data Resilient Part II--Data is something we
constantly interact with. What happens when an adverse event occurs, thus
compromising your organization? Guy Pearce is the Chief Data Officer and Chief
Digital Officer at Convergence Tech. Guy sits down with ISACA's Kevin Keh to dig
into everything you'll want to know to keep your organization's data safe.
Listen is as Guy defines data resilience, understanding what the 4 aspects of
the data operating model are and how to utilize them, and the importance of data
governance. Kevin and Guy will also cover the resilience
attributes—availability, usability, robustness interoperability and
performance—as well as the need for enterprise risk officers to assure they
actually perform data risk assessments. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-3/data-resilience-is-data-risk-management
for more information!

128 Views • 1 year ago

VIDEO


KEY CONSTRUCTS OF A RESILIENT SYSTEM

Ensuring That Your Organization Is Data Resilient Part III--Data is something we
constantly interact with. What happens when an adverse event occurs, thus
compromising your organization? Guy Pearce is the Chief Data Officer and Chief
Digital Officer at Convergence Tech. Guy sits down with ISACA's Kevin Keh to dig
into everything you'll want to know to keep your organization's data safe.
Listen is as Guy defines data resilience, understanding what the 4 aspects of
the data operating model are and how to utilize them, and the importance of data
governance. Kevin and Guy will also cover the resilience attributes
—availability, usability, robustness interoperability and performance— as well
as the need for enterprise risk officers to assure they actually perform data
risk assessments. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-3/data-resilience-is-data-risk-management
for more information!

70 Views • 1 year ago

VIDEO


DATA CAPABILITY FAILURES

Ensuring That Your Organization Is Data Resilient Part IV--Data is something we
constantly interact with. What happens when an adverse event occurs, thus
compromising your organization? Guy Pearce is the Chief Data Officer and Chief
Digital Officer at Convergence Tech. Guy sits down with ISACA's Kevin Keh to dig
into everything you'll want to know to keep your organization's data safe.
Listen is as Guy defines data resilience, understanding what the 4 aspects of
the data operating model are and how to utilize them, and the importance of data
governance. Kevin and Guy will also cover the resilience
attributes—availability, usability, robustness interoperability and
performance—as well as the need for enterprise risk officers to assure they
actually perform data risk assessments. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-3/data-resilience-is-data-risk-management
for more information!

34 Views • 1 year ago

VIDEO


ATTRIBUTES OF DATA RESILIENCE

Ensuring That Your Organization Is Data Resilient Part V--Data is something we
constantly interact with. What happens when an adverse event occurs, thus
compromising your organization? Guy Pearce is the Chief Data Officer and Chief
Digital Officer at Convergence Tech. Guy sits down with ISACA's Kevin Keh to dig
into everything you'll want to know to keep your organization's data safe.
Listen is as Guy defines data resilience, understanding what the 4 aspects of
the data operating model are and how to utilize them, and the importance of data
governance. Kevin and Guy will also cover the resilience
attributes—availability, usability, robustness interoperability and
performance—as well as the need for enterprise risk officers to assure they
actually perform data risk assessments. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-3/data-resilience-is-data-risk-management
for more information!

73 Views • 1 year ago

VIDEO


CONSIDERING THE VARIOUS TYPES OF DATA RISKS

Ensuring That Your Organization Is Data Resilient Part VII--Data is something we
constantly interact with. What happens when an adverse event occurs, thus
compromising your organization? Guy Pearce is the Chief Data Officer and Chief
Digital Officer at Convergence Tech. Guy sits down with ISACA's Kevin Keh to dig
into everything you'll want to know to keep your organization's data safe.
Listen is as Guy defines data resilience, understanding what the 4 aspects of
the data operating model are and how to utilize them, and the importance of data
governance. Kevin and Guy will also cover the resilience
attributes—availability, usability, robustness interoperability and
performance—as well as the need for enterprise risk officers to assure they
actually perform data risk assessments. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-3/data-resilience-is-data-risk-management
for more information!

65 Views • 1 year ago

VIDEO


BENEFITS OF DATA RESILIENCE

Ensuring That Your Organization Is Data Resilient Part VIII--Data is something
we constantly interact with. What happens when an adverse event occurs, thus
compromising your organization? Guy Pearce is the Chief Data Officer and Chief
Digital Officer at Convergence Tech. Guy sits down with ISACA's Kevin Keh to dig
into everything you'll want to know to keep your organization's data safe.
Listen is as Guy defines data resilience, understanding what the 4 aspects of
the data operating model are and how to utilize them, and the importance of data
governance. Kevin and Guy will also cover the resilience
attributes—availability, usability, robustness interoperability and
performance—as well as the need for enterprise risk officers to assure they
actually perform data risk assessments. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-3/data-resilience-is-data-risk-management
for more information!

83 Views • 1 year ago

VIDEO


ENSURING YOUR ORGANIZATION IS DATA RESILIENT

Ensuring That Your Organization Is Data Resilient Part VI--Data is something we
constantly interact with. What happens when an adverse event occurs, thus
compromising your organization? Guy Pearce is the Chief Data Officer and Chief
Digital Officer at Convergence Tech. Guy sits down with ISACA's Kevin Keh to dig
into everything you'll want to know to keep your organization's data safe.
Listen is as Guy defines data resilience, understanding what the 4 aspects of
the data operating model are and how to utilize them, and the importance of data
governance. Kevin and Guy will also cover the resilience
attributes—availability, usability, robustness interoperability and
performance—as well as the need for enterprise risk officers to assure they
actually perform data risk assessments. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-3/data-resilience-is-data-risk-management
for more information!

51 Views • 1 year ago

VIDEO


DATA RISK ASSESSMENTS AND THE JOURNEY OF DATA RESILIENCE

Ensuring That Your Organization Is Data Resilient Part IX--Data is something we
constantly interact with. What happens when an adverse event occurs, thus
compromising your organization? Guy Pearce is the Chief Data Officer and Chief
Digital Officer at Convergence Tech. Guy sits down with ISACA's Kevin Keh to dig
into everything you'll want to know to keep your organization's data safe.
Listen is as Guy defines data resilience, understanding what the 4 aspects of
the data operating model are and how to utilize them, and the importance of data
governance. Kevin and Guy will also cover the resilience
attributes—availability, usability, robustness interoperability and
performance—as well as the need for enterprise risk officers to assure they
actually perform data risk assessments. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-3/data-resilience-is-data-risk-management
for more information!

62 Views • 1 year ago

VIDEO


CYBER DECISIONS ONLY EXECUTIVES CAN MAKE

One of ISACA’s most popular Journal columnists joins us to discuss his most
recent release, “Cyber Decisions Only Executives Can Make.” Steven Ross chats
with ISACA’s Safia Kazi about cyber recovery plans that organizations have in
place and that only when an attack disrupts normal business operations do those
organizations realize they should have prepared and planned for operation
continuity without the system and data they rely on. As Executive Principal for
Risk Master International and fifty plus years of industry experience, Steven
shares his insights into cyber recovery plans, categorizing cyberattacks, paying
ransom to cyber criminals, and offers his advice on what organizations should do
if they find themselves in the middle of a critical cyber decision. To read the
full ISACA Journal article, click here:
https://www.isaca.org/resources/isaca-journal/issues/2022/volume-4/cyber-decisions-only-executives-can-make
Be sure to like, comment, and subscribe for more ISACA Productions content.

257 Views • 1 year ago

VIDEO


BREAKING DOWN THE ESET T1 2022 THREAT REPORT

ESET, a global leader in cybersecurity, has released its T1 2022 Threat Report,
which summarizes the most notable trends that shaped the threat landscape from
January to April 2022. Join ISACA’s Research Advisor, Brian Fletcher, as he
breaks down the ESET T1 2022 Threat Report with Chief Security Evangelist for
ESET, Tony Anscombe. For more information, check out ESET’s award-winning blog:
WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news
from ESET Research. Be sure to like, comment, and subscribe for more ISACA
Productions content.

270 Views • 1 year ago

VIDEO


REAL-WORLD DATA RESILIENCE

Join ISACA's Lisa Villanueva as she talks with Guy Pearce about his recently
released ISACA Journal article "Real-World Data Resilience". Guy has a deep
knowledge of the movement of data and says "it’s about change and nothing is
stable." Lisa asks Guy about AI model implications, Data Drift and cloud
adoption. If you want to dive deeper, you can read the entire journal article
and learn about data and resilience in its modern context at:
https://www.isaca.org/resources/isaca-journal/issues/2022/volume-3/real-world-data-resilience-demands-an-integrated-approach-to-ai-data-governance-and-the-cloud
To listen to more ISACA podcasts, visit: www.isaca.org/podcasts Be sure to like,
comment, and subscribe for more ISACA Productions content.

254 Views • 2 years ago

VIDEO


WHERE PRIVACY MEETS SECURITY

Jo Stewart-Rattray, the Director of Technology & Security Assurance for BRM
Advisory, believes privacy is a team sport. Every organization needs to be
responsible for asking, “what data is being collected,” “where is the
information held,” “what purpose is the information being collected for,” and
“how is the information being protected.” Jo chats with ISACA's Safia Kazi about
why it is essential that security and privacy teams collaborate when it comes to
collecting data. She expands on why the central role of a CISO needs to be
educating and communicating this team approach to organizations. Jo says that
the issue of data privacy will only continue to grow as the digital economy
grows and why privacy and security professionals play a critical role in
ensuring that enterprises adhere to privacy laws and regulations that protect
their customers’ personal data. To read Jo's full article, follow this link
www.isaca.org/where-privacy-meets-security Be sure to like, comment, and
subscribe for more ISACA Productions content.

528 Views • 2 years ago

VIDEO


HOW TO BUILD A FOLLOWING AROUND YOUR IDEAS

In this talk based on her book Stand Out: How to Find Your Breakthrough Idea and
Build a Following Around It, Dorie Clark explains how to build a following
around your ideas. Join Megan Moritz and Dorie Clark as they discuss advancing
your business or your cause and inspiring others to listen and take action. Be
sure to like, comment, and subscribe for more ISACA Productions content.

186 Views • 2 years ago

VIDEO


STUDY YOUR SOCIAL MEDIA ENVIRONMENT

How Do Organizations Control Their Use of Social Media Part IV - What are the
main risks that most enterprises need to consider when it comes to social media?
If you don’t know, you and your organization are in danger of serious
reputational risk! Watch as ISACA’s IT Governance Job Practice Lead, Lisa
Villanueva discusses the risks of social media with Robert Findlay, Global Head
of IT Audit at Glanbia. Social media is one of the easiest platforms to hack and
it isn’t just from external threat actors. Oftentimes, the hack is coming from
inside the organization from current and recently released employees. And
remember, it doesn’t matter who hacks into your social platform, it is your
enterprise that gets the blame and negative press. Robert and Lisa also discuss
the current state of security on social media platforms and how organizations
can benefit by bringing in auditors to show how to control the management of
social media and avoid these pitfalls. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-4/how-do-organizations-control-their-use-of-social-media-part-1
for more information!

32 Views • 2 years ago

VIDEO


PRIVACY AND SOCIAL MEDIA

How Do Organizations Control Their Use of Social Media Part V - What are the
main risks that most enterprises need to consider when it comes to social media?
If you don’t know, you and your organization are in danger of serious
reputational risk! Watch as ISACA’s IT Governance Job Practice Lead, Lisa
Villanueva discusses the risks of social media with Robert Findlay, Global Head
of IT Audit at Glanbia. Social media is one of the easiest platforms to hack and
it isn’t just from external threat actors. Oftentimes, the hack is coming from
inside the organization from current and recently released employees. And
remember, it doesn’t matter who hacks into your social platform, it is your
enterprise that gets the blame and negative press. Robert and Lisa also discuss
the current state of security on social media platforms and how organizations
can benefit by bringing in auditors to show how to control the management of
social media and avoid these pitfalls. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-4/how-do-organizations-control-their-use-of-social-media-part-1
for more information!

93 Views • 2 years ago

VIDEO


CYBERSECURITY CERTIFICATION AND MITIGATING RISK

How Do Organizations Control Their Use of Social Media Part VII - What are the
main risks that most enterprises need to consider when it comes to social media?
If you don’t know, you and your organization are in danger of serious
reputational risk! Watch as ISACA’s IT Governance Job Practice Lead, Lisa
Villanueva discusses the risks of social media with Robert Findlay, Global Head
of IT Audit at Glanbia. Social media is one of the easiest platforms to hack and
it isn’t just from external threat actors. Oftentimes, the hack is coming from
inside the organization from current and recently released employees. And
remember, it doesn’t matter who hacks into your social platform, it is your
enterprise that gets the blame and negative press. Robert and Lisa also discuss
the current state of security on social media platforms and how organizations
can benefit by bringing in auditors to show how to control the management of
social media and avoid these pitfalls. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-4/how-do-organizations-control-their-use-of-social-media-part-1
for more information!

63 Views • 2 years ago

VIDEO


INDUSTRY SPOTLIGHT: JAN ANISIMOWICZ

Jan Anisimowicz is an experienced senior IT manager with over 23 years of
experience in GRC, data analysis, broad business, and technical perspective in
telco, banking, pharma, and insurance. As the COO and EVP at C&F, he is
consistently solving business problems by leveraging his all-around experience
in creating and developing IT products and IT service offerings for businesses.
In this ISACA Industry Spotlight episode, Jan Anisimowicz chats with ISACA's
Megan Moritz on what he believes the most pressing current business continuity
issue is in this always-changing industry. With the recent pandemic, Jan also
discusses his active participation in the digital transformation technology for
vaccine manufacturers, the key component to the development and delivery of the
vaccine. He also explains why he wants to travel to Mars, how some friends
convinced him to run 9 marathons, and his dream to build a 14th-century-style
restaurant with archival computers and gaming devices! To learn more about Jan,
visit: linkedin.com/in/anisimowicz Be sure to like, comment, and subscribe for
more ISACA Productions content.

233 Views • 2 years ago

VIDEO


CLIMATE RESILIENCY AND REGULATION

Climate resiliency and green innovations are of worldwide interest today, but
what is the best way to use skills and expertise that will make a difference?
 Cindy Baxter from What's the Risk, LLC talks with Frank O'Brian, leader of the
East Boston Climate Coalition to hear about the Coalition's approach, the
challenges they've faced, and what they do to overcome obstacles.  This
discussion takes us into everyone's backyard to understand how IS audit and risk
professionals can contribute to climate resiliency in an impactful way. Please
join us to imagine the role you can play in environmental resiliency and
justice! To read Cindy's full ISACA Journal article - follow this link -
www.isaca.org/resilience-and-regulation Be sure to like, comment, and subscribe
for more ISACA Productions content!

267 Views • 2 years ago

VIDEO


CYBERSECURITY IN A COVID-19 WORLD: INSIGHTS ON HOW DECISIONS ARE MADE

In the early days of the Covid-19 pandemic, all organizations pivoted to remote
work. Now that we are years into working remotely, University of West Florida's
Jerry Burch asks if the choices we made in 2020 are still the best ones. He
explains to ISACA's Brian Fletcher what the concept of "satisficing" is and why
we might want to explore other options before picking a solution for employees’
remote work. While we have all adjusted to the shift that came in March 2020,
Jerry argues that it could happen again and now is the time to consider all
options for your cybersecurity team. He also discusses Rational choice theory as
it relates to cybersecurity and fighting cybercrime. Tune in now! To read
Cybersecurity In A Covid-19 World: Insights On How Decisions Are Made, Please
visit: www.isaca.org/cybersecurity-in-a-covid-world To listen to more ISACA
Podcasts, please visit: isaca.org/podcasts

140 Views • 2 years ago

VIDEO


INDUSTRY SPOTLIGHT: CAITLIN MCGAW

Caitlin McGaw answered an ad in the newspaper in 1997 for a position with an
Executive Search Firm and she was instantly hooked. She tells ISACA's Hollee
Mangrum-Willis that for the past 25 years, she has been passionate about the
idea of corporate match-making in the IT Audit space. Hollee asks Caitlin about
process improvement within the ISACA community and the examples of candidates
using transferable skills to pivot to different positions within the industry.
Caitlin discusses the growth mindset and coachability of a candidate during the
hiring process and how that translates to performance on the job. Caitlin also
explains why she thinks more candidates should pursue careers in IT Audit. To
learn more about Caitlin, visit: www.linkedin.com/in/caitlinmcgaw and
www.caitlinmcgaw.com To listen to more ISACA podcasts, visit: isaca.org/podcasts

189 Views • 2 years ago

VIDEO


INDUSTRY SPOTLIGHT: ED MCCABE

One of Ed McCabe's first childhood memories was taking apart his grandparent's
heirloom grandfather clock to find out why it wasn't working. His grandparents
were not happy to find it in pieces, but he did get it working again and says
that experience was the beginning of a life-long interest in IT, beginning his
quest to always ask "why, how and what is technology supposed to do and what is
it not, supposed to do?". ISACA's Angie Coleman talks to Ed about his career in
the US Navy, private sector and founding his own company The Rubicon Advisory
Group. Ed discusses how his organization has supported clients through the most
challenging moments during the pandemic, how he learned to find balance for his
life while sustaining his passion for education and technology, and what his
advice is to ISACA members when preparing for a certification test. For more
information on Ed, visit: www.therubiconadvisorygroup.com To listen to more
ISACA Podcasts, visit: www.isaca.org/podcasts Be sure to like, comment, and
subscribe for more ISACA Productions content!

486 Views • 2 years ago

VIDEO


CYBER (BUSINESS) RECOVERY

"The thing that you plan for is not the thing that is going to happen" says Risk
Masters' Executive Principal Steven Ross. Steven talks to ISACA's Safia Kazi
about how to prepare for a cybersecurity Event and how to recover. Steven
discusses the types of attacks to watch out for, Business Continuity Planning
and how to recover from a cybersecurity event. Listen in as Steven shares some
ways you can use your imagination to prepare for "the thing that is going to
happen". To read Steven's full article, visit:
https://www.isaca.org/resources/isaca-journal/issues/2022/volume-3/cyber-business-recovery
To listen to more ISACA Podcasts, visit: https://www.isaca.org/podcasts

581 Views • 2 years ago

VIDEO


INDUSTRY SPOTLIGHT – NIKI GOMES

Everyone starts somewhere and for Niki Gomes, it was at the front desk of a
hotel where she worked her way up to hospitality management, before pivoting to
accounting and finally to the American Red Cross, where she is currently Senior
Internal Auditor. Niki tells ISACA's Melissa Swartz about her passion for
people, technology and how the pandemic changed her work life to better connect
with her family. Dive deep into this Industry Spotlight episode as Niki
discusses why young Black and Latina women are under-represented in the industry
and her plan to remedy that divide, mentoring and what her advice is for the
next generation. Tune in now to hear all of Niki's inspiring story! For more
information, check out out https://www.redcross.org/ Be sure to like, comment,
and subscribe for more ISACA Production content.

208 Views • 2 years ago

VIDEO


MANAGING DATA PRIVACY RISKS AND COMPLIANCE WITH A DISTRIBUTED WORKFORCE

Data now includes, consumer's social media, news, view and even browser
searches. From 2010-2020, the amount of data created, captured, and copied in
the world increased from 1.2 trillion GB to 59 trillion GB and the amount
created in the next 5 years is projected to double. With that massive amount of
data being collected, there is a growing sense of distrust with consumers when
it comes to privacy. RGP's Janis Parthun and Lynn Rohland join ISACA's Safia
Kazi for a discussion about data privacy. Janis and Lynn discuss trends from
their clients, challenges that AI is introducing and the effect that the
pandemic has had on the industry. Visit ISACA.org/podcasts for more ISACA
Podcasts! Be sure to like, comment, and subscribe for more ISACA content! To
find out more about RGP, visit https://rgp.com/

561 Views • 2 years ago

VIDEO


CMMC AND CUI: ROCKET FUEL

"Cybersecurity is only as good as an organization's weakest link" - Ali Pabrai
Join ISACA's Senior Manager, CMMI Professional Practice, Kileen Harrison as she
talks with ecfirst's Chief Executive Officer, Ali Pabrai about his recently
released articles, “What Cyberprofessionals Should Know About CUI”, and “US DoD
Launches Comprehensive CMMC 2.0 Cybersecurity Framework”. Ali explains the three
levels of CCMC 2.0 and goes further in depth on CUI classification. By the end
of this episode, you'll have all the CMMC and CUI "Rocket Fuel" that you need to
understand this latest certification. To read Ali's full articles -
https://www.isaca.org/resources/news-and-trends/newsletters/atisaca/2022/volume-8/what-cyberprofessionals-should-know-about-cui
https://www.isaca.org/resources/news-and-trends/industry-news/2022/us-dod-launches-comprehensive-cmmc-2-cybersecurity-framework
Be sure to like, comment, and subscribe for more ISACA content.

190 Views • 2 years ago

VIDEO


A SECURITY AWARENESS PROGRAM FOR PCI-DSS COMPLIANCE

People are considered the weakest link in any organization’s cybersecurity
defenses. Hence, in most cases, the primary targets of cyber-attackers are the
employees of the organization. In addition, people are easier to compromise and
exploit unlike finding a single software to breach an organization or enterprise
business. While a lot of efforts go into improving the existing security
infrastructure, ignorance of human resources would leave a significant gap in
the defense strategy. Join ISACA’s Research Advisor, Brian Fletcher, as he is
joined by Dr. Yasmin Razack, author of “A Security Awareness Program for PCI DSS
Compliance: Implementation and Legal and Ethical Issues to Be Considered”. In
this episode, they will be addressing the challenges in implementing a security
awareness program to fill this gap and the legal/ethical issues that needs to be
considered during implementation. As per the Payment Card Industry – Data
Security Standard (PCI-DSS) requirement 12.6, a Security Awareness Program is
mandatory to be held at least once a year and for new hires. However, it is not
an easy task and cannot be a one-time activity. But if implemented effectively,
awareness programs can be the human firewall of the organization. It will make
the organization compliant to regulations like PCI-DSS thereby protecting it
from fines due to non-compliance, defamation, costs of data breaches and will
help improve customer trust and loyalty. To read Dr. Razack’s full article click
here - www.isaca.org/pci-dss-compliance Be sure to like, comment, and subscribe
for more ISACA Production content!

738 Views • 2 years ago

VIDEO


INDUSTRY SPOTLIGHT - JO STEWART-RATTRAY

Making a difference within the cyber industry is of paramount importance to Jo
Stewart-Rattray. She is incredibly passionate about encouraging, teaching, and
mentoring more women into tech and security fields. In this episode of Industry
Spotlight, Robyn Franko, Manager of Event Operations and Services at ISACA,
chats with Jo about her background and career path, hobbies, and some
interesting challenges the industry faces. Jo has over 25 years of experience in
the IT field, some of which were spent as CIO in the Utilities and as Group CIO
in the Tourism space, and with significant experience in the Information
Security arena, including as CISO in the healthcare sector. She underpins her
information technology and security background with her qualifications in
education and management. She specializes in consulting in risk and technology
issues with a particular emphasis on governance and security in both the
commercial and operational areas of businesses. Jo provides strategic advice to
organizations across a number of industry sectors, including banking and
finance, utilities, manufacturing, tertiary education, retail, healthcare, and
government. She has chaired several of ISACA’s international committees,
including the Board Audit & Risk Committee, Leadership Development, and
Professional Influence & Advocacy. She served as an Elected Director on ISACA’s
International Board of Directors for seven years and was the founder of its
global women’s leadership initiative, SheLeadsTech. Because of her involvement
with ISACA and the SheLeadsTech program and her rural background Jo was selected
from a large number of candidates to be one of only two non-government delegates
and was invited to join the official Australian Government delegation to the
62nd Session of the United Nations Commission on the Status of Women (CSW62)
held in New York in March 2018. She returned to the UN in 2019 and again spoke
at two UN events this year. She has spoken on Capitol Hill during a Day of
Advocacy designed to bring tech leaders together in one place to discuss issues
related to women in technology and then to meet with congressional
representatives and Senator’s offices. Be sure to like, comment, and subscribe
for more ISACA Content. For more information check out - www.isaca.org/podcasts

299 Views • 2 years ago

VIDEO


THE TRANSFORMATIVE POWER OF MOBILITY

It's hard to believe the quarter century mark has almost arrived! Have you
thought about what you would like your work world to be in 2025? Have you
dreamed of more flexibility or better access to information so you can get work
done faster? ISACA’s IT Professional Practices Lead, Kevin Keh, sits down with
Cindy Baxter, Director of What's the Risk, LLC to talk about her recently
released article “The Transformative Power of Mobility”. Cindy spoke with three
professionals from three different industries and asked them how the promise of
mobility could change their work lives. Hear about the work her interviewees do
and the aspirations they have for themselves and their professions. Can IS risk
and audit professionals make their mobility dreams come true? Tune in to the
conversation and see what you think! To Read Cindy’s full ISACA Journal Article
click here - www.isaca.org/power-of-mobility Please like, comment, and subscribe
to the ISACA Media channels to keep up to date with all of ISACA’s new content.

170 Views • 2 years ago

VIDEO


INDUSTRY SPOTLIGHT WITH RAVEN DAVID

"For me, it's all about working with people... at the end of the day, you want
to work in a place where you can trust other individuals, you can get to know
other individuals, and being personable with one another makes an organization
great to work for," Raven David tells ISACA. In this Industry Spotlight episode,
we meet Raven David, Cyber Risk and Governance Manager for The University of New
South Wales (UNSW). Fascinated with technology at an early age, the native
Australian recalls that he spent part of his childhood disassembling computers
and putting them back together to understand better how they worked. This
passion led him on a fantastic life journey and set him on a path to dominate
the industry as a risk management, governance, compliance, assurance, and
emerging technologies expert. Raven talks about his less traditional educational
and career track. While working full-time, he managed a full-time class schedule
simultaneously, to a career that allowed him to establish and manage a cyber
risk and compliance team within a corporation of 5,000+ employees. Listen as
Raven recaps the success of his cybersecurity awareness program, gives
thoughtful advice to the next generation of young professionals, and discusses
his current self-educating project, 3D printed chess set with Arduino-powered
actuators and a Python chess engine.  As an active contributor to ISACA and the
ISACA Sydney Chapter, Raven recently volunteered, mentored, and led the 2021
Oceania Conference Taskforce and is currently a CRISC Certification Working
Group. In this ISACA Industry Spotlight episode, get to know the next-gen
cybersecurity leader, Raven David. Connect with Raven David on LinkedIn:
https://www.linkedin.com/in/ravendavid/  Press play now, and don’t forget to
subscribe!

254 Views • 2 years ago

VIDEO


PRIVACY FOR SALE

Is Privacy a commodity? This episode explores the future direction of privacy
and the demise of privacy in the digital age. Could privacy become something
that people cannot afford, creating a two-tier system of internet users — those
who can afford privacy and those who cannot? Join Safia Kazi, ISACA's Privacy
Professional Practice Advisor, as she speaks with Steven Ross, Executive
Principal of Risk Masters International, about his recently released ISACA
article "Privacy for Sale.” Listen in as they chat about what privacy could be
worth, and if this is a decision we must make soon? To read Steve’s full ISACA
Journal article, please check out www.isaca.org/privacy-for-sale We would love
to hear from you, please leave your comments below. If you enjoyed this episode,
please click the like and subscribe buttons for more from ISACA!

330 Views • 2 years ago

VIDEO


ENSURING THAT CYBERSECURITY IS EVERYONE’S JOB

Join ISACA’s Performance Based Training Engineer, Collin Beder as he speaks with
Tom Schneider, Senior Associate of Proactive Advisory for Cyber Defense Labs as
they discuss Tom’s recently released article “Ensuring that Cybersecurity is
Everyone’s Job”. Employees expect to focus on the responsibilities that are
communicated to them, for example in their job descriptions. If cybersecurity
and privacy responsibilities are not documented in job descriptions, then it is
likely that staff will assume that cybersecurity is not a primary responsibility
for them because management did not consider it significant enough to include.
Collin and Tom will delve into these topics and why keeping cybersecurity on
everyone’s mind will be better in the long run. To read Tom’s full article,
please check out
https://www.isaca.org/resources/isaca-journal/issues/2022/volume-2/ensuring-that-cybersecurity-is-everyones-job
We would love to hear from you, please leave your comments below. If you enjoyed
this episode, please click the like and subscribe buttons for more from ISACA!

349 Views • 2 years ago

VIDEO


CYBERPROS - ZERO TRUST: HOW TO BEAT ADVERSARIES AT THEIR OWN GAME FEATURING DR.
ZERO TRUST

ISACA’s Jon Brandt welcomes Dr. Chase Cunningham aka Dr. Zero Trust to the ISACA
CyberPros podcast. You may know Chase from his own podcast, Dr. Zero Trust, or
book series, Cynja. Chase dives deep into Zero Trust and Jon gets Chase's
opinions on how legislation relates to ZT, and thoughts on attack trends,
including how to outsmart bad actors. Listen now and don’t forget to subscribe
and write in the comments! For more information check
out https://www.isaca.org/credentialing/cybersecurity Interested in hearing more
from DrZeroTrust - check out his podcast at: https://anchor.fm/chase-cunningham8

534 Views • 2 years ago

VIDEO


RISING STAKES FOR PROTECTING CRITICAL INFRASTRUCTURE TEASER

Watch the full video at https://www.youtube.com/watch?v=ov7f9EL8w50

122 Views • 2 years ago

VIDEO


RISING STAKES FOR PROTECTING CRITICAL INFRASTRUCTURE TEASER

Critical infrastructure expert and renowned cyberthreat investigator Alex Holden
discusses the latest on critical infrastructure security as global tensions rise
amid Russian attacks in Ukraine. For more information check out
https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2022/tensions-shine-spotlight-on-protecting-critical-infrastructure

195 Views • 2 years ago

VIDEO


BREAKING DOWN THE ESET T3 2021 THREAT REPORT

Tune in as ISACA’s Kevin Keh talks with the Chief Security Evangelist of ESET,
Tony Anscombe about the latest released report from ESET. ESET, a global leader
in cybersecurity, has released its T3 2021 Threat Report, which summarizes the
most notable trends that shaped the threat landscape from September to December
2021. For more information, check out ESET’s award-winning blog: WeLiveSecurity.
Make sure to follow ESET Research on Twitter for the latest news from ESET
Research. To read the full Report, please check out
https://www.welivesecurity.com/2022/02/09/eset-threat-report-t32021/ We would
love to hear from you, please leave your comments below. If you enjoyed this
episode, please click the like and subscribe buttons for more from ISACA!

68 Views • 2 years ago

VIDEO


BUILDING DIGITAL TRUST IN A FINTECH START UP

Today's Page to Podcast features ISACA's Kevin Keh and Donald Tse, the Head of
Cyber & Technology Risk at Mox Bank and author of "Cybersecurity and the
Technology Risk in Virtual Banking", as they dive into the virtual banking scene
in fintech. This will compare the differences between a digital-only virtual
bank and a brick-and-mortar traditional bank and therefore the underlying
challenges and risks they face. As a founding member of Mox Bank, Donald will
also share his experience in building digital trust with customers and
regulators in this whole new cloud-native bank. To read Donald's full article,
please check out
https://www.isaca.org/resources/isaca-journal/issues/2022/volume-1/cybersecurity-and-technology-risk-in-virtual-banking
We would love to hear from you, please leave your comments below. If you enjoyed
this episode, please click the like and subscribe buttons for more from ISACA!

303 Views • 2 years ago

VIDEO


LESSONS LEARNED FROM A YEAR OF REMOTE WORK

Working from alternate work sites using unsecure networks may be here to stay,
but there is much to learn from 2020 that can help improve cybersecurity
capabilities for remote staff. Listen in with ISACA's Deputy Director of One in
Tech, Hollee Mangrum-Willis as she talks with Tom Conkle, CEO of Optic Cyber
Solutions, and Kelly Hood, EVP of Optic Cyber Solutions. They will discuss
various technical solutions such as using VPNs, enabling MFA, encrypting mobile
devices and laptops, and leveraging services such as a CASB, and how,
ultimately, training and awareness are the most effective at protecting
organizational data. To read the full article, be sure to check out
https://www.isaca.org/resources/news-and-trends/industry-news/2021/lessons-learned-from-a-year-of-remote-work.
We would love to hear from you, please leave your comments below. If you enjoyed
this episode, please click the like and subscribe buttons for more from ISACA!

365 Views • 2 years ago

VIDEO


UNPACKING PAKISTAN'S CYBERSECURITY POLICY 2021

Listen in as ISACA’s Director of Professional Practices & Innovation, Jon
Brandt, is joined by Muneeb Imran Shaikh, author of "Pakistan’s Cybersecurity
Policy in 2021: A Review". They will dig deeper into the report and discuss the
policy changes that Pakistan and other Central Asian countries will see moving
forward. To read the full report, be sure to check out
https://www.isaca.org/resources/news-and-trends/newsletters/atisaca/2021/volume-39/pakistan-cybersecurity-policy-in-2021-a-review.
We would love to hear from you, please leave your comments below. If you enjoyed
this episode, please click the like and subscribe buttons for more from ISACA!

337 Views • 2 years ago

VIDEO


USING XDR AND ZERO TRUST TO COMBAT RANSOMWARE

Both XDR and Zero Trust are useful security concepts, but they are sadly
overhyped. Listen in as ISACA's Research Advisor, Brian Fletcher and Trend
Micro's Bill Malik look into the realities behind ZDR and Zero Trust, how
ransomware works, and how the both XDR and Zero Trust can help organizations
minimize their vulnerabilities Interested in reading Bill's full ISACA Blog?
Click the link and download a copy today!
https://www.isaca.org/resources/news-and-trends/industry-news/2021/using-zero-trust-and-xdr-to-stop-ransomware
We would love to hear from you, please leave your comments below. If you enjoyed
this episode, please click the like and subscribe buttons for more from ISACA!

306 Views • 2 years ago

VIDEO


WHAT IS ENVIRONMENT, SOCIAL, AND GOVERNANCE (ESG)?

Mark Thomas (Founder, Escoute) and Caren Shiozaki (EVP & CIO, TMST, Inc.) join
ISACA's Lisa Villanueva for a conversation about Environment, Social, Governance
or ESG. Mark and Caren dive deep into why your organization will want to know
about ESG. Mark & Caren agree “the ESG Train” has already left the station.
Organizations need to jump on board now! Click play now to learn about ESG! For
more information, don't forget to check out
https://www.isaca.org/resources/insights-and-expertise/white-papers#sort=relevancy&layout=card
and https://youtube.com/playlist?list=PLHaB3gI5mcQa0zjjXSyC3ZBlKmsct9H4g

213 Views • 2 years ago

VIDEO


THE IMPACT OF SOX ON THE INDUSTRY 20 YEARS AGO AND TODAY WITH CINDY BAXTER

The Sarbanes-Oxley (SOX) Act was passed by the United States Congress in 2002.
20 years later, ISACA's IT Audit Professional Practice Lead, Robin Lyons chats
with Cindy Baxter, Director at What’s the Risk, LLC on all things SOX. Cindy
goes in-depth on the scandals that caused SOX to be enacted, legislation's
effect on corporate behavior, how SOX has affected the audit profession, and
what trends she sees in the regulatory landscape in 2022 and beyond! Interested
in reading Cindy’s full ISACA Journal article? Click the link and download a
copy today!
https://www.isaca.org/resources/isaca-journal/issues/2022/volume-1/the-impact-of-sox-on-the-industry-20-years-ago-and-today
We would love to hear from you, please leave your comments below. If you enjoyed
this episode, please click the like and subscribe buttons for more from ISACA!

453 Views • 2 years ago

VIDEO


PRIVACY IN THE DARK (DATA)

Listen in as Safia Kazi, ISACA's Privacy Professional Practice Advisor, as she
speaks with Steve Ross, Executive Principal of Risk Masters International, about
his article "Privacy in the Dark (Data)". Organizations have a lot of “dark
data”; information that they have collected, filed and forgotten. Some of it
concerns people, so there is a privacy concern about how that data is secured.
Both enterprising cyberattackers and litigants using eDiscovery tools have
incentive to search through this dark data to see what they might make use of.
The potential for misuse calls for greater attention to the security of this
data. For more information, don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2022/volume-1/privacy-in-the-dark-data

193 Views • 2 years ago

VIDEO


CYBERPROS - 2022 INDUSTRY NEWS WRAP

ISACA's CyberPro Jon Brant breaks down industry news stories so far in the new
year: Log4j, Cyber Insurance, Augmented Reality/Virtual Reality, Metaverse, Deep
Fakes, and even the legal discussion around vehicle car data. Tune in now to
hear Jon's hot takes on all this and more. Happy listening! For more
information, don't forget to check out
https://www.isaca.org/resources/news-and-trends/isaca-podcast-library.

124 Views • 2 years ago

VIDEO


ISACA CYBER PRO CHATS WITH NAOMI BUCKWALTER

ISACA’s Cyber Pro, Jon Brandt, invites information security guru, Naomi
Buckwalter, Director of Information Security and IT to the podcast to discuss
hot and heavy topics within Cybersecurity and the IT industry. Listen in as they
hash out the current and future trends. For More Information, Check Out
https://www.isaca.org/training-and-events/cybersecurity

275 Views • 2 years ago

VIDEO


WHAT WILL IT TAKE TO REACH DEVSECOPS MATURITY?

While our development teams have been busy running full speed ahead using the
latest and greatest technology to build amazing products, security teams haven’t
always been known to keep the same pace – and we have reached a point of
“developer revolt.” Security teams are still too often viewed as producers of
“design constraints” by development teams versus “reliable partners” in helping
them build better software. The path to changing this is getting security more
tightly integrated into the DevOps pipeline – and working to make security even
more of everyone’s responsibility. In this podcast Shannon Lietz, Adobe’s VP of
Vulnerability Labs, will discuss some of the opportunities for security teams to
become trusted partners, providing a roadmap for how DevSecOps needs to evolve
to reach necessary maturity, and discuss some of the efforts that can help the
broader security industry get better at this essential security muscle. For more
information, check out https://www.isaca.org/

80 Views • 2 years ago

VIDEO


THE LOG4SHELL VULNERABILITY: STEPS TO TAKE NOW AND GOOD PRACTICES FOR THE FUTURE

ISACA's Chris Dimitriadis and Scott Reynolds discuss the latest information
regarding the Log4Shell vulnerability, including what organizations need to do
in both the immediate and longer term. For more information on the Log4Shell
Vulnerability, visit:
https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2021/log4shell-vulnerability-highlights-critical-need-for-improved-detection-and-response

560 Views • 2 years ago

VIDEO


SECURITY OPERATIONS CHALLENGES IN 2021

ISACA’s Director, Channel Business Development, Chris DeMale is joined by
ServiceNow’s Director of Product Marketing, Karl Klaessig in this follow up
interview that takes a deeper look into his presentation during ISACA’s Virtual
Summit session, Security Operations Challenges in 2021. The presentation
discussed how opportunistic and tenacious cybercriminals can be. Klaessig takes
explores how dissecting attackers' behavior and automating responses can better
defend your attack surface. Don't forget to check out
https://www.isaca.org/training-and-events/online-training/virtual-summits for
more information!

193 Views • 2 years ago

VIDEO


INFORMATION SECURITY PROGRAMS NEED TO BE UBIQUITOUS, PROACTIVE, AND VIGILANT

This ISACA TV interview is a discussion about information security concerns (and
challenges), evolution, and the future. Topics covered include mobile computing
devices, the Internet of Things (IoT), artificial intelligence (AI), cyber
threat intelligence (CTI), software tools, and malware. Threats, risk,
safeguards, and countermeasures will be reviewed along with some new ideas and
approaches. Tune in as ISACA’s Information Security Professional Practices Lead,
Jon Brandt chat with Larry Wlosinski, Senior Consultant at Coalfire Federal
about his recently release article, Cyberthreat intelligence as a Proactive
Extension to Incident Response. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-6/cyberthreat-intelligence-as-a-proactive-extension-to-incident-response
for more information!

171 Views • 2 years ago

VIDEO


HOW INNOVATIVE ENTERPRISES WIN WITH SECURE MACHINE LEARNING

Enterprises use machine learning to validate who they are doing business with
and to find new opportunities. ISACA's IT Professional Practices Lead Kevin Keh
discusses secure machine learning with Protegrity's Chief Security Strategist
Ulf Mattsson. Ulf explains Trusted Execution Environment (TEE), synthetic data,
and encryption keys. All these technologies can be sometimes misunderstood, but
they are changing the digital landscape, so listen in now! Don't forget to check
out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-6/how-innovative-enterprises-win-with-secure-machine-learning
for more information!

199 Views • 2 years ago

VIDEO


HCL STATE OF CYBERSECURITY 2021

Jon Brandt (Information Security Professional Practices Lead at ISACA) and Renju
Varghese (Fellow and Chief Architect at HCL Technologies) break down the State
Of Cybersecurity 2021 —Part II report. Threat actors did not take advantage of
clients more during the pandemic, but there have been higher instances of
attacks or attempts of attacks during the past 18 months. This has brought
attention to organization’s boards and executives to show Cybersecurity in a
more serious light than it was pre-pandemic. Tune in now to hear what Renju says
you can expect in 2022! Don't forget to check out
https://www.isaca.org/why-isaca/about-us/newsroom/press-releases/2021/new-isaca-study-finds-cybersecurity-workforce-minimally-impacted-by-pandemic-but-still-grappling
for more information!

459 Views • 2 years ago

VIDEO


ISACA’S NEW CYBERPRO – JON BRANDT

Listen in as ISACA’s Information Security Professional Practices Lead, Jon
Brandt grabs the podcast microphone and takes over November’s Cyber Pros to
discuss CISA’s Directive Breakdown. Don't forget to check out
https://www.isaca.org/resources/news-and-trends/isaca-podcast-library for more
information!

121 Views • 2 years ago

VIDEO


THE CYBERSECURITY WORKFORCE

Join ISACA’s Director of Communications, Kristen Kessinger as she interviews
ISACA’s Information Security Professional Practices Lead, Jon Brandt about what
is currently happening in the cybersecurity workforce. Listen in as Jon explains
how the demand for cybersecurity resources is large, but the workforce pipeline
is not keeping pace and how that makes hiring difficult for organizations. Jon
and Kristen also discuss the “Great Resignation”, how the pandemic has helped
make job hunters more selective, and if the NIST/NICE frameworks are still
valued. Take a listen and enjoy! Don't forget to check out
https://www.isaca.org/resources/infographics/state-of-cybersecurity-2021-infographic
for more information!

362 Views • 2 years ago

VIDEO


EMERGING TECHNOLOGY - BLOCKCHAIN

In our third LinkedIn Live session on Emerging Technology, Director of Emerging
Technology and Innovation at ISACA, Dustin Brewer, and Principal Consultant at
Strategic Global Consulting LLC, Ronke Oyemade, discuss the topic of blockchain,
its common uses, security concerns related to the technology, and what the
future holds for blockchain as it continues to develop. Discover the highlights
here! Don't forget to check out
https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004Ko8bEAC for more
information

498 Views • 2 years ago

VIDEO


SOCIAL MEDIA HACKING RISK

How Do Organizations Control Their Use of Social Media Part III - What are the
main risks that most enterprises need to consider when it comes to social media?
If you don’t know, you and your organization are in danger of serious
reputational risk! Watch as ISACA’s IT Governance Job Practice Lead, Lisa
Villanueva discusses the risks of social media with Robert Findlay, Global Head
of IT Audit at Glanbia. Social media is one of the easiest platforms to hack and
it isn’t just from external threat actors. Oftentimes, the hack is coming from
inside the organization from current and recently released employees. And
remember, it doesn’t matter who hacks into your social platform, it is your
enterprise that gets the blame and negative press. Robert and Lisa also discuss
the current state of security on social media platforms and how organizations
can benefit by bringing in auditors to show how to control the management of
social media and avoid these pitfalls. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-4/how-do-organizations-control-their-use-of-social-media-part-1
for more information!

132 Views • 2 years ago

VIDEO


DANGERS OF SOCIAL MEDIA

How Do Organizations Control Their Use of Social Media Part II - What are the
main risks that most enterprises need to consider when it comes to social media?
If you don’t know, you and your organization are in danger of serious
reputational risk! Watch as ISACA’s IT Governance Job Practice Lead, Lisa
Villanueva discusses the risks of social media with Robert Findlay, Global Head
of IT Audit at Glanbia. Social media is one of the easiest platforms to hack and
it isn’t just from external threat actors. Oftentimes, the hack is coming from
inside the organization from current and recently released employees. And
remember, it doesn’t matter who hacks into your social platform, it is your
enterprise that gets the blame and negative press. Robert and Lisa also discuss
the current state of security on social media platforms and how organizations
can benefit by bringing in auditors to show how to control the management of
social media and avoid these pitfalls. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-4/how-do-organizations-control-their-use-of-social-media-part-1
for more information!

130 Views • 2 years ago

VIDEO


HOW DO ORGANIZATIONS CONTROL THEIR USE OF SOCIAL MEDIA

How Do Organizations Control Their Use of Social Media Part I - What are the
main risks that most enterprises need to consider when it comes to social media?
If you don’t know, you and your organization are in danger of serious
reputational risk! Watch as ISACA’s IT Governance Job Practice Lead, Lisa
Villanueva discusses the risks of social media with Robert Findlay, Global Head
of IT Audit at Glanbia. Social media is one of the easiest platforms to hack and
it isn’t just from external threat actors. Oftentimes, the hack is coming from
inside the organization from current and recently released employees. And
remember, it doesn’t matter who hacks into your social platform, it is your
enterprise that gets the blame and negative press. Robert and Lisa also discuss
the current state of security on social media platforms and how organizations
can benefit by bringing in auditors to show how to control the management of
social media and avoid these pitfalls. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-4/how-do-organizations-control-their-use-of-social-media-part-1
for more information!

75 Views • 2 years ago

VIDEO


FAKE BUSINESS VS YOUR REPUTATION

How Do Organizations Control Their Use of Social Media Part VIII - What are the
main risks that most enterprises need to consider when it comes to social media?
If you don’t know, you and your organization are in danger of serious
reputational risk! Watch as ISACA’s IT Governance Job Practice Lead, Lisa
Villanueva discusses the risks of social media with Robert Findlay, Global Head
of IT Audit at Glanbia. Social media is one of the easiest platforms to hack and
it isn’t just from external threat actors. Oftentimes, the hack is coming from
inside the organization from current and recently released employees. And
remember, it doesn’t matter who hacks into your social platform, it is your
enterprise that gets the blame and negative press. Robert and Lisa also discuss
the current state of security on social media platforms and how organizations
can benefit by bringing in auditors to show how to control the management of
social media and avoid these pitfalls. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-4/how-do-organizations-control-their-use-of-social-media-part-1
for more information!

36 Views • 2 years ago

VIDEO


AUDITING RISK BENEFIT ANALYSIS

How Do Organizations Control Their Use of Social Media Part VI - What are the
main risks that most enterprises need to consider when it comes to social media?
If you don’t know, you and your organization are in danger of serious
reputational risk! Watch as ISACA’s IT Governance Job Practice Lead, Lisa
Villanueva discusses the risks of social media with Robert Findlay, Global Head
of IT Audit at Glanbia. Social media is one of the easiest platforms to hack and
it isn’t just from external threat actors. Oftentimes, the hack is coming from
inside the organization from current and recently released employees. And
remember, it doesn’t matter who hacks into your social platform, it is your
enterprise that gets the blame and negative press. Robert and Lisa also discuss
the current state of security on social media platforms and how organizations
can benefit by bringing in auditors to show how to control the management of
social media and avoid these pitfalls. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-4/how-do-organizations-control-their-use-of-social-media-part-1
for more information!

68 Views • 2 years ago

VIDEO


CAN YOU MANAGE RISK WITHOUT MEASURING?

Cyber Risk and Communicating to a Board of Directors Part VII--Digital
transformation has heightened due to the pandemic. We went from, “we can’t work
from home” to “we can only work from home moving forward”. Because of this
change, our cyber risk increases and organizations need to take new action when
it comes to risk. Join ISACA’s Risk IT Risk Professional Practices Lead, Paul
Philips as he talks with Dr. Jack Freund—Head of Cyber Risk Methodology at
VisibleRisk —about how to effectively communicate Cyber Risk to a Board of
Directors. Organizations need to understand the financial ramifications of all
aspects of cyber risk. Along with risk quantification, organizations need to
work with and inform the BOD about the risk appetite for certain projects, how
much risk tolerance the organization can afford to deal with and more. Don't
forget to check out
https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004KoEHEA0 for more
information!

99 Views • 2 years ago

VIDEO


RISK APPETITE & TOLERANCE

Cyber Risk and Communicating to a Board of Directors Part VI--Digital
transformation has heightened due to the pandemic. We went from, “we can’t work
from home” to “we can only work from home moving forward”. Because of this
change, our cyber risk increases and organizations need to take new action when
it comes to risk. Join ISACA’s Risk IT Risk Professional Practices Lead, Paul
Philips as he talks with Dr. Jack Freund—Head of Cyber Risk Methodology at
VisibleRisk —about how to effectively communicate Cyber Risk to a Board of
Directors. Organizations need to understand the financial ramifications of all
aspects of cyber risk. Along with risk quantification, organizations need to
work with and inform the BOD about the risk appetite for certain projects, how
much risk tolerance the organization can afford to deal with and more. Don't
forget to check out
https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004KoEHEA0 for more
information!

445 Views • 2 years ago

VIDEO


LAW AND REGULATIONS

Cyber Risk and Communicating to a Board of Directors Part V--Digital
transformation has heightened due to the pandemic. We went from, “we can’t work
from home” to “we can only work from home moving forward”. Because of this
change, our cyber risk increases and organizations need to take new action when
it comes to risk. Join ISACA’s Risk IT Risk Professional Practices Lead, Paul
Philips as he talks with Dr. Jack Freund—Head of Cyber Risk Methodology at
VisibleRisk —about how to effectively communicate Cyber Risk to a Board of
Directors. Organizations need to understand the financial ramifications of all
aspects of cyber risk. Along with risk quantification, organizations need to
work with and inform the BOD about the risk appetite for certain projects, how
much risk tolerance the organization can afford to deal with and more. Don't
forget to check out
https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004KoEHEA0 for more
information!

45 Views • 2 years ago

VIDEO


RISK QUANTIFICATION

Cyber Risk and Communicating to a Board of Directors Part IV--Digital
transformation has heightened due to the pandemic. We went from, “we can’t work
from home” to “we can only work from home moving forward”. Because of this
change, our cyber risk increases and organizations need to take new action when
it comes to risk. Join ISACA’s Risk IT Risk Professional Practices Lead, Paul
Philips as he talks with Dr. Jack Freund—Head of Cyber Risk Methodology at
VisibleRisk —about how to effectively communicate Cyber Risk to a Board of
Directors. Organizations need to understand the financial ramifications of all
aspects of cyber risk. Along with risk quantification, organizations need to
work with and inform the BOD about the risk appetite for certain projects, how
much risk tolerance the organization can afford to deal with and more. Don't
forget to check out
https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004KoEHEA0 for more
information!

166 Views • 2 years ago

VIDEO


BOARD STRUCTURE AND COMMUNICATION

Cyber Risk and Communicating to a Board of Directors Part III--Digital
transformation has heightened due to the pandemic. We went from, “we can’t work
from home” to “we can only work from home moving forward”. Because of this
change, our cyber risk increases and organizations need to take new action when
it comes to risk. Join ISACA’s Risk IT Risk Professional Practices Lead, Paul
Philips as he talks with Dr. Jack Freund—Head of Cyber Risk Methodology at
VisibleRisk —about how to effectively communicate Cyber Risk to a Board of
Directors. Organizations need to understand the financial ramifications of all
aspects of cyber risk. Along with risk quantification, organizations need to
work with and inform the BOD about the risk appetite for certain projects, how
much risk tolerance the organization can afford to deal with and more. Don't
forget to check out
https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004KoEHEA0 for more
information!

84 Views • 2 years ago

VIDEO


CYBER RISK AS A STRATEGIC RISK

Cyber Risk and Communicating to a Board of Directors Part II--Digital
transformation has heightened due to the pandemic. We went from, “we can’t work
from home” to “we can only work from home moving forward”. Because of this
change, our cyber risk increases and organizations need to take new action when
it comes to risk. Join ISACA’s Risk IT Risk Professional Practices Lead, Paul
Philips as he talks with Dr. Jack Freund—Head of Cyber Risk Methodology at
VisibleRisk —about how to effectively communicate Cyber Risk to a Board of
Directors. Organizations need to understand the financial ramifications of all
aspects of cyber risk. Along with risk quantification, organizations need to
work with and inform the BOD about the risk appetite for certain projects, how
much risk tolerance the organization can afford to deal with and more. Don't
forget to check out
https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004KoEHEA0 for more
information!

116 Views • 2 years ago

VIDEO


COMMUNICATING CYBER RISK TO BOARDS

Cyber Risk and Communicating to a Board of Directors Part I--Digital
transformation has heightened due to the pandemic. We went from, “we can’t work
from home” to “we can only work from home moving forward”. Because of this
change, our cyber risk increases and organizations need to take new action when
it comes to risk. Join ISACA’s Risk IT Risk Professional Practices Lead, Paul
Philips as he talks with Dr. Jack Freund—Head of Cybe rRisk Methodology at
VisibleRisk —about how to effectively communicate Cyber Risk to a Board of
Directors. Organizations need to understand the financial ramifications of all
aspects of cyber risk. Along with risk quantification, organizations need to
work with and inform the BOD about the risk appetite for certain projects, how
much risk tolerance the organization can afford to deal with and more. Don't
forget to check out
https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004KoEHEA0 for more
information!

222 Views • 2 years ago

VIDEO


GAINING EXECUTIVE LEADERSHIP SUPPORT FOR SECURITY CHANGES

APTs Require Enhanced Cyberdefense Part VIII-- Advanced persistent threats
(APTs) are introduced by adversaries that possess sophisticated levels of
expertise and significant resources, which allow them to achieve their
objectives by using multiple attack vectors (e.g., cyberattacks, physical
attacks, deception). We must re-imagine cyberdefense. The threats are global,
the impact is local—and every organization, regardless of industry, should
examine strategic options to mitigate this risk to business. The old mantra
“trust, but verify” has given way to the idea of a zero trust security model,
which assumes the adversary is already inside the organization’s defenses. It is
worthwhile to examine some options to reduce risk from APTs. With every business
now a digital business, we must re-think, we must re-imagine cyber defense.”
Don't forget to check out
https://www.isaca.org/resources/news-and-trends/industry-news/2021/apts-require-enhanced-cyberdefense
for more information!

126 Views • 2 years ago

VIDEO


BACKGROUND ON THE CMMC MODEL

APTs Require Enhanced Cyberdefense Part VII--Advanced persistent threats (APTs)
are introduced by adversaries that possess sophisticated levels of expertise and
significant resources, which allow them to achieve their objectives by using
multiple attack vectors (e.g., cyberattacks, physical attacks, deception). We
must re-imagine cyberdefense. The threats are global, the impact is local—and
every organization, regardless of industry, should examine strategic options to
mitigate this risk to business. The old mantra “trust, but verify” has given way
to the idea of a zero trust security model, which assumes the adversary is
already inside the organization’s defenses. It is worthwhile to examine some
options to reduce risk from APTs. With every business now a digital business, we
must re-think, we must re-imagine cyber defense.” Don't forget to check out
https://www.isaca.org/resources/news-and-trends/industry-news/2021/apts-require-enhanced-cyberdefense
for more information!

64 Views • 2 years ago

VIDEO


SETTING UP AN SOC FOR SUCCESS

APTs Require Enhanced Cyberdefense Part VI--Advanced persistent threats (APTs)
are introduced by adversaries that possess sophisticated levels of expertise and
significant resources, which allow them to achieve their objectives by using
multiple attack vectors (e.g., cyberattacks, physical attacks, deception). We
must re-imagine cyberdefense. The threats are global, the impact is local—and
every organization, regardless of industry, should examine strategic options to
mitigate this risk to business. The old mantra “trust, but verify” has given way
to the idea of a zero trust security model, which assumes the adversary is
already inside the organization’s defenses. It is worthwhile to examine some
options to reduce risk from APTs. With every business now a digital business, we
must re-think, we must re-imagine cyber defense.” Don't forget to check out
https://www.isaca.org/resources/news-and-trends/industry-news/2021/apts-require-enhanced-cyberdefense
for more information!

55 Views • 2 years ago

VIDEO


THE TRANSITION FROM “TRUST BUT VERIFY” TO “ZERO-TRUST”

APTs Require Enhanced Cyberdefense Part V—Advanced persistent threats (APTs) are
introduced by adversaries that possess sophisticated levels of expertise and
significant resources, which allow them to achieve their objectives by using
multiple attack vectors (e.g., cyberattacks, physical attacks, deception). We
must re-imagine cyberdefense. The threats are global, the impact is local—and
every organization, regardless of industry, should examine strategic options to
mitigate this risk to business. The old mantra “trust, but verify” has given way
to the idea of a zero trust security model, which assumes the adversary is
already inside the organization’s defenses. It is worthwhile to examine some
options to reduce risk from APTs. With every business now a digital business, we
must re-think, we must re-imagine cyber defense.” Don't forget to check out
https://www.isaca.org/resources/news-and-trends/industry-news/2021/apts-require-enhanced-cyberdefense
for more information!

58 Views • 2 years ago

VIDEO


MITIGATING APT RISK

APTs Require Enhanced Cyberdefense Part IV-- Advanced persistent threats (APTs)
are introduced by adversaries that possess sophisticated levels of expertise and
significant resources, which allow them to achieve their objectives by using
multiple attack vectors (e.g., cyberattacks, physical attacks, deception). We
must re-imagine cyberdefense. The threats are global, the impact is local—and
every organization, regardless of industry, should examine strategic options to
mitigate this risk to business. The old mantra “trust, but verify” has given way
to the idea of a zero trust security model, which assumes the adversary is
already inside the organization’s defenses. It is worthwhile to examine some
options to reduce risk from APTs. With every business now a digital business, we
must re-think, we must re-imagine cyber defense.” Don't forget to check out
https://www.isaca.org/resources/news-and-trends/industry-news/2021/apts-require-enhanced-cyberdefense
for more information!

31 Views • 2 years ago

VIDEO


DEFENSE AGAINST APT ATTACKS

APTs Require Enhanced Cyberdefense Part III—Advanced persistent threats (APTs)
are introduced by adversaries that possess sophisticated levels of expertise and
significant resources, which allow them to achieve their objectives by using
multiple attack vectors (e.g., cyberattacks, physical attacks, deception). We
must re-imagine cyberdefense. The threats are global, the impact is local—and
every organization, regardless of industry, should examine strategic options to
mitigate this risk to business. The old mantra “trust, but verify” has given way
to the idea of a zero trust security model, which assumes the adversary is
already inside the organization’s defenses. It is worthwhile to examine some
options to reduce risk from APTs. With every business now a digital business, we
must re-think, we must re-imagine cyber defense.” Don't forget to check out
https://www.isaca.org/resources/news-and-trends/industry-news/2021/apts-require-enhanced-cyberdefense
for more information!

81 Views • 2 years ago

VIDEO


HOW ORGANIZATIONS SHOULD DEAL WITH APTS

APTs Require Enhanced Cyberdefense Part II — Advanced persistent threats (APTs)
are introduced by adversaries that possess sophisticated levels of expertise and
significant resources, which allow them to achieve their objectives by using
multiple attack vectors (e.g., cyberattacks, physical attacks, deception). We
must re-imagine cyberdefense. The threats are global, the impact is local—and
every organization, regardless of industry, should examine strategic options to
mitigate this risk to business. The old mantra “trust, but verify” has given way
to the idea of a zero trust security model, which assumes the adversary is
already inside the organization’s defenses. It is worthwhile to examine some
options to reduce risk from APTs. With every business now a digital business, we
must re-think, we must re-imagine cyber defense.” Don't forget to check out
https://www.isaca.org/resources/news-and-trends/industry-news/2021/apts-require-enhanced-cyberdefense
for more information!

61 Views • 2 years ago

VIDEO


WHY ORGANIZATIONS SHOULD REIMAGINE THEIR CYBERDEFENSES

APTs Require Enhanced Cyberdefense Part I-- Advanced persistent threats (APTs)
are introduced by adversaries that possess sophisticated levels of expertise and
significant resources, which allow them to achieve their objectives by using
multiple attack vectors (e.g., cyberattacks, physical attacks, deception). We
must re-imagine cyberdefense. The threats are global, the impact is local—and
every organization, regardless of industry, should examine strategic options to
mitigate this risk to business. The old mantra “trust, but verify” has given way
to the idea of a zero trust security model, which assumes the adversary is
already inside the organization’s defenses. It is worthwhile to examine some
options to reduce risk from APTs. With every business now a digital business, we
must re-think, we must re-imagine cyber defense.” Don't forget to check out
https://www.isaca.org/resources/news-and-trends/industry-news/2021/apts-require-enhanced-cyberdefense
for more information!

119 Views • 2 years ago

VIDEO


GAINING DIGITAL TRUST BY ELIMINATING PRIVACY DARK PATTERNS

With the growing emphasis on consent for collecting and processing data, some
enterprises have turned to tricking data subjects into giving their consent by
using privacy dark patterns. Privacy dark patterns can manifest in numerous
ways, from confusing user interface design to manipulative language. In this
episode Jonathan Brandt, ISACA's Director of Professional Practices and
Innovation, is joined by ISACA's Privacy Professional Practices Principal, Safia
Kazi, who defines and provides examples of privacy dark patterns, their
consequences, and how to avoid them. Jon and Safia also discuss how privacy dark
patterns affect digital trust, which can ultimately hurt an enterprise's
reputation and customers. To read the full article, Fostering Trust by
Eliminating Dark Patterns click the link:
https://www.isaca.org/fostering-trust-by-eliminating-dark-patterns. Be sure to
comment, like, and subscribe for more ISACA Productions content!

531 Views • 2 years ago

VIDEO


BUILDING CUSTOMER TRUST THROUGH PRIVACY

When organizations build privacy programs that are reflective of consumers’ best
interests, it builds goodwill and creates added value for the enterprise, says
ISACA privacy expert Matt Stamper. Don't forget to check out
https://www.isaca.org/ for more information!

248 Views • 2 years ago

VIDEO


PROTECTING AND GOVERNING PERSONAL DATA

As more and more employees work from home, organizations will have to evolve
their approaches to data privacy, including adding more credentialed privacy
professionals. Don't forget to check out https://www.isaca.org/ for more
information!

180 Views • 2 years ago

VIDEO


BRINGING TECHNICAL AND LEGAL PRIVACY PROFESSIONALS TOGETHER

Collaborations between technical and legal privacy professionals focused on data
governance and data privacy lead to stronger privacy solutions for
organizations. Don't forget to check out https://www.isaca.org/ for more
information!

289 Views • 2 years ago

VIDEO


IMPLEMENTING THE NEEDED PRIVACY CONTROLS

Privacy credentials such as ISACA’s CDPSE certification can help practitioners
ensure they are putting in place the needed technical privacy safeguards and
controls. Don't forget to check out https://www.isaca.org/ for more information!

255 Views • 2 years ago

VIDEO


A SEAT AT THE TABLE FOR PRIVACY

Privacy is increasingly driving organizational change. Professionals who
proactively seek privacy knowledge and credentials are more likely to have a
seat at the table for these important conversations. Don't forget to check out
https://www.isaca.org/ for more information!

125 Views • 2 years ago

VIDEO


ISACA LIVE: RISK SCENARIOS

Paul Philips and Lisa Young will discuss how risk scenarios help decision-makers
understand how certain events can impact organizational strategy and objectives.
Good risk scenario building is a skill and can take some time to truly master.
Paul and Lisa will provide actionable advice on building the best possible
scenarios to help your organization better manage risk For more information
check out https://www.isaca.org/resources/it-risk

1K Views • 2 years ago

VIDEO


ISACA LIVE: CRITICAL INFRASTRUCTURE SECURITY

ISACA's Chris Dimitriadis and the US GAO's Nick Marinos discuss the current
state of critical infrastructure security, escalating threats and how to better
prepare. For more information check out www.isaca.org/heightened-threats
Subscribe for more ISACA content!

599 Views • 2 years ago

VIDEO


ISACA JOURNAL TURNS 50!

Two long-time ISACA Journal contributors, Michael Cangemi and Steven Ross, will
talk about the evolution of the industry--from what the pressing topics were
back when they started contributing to the Journal to the hot topics of today.
For more information, please check out -
https://www.isaca.org/resources/isaca-journal

180 Views • 2 years ago

VIDEO


ISACA LIVE: THE PRIVACY LANDSCAPE IN 2022

On Data Privacy Day, join ISACA's Safia Kazi and the "Privacy Professor,"
Rebecca Herold, as they discuss data privacy priorities for 2022, including:
Addressing Continuing Challenges from the Privacy Past, including fax and email
breaches Addressing Challenges from the Privacy Present, including IoT risk and
remote work risk Addressing Privacy Challenges Yet to Come, including AI/ML and
cryptocurrency For more information, be sure to check out:
https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2021/three-key-priorities-for-privacy-practitioners-in-2022

178 Views • 2 years ago

VIDEO


INTRODUCING ISACA'S STRATEGIC PLAN

ISACA CEO David Samuelson and ISACA Board Chair Greg Touhill share insights on
ISACA's new strategic plan, including digital trust, global impact, and reaching
early-career professionals.

688 Views • 2 years ago

VIDEO


ISACA LIVE: ULTRA EMERGING TECH PART IX–WHAT IS NEXT WITH EMERGING TECHNOLOGY
AND QA

Join ISACA's Kevin Keh, and guest, Ramses Gallego [ISACA Emerging Tech Committee
Member], in the latest session of our ISACA Live series on Emerging Technology
as they discuss four of the most prominent forms of ultra-emerging technologies
including Quantum Computing, Nanotechnology, Internet of Behavior (IoB) and
XR/VR. For each technology, they’ll dive deep into what the technology is, why
it’s considered emerging and ultimately, why it’s something your organization
should keep an eye on as it continues to evolve. Happy viewing! Don't forget to
check out ISACA’s Certified in Emerging Technology Certification:
https://www.isaca.org/credentialing/cet for more information

246 Views • 2 years ago

VIDEO


ISACA LIVE: ULTRA EMERGING TECH PART VIII–WHY SHOULD XR/VR MATTER TO OUR
VIEWERS?

Join ISACA's Kevin Keh, and guest, Ramses Gallego [ISACA Emerging Tech Committee
Member], in the latest session of our ISACA Live series on Emerging Technology
as they discuss four of the most prominent forms of ultra-emerging technologies
including Quantum Computing, Nanotechnology, Internet of Behavior (IoB) and
XR/VR. For each technology, they’ll dive deep into what the technology is, why
it’s considered emerging and ultimately, why it’s something your organization
should keep an eye on as it continues to evolve. Happy viewing! Don't forget to
check out ISACA’s Certified in Emerging Technology Certification:
https://www.isaca.org/credentialing/cet for more information

173 Views • 2 years ago

VIDEO


ISACA LIVE: ULTRA EMERGING TECH PART VII–WHAT IS XR AND VR?

Join ISACA's Kevin Keh, and guest, Ramses Gallego [ISACA Emerging Tech Committee
Member], in the latest session of our ISACA Live series on Emerging Technology
as they discuss four of the most prominent forms of ultra-emerging technologies
including Quantum Computing, Nanotechnology, Internet of Behavior (IoB) and
XR/VR. For each technology, they’ll dive deep into what the technology is, why
it’s considered emerging and ultimately, why it’s something your organization
should keep an eye on as it continues to evolve. Happy viewing! Don't forget to
check out ISACA’s Certified in Emerging Technology Certification:
https://www.isaca.org/credentialing/cet for more information

109 Views • 2 years ago

VIDEO


ISACA LIVE: ULTRA EMERGING TECH PART VI–WHY SHOULD “INTERNET OF BEHAVIORS”
MATTER TO OUR VIEWERS?

Join ISACA's Kevin Keh, and guest, Ramses Gallego [ISACA Emerging Tech Committee
Member], in the latest session of our ISACA Live series on Emerging Technology
as they discuss four of the most prominent forms of ultra-emerging technologies
including Quantum Computing, Nanotechnology, Internet of Behavior (IoB) and
XR/VR. For each technology, they’ll dive deep into what the technology is, why
it’s considered emerging and ultimately, why it’s something your organization
should keep an eye on as it continues to evolve. Happy viewing! Don't forget to
check out ISACA’s Certified in Emerging Technology Certification:
https://www.isaca.org/credentialing/cet for more information

44 Views • 2 years ago

VIDEO


ISACA LIVE: ULTRA EMERGING TECH PART V–WHAT IS INTERNET OF BEHAVIORS?

Join ISACA's Kevin Keh, and guest, Ramses Gallego [ISACA Emerging Tech Committee
Member], in the latest session of our ISACA Live series on Emerging Technology
as they discuss four of the most prominent forms of ultra-emerging technologies
including Quantum Computing, Nanotechnology, Internet of Behavior (IoB) and
XR/VR. For each technology, they’ll dive deep into what the technology is, why
it’s considered emerging and ultimately, why it’s something your organization
should keep an eye on as it continues to evolve. Happy viewing! Don't forget to
check out ISACA’s Certified in Emerging Technology Certification:
https://www.isaca.org/credentialing/cet for more information

48 Views • 2 years ago

VIDEO


ISACA LIVE: ULTRA EMERGING TECH PART IV–WHY SHOULD NANO-TECHNOLOGY MATTER TO OUR
VIEWERS?

Join ISACA's Kevin Keh, and guest, Ramses Gallego [ISACA Emerging Tech Committee
Member], in the latest session of our ISACA Live series on Emerging Technology
as they discuss four of the most prominent forms of ultra-emerging technologies
including Quantum Computing, Nanotechnology, Internet of Behavior (IoB) and
XR/VR. For each technology, they’ll dive deep into what the technology is, why
it’s considered emerging and ultimately, why it’s something your organization
should keep an eye on as it continues to evolve. Happy viewing! Don't forget to
check out ISACA’s Certified in Emerging Technology Certification:
https://www.isaca.org/credentialing/cet for more information

39 Views • 2 years ago

VIDEO


ISACA LIVE: ULTRA EMERGING TECH PART III–WHAT IS NANO-TECHNOLOGY?

Join ISACA's Kevin Keh, and guest, Ramses Gallego [ISACA Emerging Tech Committee
Member], in the latest session of our ISACA Live series on Emerging Technology
as they discuss four of the most prominent forms of ultra-emerging technologies
including Quantum Computing, Nanotechnology, Internet of Behavior (IoB) and
XR/VR. For each technology, they’ll dive deep into what the technology is, why
it’s considered emerging and ultimately, why it’s something your organization
should keep an eye on as it continues to evolve. Happy viewing! Don't forget to
check out ISACA’s Certified in Emerging Technology Certification:
https://www.isaca.org/credentialing/cet for more information

33 Views • 2 years ago

VIDEO


ISACA LIVE: ULTRA EMERGING TECH PART II–WHY SHOULD QUANTUM COMPUTING MATTER TO
OUR VIEWERS?

Join ISACA's Kevin Keh, and guest, Ramses Gallego [ISACA Emerging Tech Committee
Member], in the latest session of our ISACA Live series on Emerging Technology
as they discuss four of the most prominent forms of ultra-emerging technologies
including Quantum Computing, Nanotechnology, Internet of Behavior (IoB) and
XR/VR. For each technology, they’ll dive deep into what the technology is, why
it’s considered emerging and ultimately, why it’s something your organization
should keep an eye on as it continues to evolve. Happy viewing! Don't forget to
check out ISACA’s Certified in Emerging Technology Certification:
https://www.isaca.org/credentialing/cet for more information

35 Views • 2 years ago

VIDEO


ISACA LIVE: ULTRA EMERGING TECH PART I–WHAT IS QUANTUM COMPUTING?

Join ISACA's Kevin Keh, and guest, Ramses Gallego [ISACA Emerging Tech Committee
Member], in the latest session of our ISACA Live series on Emerging Technology
as they discuss four of the most prominent forms of ultra-emerging technologies
including Quantum Computing, Nanotechnology, Internet of Behavior (IoB) and
XR/VR. For each technology, they’ll dive deep into what the technology is, why
it’s considered emerging and ultimately, why it’s something your organization
should keep an eye on as it continues to evolve. Happy viewing! Don't forget to
check out ISACA’s Certified in Emerging Technology Certification:
https://www.isaca.org/credentialing/cet for more information

59 Views • 2 years ago

VIDEO


ISACA LIVE: ULTRA EMERGING TECH (FULL VERSION)

Join ISACA's Kevin Keh, and guest, Ramses Gallego [ISACA Emerging Tech Committee
Member], in the latest session of our ISACA Live series on Emerging Technology
as they discuss four of the most prominent forms of ultra-emerging technologies
including Quantum Computing, Nanotechnology, Internet of Behavior (IoB) and
XR/VR. For each technology, they’ll dive deep into what the technology is, why
it’s considered emerging and ultimately, why it’s something your organization
should keep an eye on as it continues to evolve. Happy viewing! Don't forget to
check out ISACA’s Certified in Emerging Technology Certification:
https://www.isaca.org/credentialing/cet for more information

346 Views • 2 years ago

VIDEO


ISACA LIVE: EMERGING TECH - CLOUD (SHORT VERSION)

Is cloud still considered an emerging technology in 2021? Will tablets replace
laptops in the remote office workforce and is cloud changing zero trust? ISACA’s
Dustin Brewer asks Julia Hermann (Head of Security Architecture and Cyber
Defense at Giesecke + Devrient) these questions and more in this episode of
ISACA Live! Don't forget to check out
https://www.isaca.org/resources/news-and-trends/isaca-podcast-library for more
information

115 Views • 2 years ago

VIDEO


ISACA LIVE: EMERGING TECH - CLOUD

Why is the cloud still considered an emerging technology in 2021? Why is the
cloud both an enabler and catalyst for all other technologies? How has the cloud
changed our organizational eco-systems? What is the future of cloud services?
Join ISACA’s Chief Futurist, Dustin Brewer as he and Julia Hermann— Head of
Security Architecture and Cyber Defense at Giesecke + Devrient answer these
questions and more regarding our oldest emerging technology, the cloud! Don't
forget to check out
https://www.isaca.org/resources/news-and-trends/isaca-podcast-library for more
information!

228 Views • 2 years ago

VIDEO


ISACA LIVE: STATE OF CYBERSECURITY PT. 2

In honor of Cybersecurity month, ISACA’s Director of Communications, Kristen
Kessinger, and Information Security Practices Lead, Jon Brandt, discuss the
findings of this year’s ISACA State of Cybersecurity research study and what
they may mean for you as both members and leaders of your IT organization. Don't
forget to check out
https://www.isaca.org/resources/infographics/state-of-cybersecurity-2021-part-2
for more information

155 Views • 2 years ago

VIDEO


ISACA LIVE: GLOBAL STRATEGY

Join ISACA’s CEO David Samuelson as he discusses ISACA’s Global Strategy with
ISACA’s Chief Global Strategy officer Chris Dimitriadis. Chris shares his career
path to ISACA, industry trends, advice to the next generation and how ISACA will
continue to innovate in the future! Don't forget to check out
https://www.isaca.org/ for more information!

224 Views • 2 years ago

VIDEO


ISACA LIVE EMERGING TECH SESSION - AI

In our second LinkedIn Live stream on Emerging Tech, Dustin Brewer, Senior
Director of Emerging Technology and Innovation at ISACA, and guest, Frank Downs,
Senior Director of Proactive Series at BlueVoyant, discuss the ins and outs of
Artificial Intelligence including why it’s considered emerging technology, how
it’s used in cybersecurity and IT audit, the many different forms of AI
cyberattacks, and more. Check out the highlights here! Don't forget to check out
https://www.isaca.org/credentialing/cet/artificial-intelligence-fundamentals-certificate
for more information!

285 Views • 2 years ago

VIDEO


ISACA’S DIGITAL TRANSFORMATION PART III — THE DIGITAL MEMBER EXPERIENCE

David Samuelson and ISACA’s Chief Membership Officer, Julia Kanouse discuss the
positive impact of technology on our members and the ways in which our global
community has grown even closer despite the pandemic. Watch as Julia shares some
takeaways from the past year, including how the success of ISACA’s virtual
conferences led to the decision to make future events hybrid, showing ISACA’s
commitment to being digital first and allowing the opportunity for more people
to attend who may have not been able to before. David and Julia also talk about
how building digital trust between ISACA and our members will play a role in
areas such as future improvements to our website and its user experience. Don't
forget to check out https://www.isaca.org/ for more information!

238 Views • 2 years ago

VIDEO


ISACA LIVE WITH DUSTIN BREWER AND KRISTEN KESSINGER

Watch ISACA's Dustin Brewer tell you what you need to know about IoT now--why is
it still considered an emerging tech? What are the biggest cybersecurity
threats, and what opportunities will the Internet of Things bring in the next
five years? Watch to find out. Don't forget to check out
https://www.isaca.org/resources/news-and-trends/isaca-podcast-library for more
information!

158 Views • 2 years ago

VIDEO


ISACA’S DIGITAL TRANSFORMATION PART II — PEOPLE, PROCESS, AND TECHNOLOGY

David Samuelson is back and continuing his discussion of ISACA’s Digital
transformation. This time David interviews members of ISACA’s IT team — CTO,
Simona Rollinson; Sr. Director, Application Development, Sean Ways; and Sr.
Director of Enterprise Project Management, Amy Witkowski. Listen in as they
discuss ISACA’s new, customer-centric CMS and how we have and will rely on
technology through the pandemic and beyond. The team also explains how ISACA has
recruited the right talent to staff up for the programs of the future through
the power of “people, process, and technology”. Don't forget to check out
https://www.isaca.org/ for more information!

239 Views • 2 years ago

VIDEO


ISACA’S DIGITAL TRANSFORMATION PART I —POSITIVE POTENTIAL OF TECHNOLOGY

Join ISACA’s CEO David Samuelson as he discusses the positive potential of
technology with ISACA’s Chief Product Officer, Nader Qaimari. Listen in as Nader
explains how ISACA’s newest certifications (Emerging Technology and Information
Technology) were built with performance based testing and gamification to help
beginners and young professionals get started in the IT field. Providing this
new learning will help hiring managers who are struggling to find the right
candidates due to these missing skills gaps. David and Nader also discuss
ISACA’s new unified learning platforms that are scalable and supports the needs
of our global members. Don't forget to check out https://www.isaca.org/ for more
information!

345 Views • 2 years ago

VIDEO


INDUSTRY SPOTLIGHT: MARK THOMAS

In 2019, Mark Thomas was on the road 40 weeks in 18 US states and 13 countries.
In 2020, he pivoted to a workstyle of 1 location, 1 state and 1 country. He
tells ISACA's Jessica Barnett that he was actually prepared for a pandemic-type
of event that stopped travel in his business plan. Mark and Jessica dive deep
into his career journey and their shared history of developing ISACA training
content. He also was the CIO of a telecommunications startup that was all remote
pre-pandemic. Mark is an accredited ISACA trainer and shares his advice on what
credential you should get and how to grow your career. Tune in now to hear
Mark's exciting story! Visit markthomasonline.com for more information on Mark.
Visit isaca.org/podcasts for my ISACA podcasts. Be sure to like, comment, and
subscribe for more ISACA Productions content!

410 Views • 2 years ago

VIDEO


US DOD’S CMMC GUIDELINES — WHAT YOU NEED TO KNOW

Cybersecurity Maturity Model Certification or CMMC is a new security program
being released by the US DoD. If you are a DoD contractor, your livelihood could
be at stake as contract requirements and contractors will need to be certified
or a contract won’t be awarded. Listen in as TelaTek's Director of Operations,
Johann Dettweiler breaks down these new requirements published in his latest
journal article with ISACA's CMMI Professional Practice Lead, Kileen Harrison.
Johann discusses the importance of all organizations —big or small—going through
the different levels of security in the CMMC guidelines, starting at Level 1 and
working their way up. What is the most important thing an organization needs to
get started? The ability to read, familiarize and understand the different
levels of CMMC otherwise, they won’t know how to implement it in their
organization and will have to hire a third party. These CMMC requirements are
here to stay and will only continue to get more stringent the more hacks and
attacks keep increasing. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-4/what-government-contractors-should-know-about-the-us-dods-cmmc-guidelines
for more information!

124 Views • 2 years ago

VIDEO


SECURITY AS A SERVICE

What is security as a service and when is it needed? Tune in as ISACA’s Cyber
Pros explain how the increase in hacks and attacks are forcing companies to take
cyber security more seriously. The bad news is, there is a lack of cyber
security professionals in the field and those who do have the necessary skillset
to manage a company’s security are becoming more and more costly. Academia is
trying to help get the security workforce up to speed quickly, but they are
failing. Until we see an influx of new and skilled cyber security professionals,
security as a service is an option that can save your company both time and
money and help assure that your company’s data and information is safe and
secure. For more information, check out ISACA’s State of Cybersecurity 2021:
https://www.isaca.org/go/state-of-cybersecurity-2021

85 Views • 2 years ago

VIDEO


IT AUDIT IN PRACTICE: SURVIVAL WHEN YOU ARE SMALL-BUSINESS CONTINUITY AND
RESILIENCE

Everyone needs a resilient operating model, and the pandemic has been the
reality check showing how necessary it is to have a plan. Was your
small-business or corporation prepared for the shift to remote work in early
2020? If not, you probably realized that business continuity is more than having
the right systems and applications in place. The most important factor is
people! Although both large and small enterprises have accommodated and adapted,
the smaller organizations with fewer resources and time have faced equal or
greater hurdles when it comes to this type of planning. Join ISACA’s IT
Professional Practices Lead, Kevin Keh, as he interviews Cindy Baxter, Director,
What’s the Risk, LLC and discusses the importance of having a business
continuity and resilience plan for your business. Cindy discusses consistently
updating your crisis team and notification systems, the importance of allowing
an auditor to fully understand your business, accepting critical feedback
throughout the entire audit process vs. waiting for the final report and more!
Cindy also mentions how small business owners and employees shouldn’t get
defensive or take the findings personally. Remember, the value comes not in the
result, but in the adoption of the results and recommendations. For more
information on this topic, download ISACA’s IT Business Continuity/Disaster
Recover Audit Program here: shorturl.at/uLZ16

117 Views • 2 years ago

VIDEO


PRIVACY-PRESERVING ANALYTICS AND SECURE MULTIPARTY COMPUTATION

Organizations are increasingly concerned about data security in several
scenarios, including collecting and retaining sensitive personal information;
processing personal information in external cloud environments, and information
sharing. Commonly implemented solutions do not provide strong protection from
data theft and privacy disclosures. Privacy and risk management professionals
are particularly concerned about the privacy and security of data analytics that
are shared externally. Compliance of privacy regulations such as the US State of
California Consumer Privacy Act (CCPA), the EU General Data Protection
Regulation (GDPR) and other emerging regulations around the world require
techniques for secure processing of sensitive data. Listen in as ISACA’s Safia
Kazi interviews Chief Security Strategist and data protection expert, Ulf
Mattsson on the latest on privacy-preserving techniques. Don't forget to check
out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-2/privacy-preserving-analytics-and-secure-multiparty-computation
for more information!

175 Views • 2 years ago

VIDEO


WHY SHOULD I LISTEN TO YOU?

Why should you listen to ISACA’s CyberPros? Find out as Dustin Brewer and Frank
Downs explain how they got started in the cybersecurity field and grew their
knowledge and experience to become the cyber professionals they are today.
Dustin and Frank discuss their traditional and non-traditional paths to
learning, their experience working in the US government and the importance of
earning a certification and continuing your education. Want to know how to get
started in Cybersecurity? Start here by listening to this podcast. Don't forget
to check out
https://www.isaca.org/resources/news-and-trends/isaca-podcast-library for more
information!

73 Views • 2 years ago

VIDEO


ISACA LIVE WITH DUSTIN BREWER AND KRISTEN KESSINGER (SHORT VERSION)

Watch ISACA's Dustin Brewer tell you what you need to know about IoT now--why is
it still considered an emerging tech?

2 years ago

VIDEO


CYBERSECURITY ISN’T REAL, RIGHT? WRONG!

Every day, the risk of cyber and ransomware attacks regularly increases in
frequency and danger. But despite the proof in numbers, many organizations still
don’t recognize the need to fortify their fortress and improve the strength of
their Cybersecurity practices. This is because the leadership of many
organizations don’t understand cybersecurity or even want to understand it. That
is —until it is too late. In this episode, ISACA’s Cyber Pros, Dustin Brewer and
Frank Downs explain the importance of cybersecurity and provide real world
examples of why it pays to be proactive, not reactive when it comes to your
company’s security. In the end, it will not only save your company a ton of time
and money, but may even save your company! Interested in learning more on this
topic Check out ISACA’s State of Cybersecurity 2021 report at
https://www.isaca.org/go/state-of-cybersecurity-2021 .

182 Views • 2 years ago

VIDEO


JUST THE FAX ON CYBERSECURITY

Is your home printer or fax machine an IOT device? You bet it is! Dubbed
‘Faxploit’, research has shown how cyber criminals can infiltrate any home or
corporate network by exploiting wireless printers and fax machines. A fax
numbers is all it takes to launch this type of attack. Listen in as Cyber Pros,
Dustin Brewer and Frank Downs discuss the need for these home devices, how—they
too—are at risk of being hacked and their best suggestions on how to mitigate
this vulnerability. So fill your paper tray, test your fax connection and press
play…it’s time for a Cyber Pros breakdown! Don't forget to check out
https://www.isaca.org/resources/news-and-trends/isaca-podcast-library for more
information!

127 Views • 3 years ago

VIDEO


ADVANCED SECURITY FOR SECRET INFORMATION

Listen in as ISACA Journal columnist, Steven Ross, CISA, CDPSE, AFBCI, CISSP,
MBCP, delves deeper into his latest article, “Advanced Security for Secret
Information.” As a follow up to his two previously published journals, “Keeping
Secrets,” and “Secrets and Privacy,” Ross continues to make the case that the
protection of secret information is becoming a significant issue in
cybersecurity. All companies —no matter how small— need some form of a security
program to protect their secret information. However, the security that is
currently in place to protect those secrets are oftentimes insufficient. Steven
discusses the use of encryption and extended monitoring to keep the “bad guys”
at bay from stealing your important information. Don't forget to check out
https://www.isaca.org/resources/isaca-journal/issues/2021/volume-3/advanced-security-for-secret-information
for more information!

210 Views • 3 years ago

ISACAVision

VIDEO


WE ARE ISACA, EPISODE 04

The fourth episode of We Are ISACA brings us our first virtual participants.
Gustavo Galegale joined from São Paulo, Brazil and shared quite the story about
his son’s birth, while Glory Idehen connected from Abuja, Nigeria and shared how
the Abuja Chapter has built impressive local participation for ISACA’s annual
CommunITy Day. Watch and listen to their discussion with host Megan Moritz.

255 Views • 1 year ago

VIDEO


WE ARE ISACA EPISODE 3

The third episode of We Are ISACA was recorded in Rome, Italy. Host Megan Moritz
talked with polyglot Mounir Messaoud from Sweden, and coffee connoisseur
Vladlena Benson from the UK.

466 Views • 1 year ago

VIDEO


WE ARE ISACA, EPISODE 02

In this, the second episode of We Are ISACA, host Megan Moritz visits with
BodyJam enthusiast Natalie Perez from Melbourne and school owner Alok Kakker
from Washington, DC. 00:00:14 Intro 00:01:38 Natalie 00:14:01 Alok 00:26:54
Dance 00:30:12 Close

524 Views • 1 year ago

VIDEO


WE ARE ISACA, EPISODE 01

Hooray! You found the first episode of We Are ISACA! Join host Megan Moritz as
she spends time getting to know "the person behind the member." This episode
features former Marine Joe Mendez and marathoner Allyson Zoller. 00:00 Show Open
00:00:14 We Are ISACA Introduction 00:02:37 Joe Mendez 00:21:38 Allyson Zoller

871 Views • 1 year ago

COBIT

VIDEO


RIGHT-SIZE YOUR GOVERNANCE OF ENTERPRISE INFORMATION & TECHNOLOGY

If you are new to COBIT, there has never been a better time to reevaluate your
enterprise governance program. Effective governance over information and
technology is critical to business success, and this new release of COBIT® 2019
further cements COBIT’s continuing role as an important driver of innovation and
business transformation. Learn more http://bit.ly/2HKhIF7

7K Views • 2 years ago

VIDEO


CURRENT COBIT USERS GAIN EVEN MORE FROM COBIT® 2019

For current users of COBIT 5, the news couldn’t be better. COBIT 2019 is an
evolution of COBIT 5, so this newly revised governance framework contains
everything you value about COBIT 5, plus many exciting new features and focus
areas. Learn more http://bit.ly/2HKiq5o

5K Views • 2 years ago

VIDEO


INTRODUCING COBIT® 2019

The world-renowned COBIT framework has been updated—Introducing COBIT 2019. Four
core publications provide the foundation for creating a customized governance
program for information and technology, right-sized to the needs of your
enterprise. Good governance is a vital element of strategy formulation and
business transformation success, and COBIT 2019 can help chart that path
forward. Learn more http://bit.ly/2HI8Y2l

32K Views • 2 years ago

VIDEO


WHAT’S NEW IN COBIT® 2019: DESIGN GUIDE

Besides updating information in the Core COBIT model and incorporating refreshed
standards, the new COBIT 2019 is more flexible in implementation and offers more
design guidance. This new Design Guide publication fills an important need for
COBIT users—how to put COBIT to practical use, offering prescriptive how-to
information. Learn more http://bit.ly/2HI8Y2l

12K Views • 2 years ago

VIDEO


A HISTORY OF COBIT

Learn how ISACA’s Control Objectives evolved into COBIT, a globally respected
framework for the governance and management of enterprise information and
technology, and how COBIT 2019 builds upon this rich history. Find out how you
can be part of the ISACA50 celebration! http://bit.ly/2ETEU3p

1K Views • 2 years ago

VIDEO


INTRODUCING COBIT 2019—A SNEAK PEEK

The globally recognized COBIT framework, leader in ensuring effective and
strategic enterprise governance of information and technology (EGIT), has been
updated with new information and guidance—facilitating easier, tailored
implementation. COBIT 2019 debuts on 12 November 2019—but here’s a Sneak Peek of
this new release. Go to http://www.isaca.org/COBIT

9K Views • 5 years ago

Conferences and Events

VIDEO


ISACA 2024 NORTH AMERICA CONFERENCE TEASER

Don’t miss out on your chance to earn up to 26 CPE’s. Join us in Phoenix or
online! To register today at
https://www.isaca.org/training-and-events/conferences/isaca-2024-north-america-conference

26 Views • 5 months ago

VIDEO


ISACA’S DIGITAL TRUST WORLD DUBLIN 2023: SEE WHAT YOU MISSED AND JOIN US NEXT
YEAR!

ISACA’s Digital Trust World Dublin 2023: See What You Missed and Join Us Next
Year!

18 Views • last year

VIDEO


DON’T MISS DIGITAL TRUST WORLD BOSTON

Join us 9-11 May, 2023 in Boston, MA for Digital Trust World. Register Now:
https://www.isaca.org/digital-trust-world

95K Views • 1 year ago

VIDEO


NORTH AMERICA CONFERENCE 2022 - WRAP UP

For more information, check out
https://www.isaca.org/en/training-and-events/conferences

862 Views • 2 years ago

VIDEO


NORTH AMERICA CONFERENCE 2022 - WRAP UP

For more information, check out
https://www.isaca.org/en/training-and-events/conferences

894 Views • 2 years ago

VIDEO


ISACA CONFERENCE OCEANIA 2021 - THREAT LANDSCAPE PANEL DISCUSSION

Don't forget to check out https://www.isaca.org/training-and-events/conferences
for more information

523 Views • 2 years ago

VIDEO


ISACA AWARDS GALA 2021: CONGRATULATIONS AND INVITATION FROM DAVID SAMUELSON

ISACA CEO David Samuelson sends our 2021 ISACA Award recipients his personal
congratulations on their recognition and encourages everyone to celebrate their
achievements at the 2021 ISACA Awards Virtual Gala. Don't forget to check out
https://www.isaca.org/ for more information!

238 Views • 2 years ago

VIDEO


ISACA 2021 HALL OF FAME

Congratulations to the 2021 ISACA Hall of Fame Inductees! Don't forget to check
out https://www.isaca.org/ for more information!

120 Views • 2 years ago

VIDEO


ISACA GLOBAL ACHIEVEMENT AWARDS

Congratulations 2021 ISACA Global Achievement Award Recipients! Don't forget to
check out https://www.isaca.org/ for more information!

90 Views • 2 years ago

VIDEO


2021 ISACA CHAPTER AWARDS

Congratulations 2021 ISACA Chapter Award Recipients! Don't forget to check out
https://www.isaca.org/ for more information!

118 Views • 2 years ago

VIDEO


2021 ISACA CERTIFICATION EXAM TOP SCORERS

Congratulations to the 2021 ISACA Certification Exam Top Scorers! Don't forget
to check out https://www.isaca.org/ for more information!

223 Views • 2 years ago

VIDEO


BEHIND THE SCENES @ ISACA CONFERENCE NORTH AMERICA

Watch this exclusive behind the scenes footage of the ISACA team working hard
and playing hard while bringing the ISACA Conference North America to life!
Don't forget to check out https://www.isaca.org/ for more information!

218 Views • 2 years ago

VIDEO


2020 ISACA AWARDS PRESENTATION

Watch the presentation of the 2020 ISACA Global Achievement and Certification
Exam Top Score Awards and celebrate the achievements of ISACA members around the
world.

1K Views • 2 years ago

VIDEO


2020 ISACA BEST CHAPTER AWARDS

Congratulations to the 2020 recipients of the K. Wayne Snipes Best Chapter
Award: Chicago Chapter (Very Large Chapter), Middle Tennessee Chapter (Large
Chapter), Tallahassee Chapter (Medium Chapter), and Coimbatore Chapter (Small
Chapter). Learn more at www.isaca.org/awards.

367 Views • 2 years ago

VIDEO


2020 ISACA CHAIR'S AWARD

ISACA’s 2019-2020 Board Chair Brennan P. Baybeck dedicates the 2020 Chair’s
Award to ISACA’s passionate members, chapters, chapter leaders, and volunteers.
Learn more at www.isaca.org/awards.

414 Views • 2 years ago

VIDEO


2020 ISACA INNOVATIVE CHAPTER PROGRAM AWARDS

Congratulations to the 2020 recipients of the Innovative Chapter Program Award:
China Hong Kong Chapter (Very Large Chapter), Vancouver Chapter (Large Chapter),
and Amman Chapter (Medium Chapter). Learn more at www.isaca.org/awards.

297 Views • 2 years ago

VIDEO


2020 ISACA OUTSTANDING CHAPTER LEADER AWARD

Congratulations to the 2020 recipients of the Outstanding Chapter Leader Award:
Cai Walters (Small Chapter), Peter Morin (Medium Chapter), and Daniela Susanna
Gschwend (Very Large Chapter). Learn more at www.isaca.org/awards.

344 Views • 2 years ago

VIDEO


2020 ISACA CHAPTER AWARDS PRESENTATION AT VIRTUAL GLS

Congratulations to the 2020 recipients of ISACA’s Chapter Awards! Learn more
about their accomplishments and watch the acceptance speeches in this recorded
awards presentation from the 2020 Global Leadership Summit. Outstanding Chapter
Leader Award: Cai Walters (Small Chapter), Peter Morin (Medium Chapter), and
Daniela Susanna Gschwend (Very Large Chapter) Innovative Chapter Program Award:
China Hong Kong Chapter (Very Large Chapter), Vancouver Chapter (Large Chapter),
and Amman Chapter (Medium Chapter) K. Wayne Snipes Best Chapter Award: Chicago
Chapter (Very Large Chapter), Middle Tennessee Chapter (Large Chapter),
Tallahassee Chapter (Medium Chapter), and Coimbatore Chapter (Small Chapter)
ISACA Chair’s Award: ISACA’s members, chapters, chapter leaders, and volunteers
Learn more at www.isaca.org/awards.

380 Views • 2 years ago

VIDEO


MD&M PANEL

Preview of the MDDAP program panel with the FDA, Medical Device Innovation
Consortium, ISACA, and the Medical Device Industry. More information can be
found at: isaca.org/mddap.

240 Views • 2 years ago

VIDEO


ISACA 2022 NORTH AMERICA CONFERENCE

2 years ago

VIDEO


CSX 2018 EUROPE

Register today at http://bit.ly/2xdJu6n Make plans today to join the thought
(and action) leaders in cybersecurity on 29-31 October 2018 in London, U.K. This
is a great opportunity to amplify your knowledge and earn up to 32 CPE credits!
Brought to you by ISACA’s globally respected Cybersecurity Nexus™ (CSX), which
is dedicated to helping professionals like you build timely knowledge and
effective cyber skills. --More than 50+ sessions to customize for your goals
--More in-depth options for advanced learning --Enhanced networking
opportunities Register today at http://bit.ly/2xdJu6n

895 Views • 5 years ago

VIDEO


CSX-P LAB BONANZA WORKSHOP AT CSX 2018 NORTH AMERICA

Register for CSX 2018 North America here: http://bit.ly/2wJ7Q7q The CSX
Practitioner Lab Bonanza workshop at CSX 2018 North America in Las Vegas,
Nevada, 15-17 October, offers attendees the opportunity to experience all of the
labs presented in the one week Bootcamp in two intensive, action-packed days!
ISACA staff instructors and program developers will guide you through these
technically advanced, hands-on labs where you will be dissecting typical problem
spots, and learning through detailed insight to ensure your comprehension and
application upon return to the office so you are better equipped to overcome
threats and create competitive advantages for your career and your organization.
Learn more and register today: http://bit.ly/2M56wRX

48 Views • 5 years ago

Archive

VIDEO


WHAT CAN ISACA CERTIFICATIONS DO FOR YOU? HEAR FROM CERTIFICATION HOLDERS

ISACA certification holders share how ISACA certifications gave them credibility
and recognition in their careers. http://bit.ly/2P3Xz2i Bruno, CISA, CRISC,
CGEIT shares what motivated him to get certified. Hear how, no matter how his
career focus changed, he was able to benefit from ISACA certifications, prove
his commitment to high standards of professionalism and be successful across
multiple aspects such as IS/IT audit, security, risk and governance. Learn more
about ISACA certifications: http://bit.ly/2P3Xz2i

5K Views • 1 year ago

VIDEO


ISACA - IT RESEARCH

ISACA offers research documents related to it governance, security, risk and
assurance.

610 Views • 1 year ago

VIDEO


ISACA – CYBER MATURITY: IMPROVE YOUR PANDEMIC PREPAREDNESS BY FRANK DOWNS

816 Views • 2 years ago

VIDEO


ISACA COMMUNITY DAY 2020 - JOIN US!

854 Views • 2 years ago

VIDEO


2019 ISACA ANNUAL REPORT VIDEO

Find out how ISACA celebrated its 50th anniversary year by preparing for even
greater impact in the next 50 years.

1K Views • 2 years ago

VIDEO


EUROCACS/CSX 2019 HIGHLIGHTS

Check out the conference highlights from EuroCACS 2019 in Geneva, Switzerland.
EuroCACS 2020 will take place on 28-30 October 2020 in Helsinki, Finland.

462 Views • 2 years ago

VIDEO


INFOSECURITY ISACA NORTH AMERICA EXPO AND CONFERENCE

Expand your network, deepen your knowledge, and sharpen your skills at
Infosecurity ISACA North America Expo and Conference. Learn more
http://bit.ly/2ng0TKe Earn up to 37 CPEs, experience customized learning, and
engage with industry peers 20-21 November 2019 at the Javits Convention Center
in New York, New York. Register Today http://bit.ly/2ng0TKe

794 Views • 2 years ago

VIDEO


ISACA CISM CERTIFICATION HOLDERS GIVE ADVICE TO PROFESSIONALS CONSIDERING
CERTIFICATION

Certified Information Security Manager (CISM) certification holders give advice
to those considering becoming CISM certified. http://bit.ly/2jQA9fH The uniquely
management-focused CISM certification affirms that the holders understand
business information systems, know how to manage, and methods to adapt
technology to their enterprise and industry. Since its inception in 2002, more
than 30,000 of professionals worldwide have earned the industry-leading CISM
designation, to affirm both their high level of technical competence and
qualifications for top-caliber leadership in information security management
roles. Learn more about the CISM certification: http://bit.ly/2jQA9fH

11K Views • 2 years ago

VIDEO


SEE YOU IN BALTIMORE FOR NORTH AMERICA CACS 2020

The North America CACS Conference is the premier conference for Audit/Assurance,
COBIT®, Compliance, Risk, Security, and Strategy/Governance professionals.
Baltimore’s diverse city landscape makes it the perfect setting for
professionals from all different career walks of life to get together in one
place for a variety of focused sessions. Explore Baltimore’s Inner Harbor where
you can find plenty of dining and entertainment including the National Aquarium,
site-seeing boat cruises and delicious seafood, or explore the vibrant
restaurants and bars located just beyond the right field wall of Oriole Park at
Camden Yards on Eutaw Street! The “city of neighborhoods” has a little something
for everybody. Register Today: http://bit.ly/2FLz42L

613 Views • 2 years ago

VIDEO


JOIN US FOR ISACA COMMUNITY DAY!

ISACA CEO David Samuelson invites all ISACA members and chapters to give back to
their local communities on ISACA CommunITy Day. Be part of this global day of
service where we all have a positive impact on the world. Hosted on 5 October
2019, the inaugural event will kick off in ISACA’s 50th year and become an
annual tradition on the first Saturday in October. Follow our global activities
using #ISACACommunITyDay. https://engage.isaca.org/communityday/

927 Views • 2 years ago

VIDEO


SIMON T. BAILEY – OPENING KEYNOTE AT 2019 GRC

Be inspired to Shift Your Brilliance with 2019 GRC Conference Keynote, Simon T.
Bailey. Named by SUCCESS magazine as one of the top 25 people who will help you
reach your business and life goals, Simon T. Bailey has used his talks to
inspire change and success across thousands of organizations in dozens of
countries. Bailey will address the failure of yesterday’s methods to keep pace
with today’s rapid technological change, and inspire and empower attendees to
new ways of thinking will create tomorrow’s solutions. Register now for 2019 GRC
Conference, brought to you by ISACA and The IIA. http://bit.ly/329eQJR

646 Views • 2 years ago

VIDEO


NORTH AMERICA CACS 2019 HIGHLIGHTS

Register for NACACS 2020 here: http://bit.ly/2FLz42L The North America CACS 2019
conference in Anaheim, CA just ended. Check out the conference highlights and
register for North America CACS 2020, 12-14 May in Baltimore, Maryland here:
http://bit.ly/2FLz42L

1K Views • 2 years ago

VIDEO


ISACA 2018 ANNUAL REPORT: NAVIGATING CHANGE

ISACA spent 2018 equipping its global professional community to deal with the
many changes impacting the enterprise technology landscape. To find out more,
visit www.isaca.org/annualreport.

434 Views • 2 years ago

VIDEO


AFRICA CACS 2019 | SEE YOU IN JOHANNESBURG

Leaders in IS/IT Audit, Security, and Compliance gather at one exceptional event
each year. Join them on 19-20 August 2019 in Johannesburg, South Africa. Gain
fresh ideas and approaches while earning CPE hours at a variety of workshops and
breakout sessions. You will be gaining new knowledge and perspectives alongside
the industry’s brightest and most highly respected minds at this ISACA®
industry-leading conference. Registration will be open soon! Visit our website
for updates. http://bit.ly/2GjulIc

2K Views • 2 years ago

VIDEO


CSX 2018 NORTH AMERICA - CONFERENCE HIGHLIGHTS

Enjoy the best of what CSX 2018 North America had to offer in this highlight
video. The attendees, each engaging keynote, session speaker, and Las Vegas made
this incredible cyber event a resounding success! Register for next year’s
inaugural Infosecurity ISACA North America Expo and Conference at the Javits
Center, 20-21 November 2019: http://bit.ly/2FmvLkG CSX 2018 North America Photo
Album: http://bit.ly/2FouppC CSX 2018 North America Brochure:
http://bit.ly/2FkgKjC Cybersecurity Nexus: http://bit.ly/2Fkg2ms

843 Views • 2 years ago

VIDEO


CISAS TALK ABOUT CISA

Certified Information Systems Auditor (CISA) certification holders talk in their
own words about the ways ISACA’s globally recognized IT credential has helped
their careers. Learn more http://bit.ly/2vHa5aV

10K Views • 2 years ago

VIDEO


EUROCACS 2018 HIGHLIGHTS

Check out the conference highlights from EuroCACS 2018 in Edinburgh, Scotland.
EuroCACS 2019 will take place on 16-18 October 2019 in Geneva, Switzerland.
Check-in for updates here: http://bit.ly/2I55ROB See the EuroCACS 2018 photo
album here: http://bit.ly/2sQjcpa

1K Views • 2 years ago

VIDEO


ISACA ANNUAL REPORT 2017 OVERVIEW

ISACA advanced its Purpose and Promise throughout 2017 by moving forward
numerous impactful programs and initiatives. See the full 2017 ISACA Annual
Report here: http://bit.ly/2FpWl7c

832 Views • 2 years ago

VIDEO


2017 ANNUAL REPORT: VOLUNTEERS

ISACA board director Leonard Ong notes how volunteering with ISACA provides a
variety of professional and social rewards. See the full 2017 ISACA Annual
Report here: http://bit.ly/2FpWl7c

144 Views • 2 years ago

VIDEO


NORTH AMERICA CACS 2018 HIGHLIGHTS

Register for NACACS 2019 here: http://bit.ly/2ruNaO0 The North America CACS 2018
conference in Chicago just ended. Check out the conference highlights and
register for North America CACS 2019, 13-15 May in Anaheim, CA here:
http://bit.ly/2ruNaO0 See NACACS 2018 photo album here: http://bit.ly/2rx4UIv

1K Views • 2 years ago

VIDEO


ISACA AWARDS PROGRAM

ISACA Awards: http://bit.ly/2rtrpy1 Learn why ISACA values the opportunity to
recognize outstanding thought leadership, volunteer service and professional
achievements. We rely upon our members to submit nominations and volunteer to
help select the incredible accomplishments we present with ISACA Global
Achievement Awards and Chapter Awards. ISACA also recognizes the Certification
Exam Top Scores for their exemplary abilities. Visit http://bit.ly/2rtrpy1 to
learn more. Volunteer Opportunities: http://bit.ly/2rsFgVn ISACA Awards:
http://bit.ly/2rtrpy1

1K Views • 2 years ago

VIDEO


CISA VIRTUAL INSTRUCTOR-LED TRAINING COURSE - MAY 2018

Offering you intensive, cram-style online preparation for your CISA® exam,
ISACA's 12-hour VILT prep course is spread across four 3-hour sessions with
direct interaction with an expert instructor. To register for the CISA Virtual
Instructor-Led Training course on 21-24 May, click here: http://bit.ly/2qCpWWs
Course Description Join fellow CISA exam candidates along with a CISA-certified
trainer for a unique exam prep experience. The CISA Exam Prep Course is an
intensive, cram-style course that will cover some of the more challenging topics
from the CISA job practice. Drill through sample exam items, ask your most
pressing questions and get the answers to build your confidence as you prepare
for exam day. Learning Objectives At the end of this course, you will: • Learn
the specific requirements for passing the CISA Exam and attaining your
certification • Review key concepts, tasks and knowledge related to the duties
of an IS auditor, which serve as the foundation of the CISA Exam • Learn
successful methods of evaluating exam questions and answers, including analysis
and explanations • Review useful, proven information on study and exam time
management Who Should Attend? • CISA Exam Candidates • Audit professionals with
3-5 years of experience

681 Views • 2 years ago

VIDEO


EUROCACS 2018 | COBIT 5 FOUNDATION WORKSHOP

Learn about the COBIT 5 Foundation workshop here: http://bit.ly/2pSrudX Bruno
Horta Soares talks about his COBIT 5 Foundation workshop at EuroCACS 2018 in
Edinburgh, Scotland. Learn the importance of an effective framework to enable
business value. Delve into the elements of ISACA’s evolutionary framework to
understand how COBIT 5 covers the business end-to-end and helps you effectively
govern and manage enterprise IT. Developed for anyone interested in obtaining
foundation-level knowledge of COBIT, the course explains the COBIT framework and
supporting materials in a logical and example-driven approach. Earn the COBIT 5
Foundation Certificate! Attendees can take the Foundation Exam Monday, 28 May
2018 for an additional US $150! The exam will take place on Monday morning,
before the opening keynote presentation. A study session will also be held on
Sunday evening prior to the exam to prepare you as much as possible. In 2017,
100% of those who attended the COBIT 5 Foundation workshop and took the exam at
the conference passed! Space is limited for the exam, so be sure to add it to
your registration today to secure your spot! Learn about the COBIT 5 Foundation
workshop here: http://bit.ly/2pSrudX Register for EuroCACS 2018 today:
http://bit.ly/2pWTygr See the full program: http://bit.ly/2pRYaEd Learn more
about our workshops: http://bit.ly/2pSrudX Check out our networking events:
http://bit.ly/2pSr9YJ Explore Edinburgh with our interactive map:
http://bit.ly/2pTNntf

276 Views • 2 years ago

VIDEO


WHY YOU SHOULD ATTEND NORTH AMERICA CACS 2018

Register for North America CACS 2018: http://bit.ly/2q1Uelg Grow your expertise,
skills and value to enterprises worldwide at North America CACS 2018. Join us on
30 April-2 May in Chicago, Illinois, and be a part of the top conference for IS
audit and security professionals! Choose from dynamic, timely topics that help
you address challenges and learn innovative solutions. There will be more than
100 sessions to customize for your goals and various in-depth options for
advanced learning. Enjoy direct access to industry leaders, expert speakers and
valuable resources. North America CACS will also provide enhanced networking
opportunities for attendees. Hear what last year's attendees have to say about
their North America CACS experience and register for the 2018 conference right
here: http://bit.ly/2q1Uelg See the full program: http://bit.ly/2q0mRzk Learn
more about our workshops: http://bit.ly/2q2cGdE Check out our networking events:
http://bit.ly/2q1R1SR Explore Chicago with our interactive map:
http://bit.ly/2q1ToF8

409 Views • 2 years ago

VIDEO


GREG SCHWEM - NORTH AMERICA CACS 2018 EMCEE

North America CACS Emcee, Greg Schwem, shares why you should attend #NACACS!
Learn more about the event here: http://bit.ly/2F3VWeR It is more crucial than
ever for you to stay ahead of trends and tools. Join us at North America CACS
2018, 30 April-2 May in Chicago, Illinois, and be a part of the top conference
for IS audit and security professionals! Register here: http://bit.ly/2F3VWeR
Learn about our North America CACS 2018 keynote speakers here:
http://bit.ly/2CKWb9o See the full program schedule here: http://bit.ly/2CKWb9o

221 Views • 2 years ago

VIDEO


GRC 2018 CONFERENCE INVITATION

Register for GRC 2018 here: http://bit.ly/2sz1WqG ISACA and The IIA invite you
to the 2018 Governance, Risk and Control Conference. Mark Thomas discusses what
will be happening at this year’s conference, and what you can expect to gain
from attending. Embrace new perspectives and tactics as you network face to face
with other leaders and professionals at 2018 Governance, Risk and Control
Conference. Aug. 13-15, 2018 | The Omni Nashville | Nashville, TN. #GRCConf
Learn more about the conference or register here: http://bit.ly/2sz1WqG

506 Views • 2 years ago

VIDEO


ISACA PURPOSE AND PROMISE

Learn more about ISACA here: http://bit.ly/2EF84CQ ISACA's Purpose and Promise
video showcases ISACA’s presence, work, and value on a global scale through
leader, member and staff narratives. The ISACA community – members, volunteers
and professional staff -- is guided by our Purpose and Promise, which define the
essence of who we are and what we do. Our Purpose is the reason we exist – to
help business technology professionals and their enterprises around the world
realize the positive potential of technology. Our Promise is how we, as an
organization and as individuals, deliver on our Purpose – the work we do every
day to inspire confidence that enables innovation through technology. Our work,
and the work of the more than 450,000 engaged business technology professionals
we support, has never been more important. Learn more about ISACA here:
http://bit.ly/2EF84CQ

12K Views • 2 years ago

VIDEO


MELTDOWN & SPECTRE - IDENTIFYING THE VULNERABILITY & MITIGATING THE RISK

ISACA’s Frank Downs, Senior Manager of Cyber Information Security Practices,
demonstrates how to identify if you have the vulnerability and how to mitigate
the risk. To learn more, read the ISACA Now Blog, Understanding Meltdown and
Spectre http://bit.ly/2CQRm3i

949 Views • 2 years ago

VIDEO


GDPR OVERVIEW IN FOUR MINUTES - CSX EUROPE

Experts on GDPR from ISACA, IAPP, and ENISA joined together to discuss the
impending GDPR Regulation implementation 25 May 2018 at 2017 CSX Europe. The
panel discussed what GDPR is, what is involved in preparing for it and the
expectations of organizations. Links to more ISACA content about GDPR are below.
GDPR Data Protection Impact Assessments (White Paper): http://bit.ly/2kQjWGa
Adopting GDPR Using COBIT 5 (White Paper): http://bit.ly/2kQSTdy Using ISACA
Privacy Principles for GDPR Compliance (Article): http://bit.ly/2kQkcVG
Countdown to GDPR: 5 Tips to Accelerate GDPR Readiness (Archived Webinar):
http://bit.ly/2kSiO4z For a full list of GDPR resources from ISACA, go here:
http://bit.ly/2kQjVC8 To learn about CSX 2018 Europe, click here:
http://bit.ly/2kRdWNh

14K Views • 2 years ago

VIDEO


CSX 2017 EUROPE CONFERENCE HIGHLIGHTS

Enjoy the very best of what CSX 2017 Europe had to offer in this highlight
video. The attendees at the Intercontinental London - The O2 in London, UK, each
engaging keynote and session speaker and more made this incredible cyber event a
resounding success! Register for next year's conference here:
http://bit.ly/2zC7PWd

992 Views • 2 years ago

VIDEO


EUROCACS 2018

Hear what last year's attendees have to say about their EuroCACS experience and
register for the 2018 conference right here: http://bit.ly/2zCa4c6 Leaders in
IS/IT Audit, Security, and Compliance gather at one exceptional event each year.
Join them on 28-30 May 2018 in Edinburgh, Scotland. Gain fresh ideas and
approaches while earning CPE hours at a variety of workshops and over 50
breakout sessions. You will be gaining new knowledge and perspectives alongside
the industry’s brightest and most highly respected minds at this ISACA®
industry-leading conference. Register today at http://bit.ly/2zCa4c6

921 Views • 2 years ago

VIDEO


BETTER TECH GOVERNANCE IS BETTER FOR BUSINESS

Highlights from CSX 2017 North America conference panel discussing the key
takeaways from ISACA’s research on the importance of strong board oversight over
areas such as cybersecurity and risk management. To see ISACA's corresponding
report, click here: http://bit.ly/2z9U0hq

425 Views • 2 years ago

VIDEO


AFRICA CACS 2017 HIGHLIGHTS

Here are highlights from ISACA's Africa CACS 2017 conference. See a recap of the
Africa CACS event in Accra, Ghana. Learn more about all of our conferences here:
http://bit.ly/2gcf5kk

197 Views • 2 years ago

VIDEO


NORTH AMERICA CACS 2018

Register today at http://bit.ly/2ygQC40 Leaders in IS/IT Audit, Security and
Compliance gather at one exceptional event each year. Join them on 30 April-2
May 2018 in Chicago, Illinois. --More than 90 sessions to customize for your
goals --More in-depth options for advanced learning --Enhanced networking
opportunities Register today at http://bit.ly/2ygQC40

1K Views • 2 years ago

VIDEO


CSX 2017 NORTH AMERICA CONFERENCE HIGHLIGHTS

Enjoy the very best of what CSX 2017 North America had to offer in this
highlight video. The attendees at the Marriott Wardman Park in Washington D.C.,
each engaging keynote and session speaker, the interactive Cyber Challenge and
more made this incredible cyber event a resounding success! We cannot wait to
see everyone next year in Las Vegas, Nevada. http://bit.ly/2gbdxaa

1K Views • 2 years ago

VIDEO


CSX TRAINING PLATFORM

It’s Cyber Security Awareness Month. In cyber security, there’s no substitute
for real-world experience. That’s why we created the Cybersecurity Nexus™ (CSX)
Training Platform, the first on-demand, real-world training solution that builds
real technical skills to help enterprises train their staff to combat real
threats. Learn more. http://bit.ly/2xQNDwN

4K Views • 2 years ago

VIDEO


ISACA CRISC ONLINE REVIEW COURSE OVERVIEW

Purchase ISACA's CRISC Online Review Course here: http://bit.ly/2wgNLYc Online
review courses are also available for purchase through our enterprise sales team
for larger organizations. Learn more here: http://bit.ly/2whvv0C Course
Description The CRISC Online Review Course is an online preparation course that
will prepare you for the CRISC certification exam using proven instructional
design techniques and interactive activities. The course covers all four of the
CRISC domains. The course incorporates video, interactive eLearning modules,
downloadable, interactive workbooks, downloadable job aids, case study
activities, and pre- and post-course assessments. You will be able to navigate
the course at your own pace, following a recommended structure, or target
preferred job practice areas. You may also start and stop the course based on
your study schedule, picking up exactly where you left off the next time you
access. Trained by ISACA. Certified by ISACA. Learning Objectives At the end of
this course, the learner will be able to: --Identify the IT risk management
strategy in support of business objectives and alignment with the Enterprise
Risk Management (ERM) strategy. --Analyze and evaluate IT risk to determine the
likelihood and impact on business objectives to enable risk-based decision
making. --Determine risk response options and evaluate their efficiency and
effectiveness to manage risk in alignment with business objectives.
--Continuously monitor and report on IT risk and controls to relevant
stakeholders to ensure the continued efficiency and effectiveness of the IT risk
management strategy and its alignment with business objectives. Course Outline
CRISC Self-Assessment --50 questions --Results broken down per domain
Introduction --Welcome video --Getting started Job Aid Domain 1 — Risk
Management --Collect and review environmental risk data Identify potential
vulnerabilities to people, processes and assets --Develop IT scenarios based on
information and potential impact to the organization --Identify key stakeholders
for risk scenarios --Establish risk register --Gain senior leadership and
stakeholder approval of the risk plan --Collaborate to create a risk awareness
program and conduct training Domain 2 – IT Risk Assessment --Analyze risk
scenarios to determine likelihood and impact --Identify current state of risk
controls and their effectiveness --Determine gaps between the current state of
risk controls and the desired state --Ensure risk ownership is assigned at the
appropriate level --Communicate risk assessment data to senior management and
appropriate stakeholders --Update the risk register with risk assessment data
Domain 3 – Risk Response and Mitigation --Align risk responses with business
objectives --Develop consult with and assist risk owners with development risk
action plans --Ensure risk mitigation controls are managed to acceptable levels
--Ensure control ownership is appropriately assigned to establish accountability
--Develop and document control procedures for effective control --Update the
risk register --Validate that risk responses are executed according to risk
action plans Domain 4 – Risk and Control Monitoring and Reporting --Risk and
control monitoring and reporting --Define key risk indicators (KRIs) and
identify key performance indicators (KPIs) to enable performance measurement key
risk indicators (KRIs) and key performance indicators (KPIs) --Determine the
effectiveness of control assessments --Identify and report trends/changes to
KRIs/KPIs that affect control performance or the risk profile CRISC Sample Exam
--75 questions

2K Views • 2 years ago

VIDEO


ASIA PACIFIC CACS 2017 OVERVIEW

Mark your calendars for 29-30 November 2017 and join us in Dubai! Don’t miss the
opportunity to earn up to 23 CPE hours and be a part of the top conference for
Audit and Security professionals. Register today! http://bit.ly/2hhdXbm

741 Views • 2 years ago

VIDEO


ISACA CISM ONLINE REVIEW COURSE OVERVIEW

Purchase ISACA's CISM Online Review Course here: http://bit.ly/2wh1AWD Online
review courses are also available for purchase through our enterprise sales team
for larger organizations. Learn more here: http://bit.ly/2wgNbtu
________________________________________ CISM Online Review Course Description
The CISM Online Review Course is an online preparation course that will prepare
you for the CISM certification exam using proven instructional design techniques
and interactive activities. The course covers all four of the CISM domains. The
course incorporates video, interactive eLearning modules, downloadable,
interactive workbooks, downloadable job aids, case study activities, and pre-
and post-course assessments. You will be able to navigate the course at your own
pace, following a recommended structure, or target preferred job practice areas.
You may also start and stop the course based on your study schedule, picking up
exactly where you left off the next time they access. Trained by ISACA.
Certified by ISACA. Learning Objectives At the completion of this course the
learner will be able to: --Establish and/or maintain an information security
governance framework and supporting processes to ensure that the information
security strategy is aligned with organizational goals and objectives. --Manage
information risk to an acceptable level based on risk appetite to meet
organizational goals and objectives. --Develop and maintain an information
security program that identifies, manages and protects the organization’s assets
while aligning to information security strategy and business goals, thereby
supporting an effective security posture. --Plan, establish and manage the
capability to detect, investigate, respond to and recover from information
security incidents to minimize business impact. Course Outline CISM
Self-Assessment --50 questions --Results are broken down per domain Introduction
--Welcome video --Getting started Job Aid Domain 1 – Information Security
Governance --Explain the need for and the desired outcomes of an effective
information security strategy --Create an information security strategy aligned
with organizational goals and objectives --Gain stakeholder support using
business cases Identify key roles and responsibilities needed to execute an
action plan --Establish metrics to measure and monitor the performance of
security governance Domain 2 – Information Risk Management --Explain the
importance of risk management as a tool to meet business needs and develop a
security management program to support these needs --Identify, rank, and respond
to a risk in a way that is appropriate as defined by organizational directives
--Assess the appropriateness and effectiveness of information security controls
--Report information security risk effectively Domain 3- Information Security
Program Development and Management --Align information security program
requirements with those of other business functions --Manage the information
security program resources --Design and implement information security controls
--Incorporate information security requirements into contracts, agreements and
third-party management processes Domain 4 – Information Security Incident
Management --Understand the concepts and practices of Incident Management
--Identify the components of an Incident Response Plan and evaluate its
effectiveness --Understand the key concepts of Business Continuity Planning, or
BCP and Disaster Recovery Planning, or DRP --Be familiar with techniques
commonly used to test incident response capabilities CISM Sample Exam --75
questions

4K Views • 2 years ago

VIDEO


MARK THOMAS EXPLAINS HIS UPCOMING WORKSHOP AT ASIA PACIFIC CACS 2017 CONFERENCE

Mark Thomas explains how effectively managing IT risk helps drive better
business performance by linking information and technology risk to the
achievement of strategic enterprise objectives. This one day, instructor-led
workshop will address COBIT 5 for Risk which defines IT risk as ‘’business risk,
specifically, the business risk associated with the use, ownership, operation,
involvement, influence, and adoption of IT within an enterprise.’’ Attendees
will learn how to adopt COBIT 5 for Risk to ensure a broader coverage of
business risk to the benefit their enterprise’s risk profile. Learn more at Asia
Pacific CACS 2017 http://bit.ly/2vWXWhZ

155 Views • 2 years ago

VIDEO


LEARN HOW CSX 2017 WILL HELP YOU IMPROVE HEALTHCARE'S CYBER SECURITY

Learn how to defend your healthcare organization, patients and more against the
growing cyber security threat. Make plans now to join the thought (and action)
leaders in cyber security at CSX 2017: 2-4 October 2017 in Washington, DC, USA;
or 30 October–1 November 2017 in London, UK. CSX 2017 North America:
http://bit.ly/2w5tk00 CSX 2017 Europe: http://bit.ly/2w5klvS

312 Views • 2 years ago

VIDEO


LEARN HOW CSX 2017 WILL HELP YOU IMPROVE DEPARTMENTAL CYBER SECURITY

Learn more about the NIST Cybersecurity framework and cyber security’s impact on
your agency, role and career, and the public’s trust. Make plans now to join the
thought (and action) leaders in cyber security at CSX 2017: 2-4 October 2017 in
Washington, DC, USA; or 30 October–1 November 2017 in London, UK CSX 2017 North
America: http://bit.ly/2vMvW08 CSX 2017 Europe: http://bit.ly/2vLU9nn

529 Views • 2 years ago

VIDEO


CSX 2017 NORTH AMERICA PREVIEW

See why industry professionals and experts rate the CSX North America conference
with over 90% satisfaction – Attend this year’s event 2-4 October in Washington,
DC. Register here: http://bit.ly/2vIYDxw

610 Views • 2 years ago

VIDEO


TICHAONA ZORORO | COBIT 5 FOUNDATION WORKSHOP AT AFRICA CACS 2017

Don’t miss out! Embrace fresh insights, tools, and solutions you can apply
immediately in your organisation at your choice of more than 30 track sessions
at Africa CACS 2017 in Accra, Ghana, 11-12 September 2017. Add to your expertise
and earn an additional 14 Continuing Professional Education (CPE) credits for a
conference total of 29 CPE—by starting your learning early. Join fellow
business, government and information systems audit, security, risk and
governance professionals for COBIT expert Tichaona Zororo’s invaluable
pre-conference workshop—COBIT 5 Foundation—starting Saturday, 9 September 2017.
Learn more about Africa CACS and register here: http://bit.ly/2uXyESQ

851 Views • 2 years ago

VIDEO


INTERNAL CONTROL USING COBIT 5

Download your copy of the free corresponding whitepaper here:
http://bit.ly/2uTpS8s A free Internal and Mitigating Control Selection Worksheet
is also available under "Related Items" here: http://bit.ly/2uTpS8s Synopsis: In
any organization, uncertainty is everywhere. External factors such as industry
outlooks and consumer sentiment can have substantial impact on an organization’s
growth and strategy. Internal factors within the organization also arise, such
as IT security, ethics, and financial compliance. These external and internal
factors introduce risk to an organization’s ability to meet goals and
objectives. Every organization must establish processes that ensure risk is
managed. These policies are called ”internal controls.” Failing to mitigate
these risk factors may result in regulatory issues, ethical misconduct, or
security breaches—the consequences of which can be severe. Therefore, it is
vital to establish a properly managed control environment to create assurance
and confidence in the organization’s activities and outcomes. An effective way
to achieve that goal is to use the COBIT 5 framework for governance of
enterprise IT as an overarching framework for various standards, frameworks and
best practices being used in that control environment. At the enterprise level,
the separation of governance controls and internal controls in many
organizations may lead to miscommunication, inefficiency, and an inability to
effectively deliver value to stakeholders. Using the COBIT 5 governance
framework for internal controls can streamline and eliminate these
inefficiencies, by aligning controls with business objectives, and by creating a
cohesive methodology across the governance, risk, and compliance (GRC)
functions. This video explores this concept in detail. Learn more:
http://bit.ly/2uTpS8s

8K Views • 2 years ago

VIDEO


CACS CONFERENCE CALL FOR SPEAKERS

Are you an industry expert, thought-leader or passionate professional willing to
share your experiences, insights, and knowledge with colleagues and peers? ISACA
is frequently accepting proposals for educational sessions at the globally
recognized CACS Conferences. Increase your visibility throughout the ISACA
international community by becoming an event speaker. ISACA issues Call for
Speakers for its education events, and a volunteer task force vets speakers
based on subject matter expertise and other criteria on this page. Learn more
and submit your proposal today: http://bit.ly/2uEM1qG.

343 Views • 2 years ago

VIDEO


RYAN HOGARTH - AFRICA CACS 2017 OPENING KEYNOTE

Be enriched and inspired by the perspective-altering address of Ryan Hogarth at
ISACA’s prestigious Africa CACS 2017 Conference in Accra, Ghana, 11-12 September
2017. Kick off your two-days of knowledge growth with Ryan Hogarth’s opening
keynote address. The social business strategist, and author offers invaluable
insight on understanding what customers, prospects and other stakeholders are
doing with and expecting from the transforming digital landscape. Gain new
guidance on how to adapt and prepare your thinking to capitalize on the business
impacts of shifting technology. Register today: http://bit.ly/2tgblzq

442 Views • 2 years ago

VIDEO


MARK THOMAS EXPLAINS HIS UPCOMING WORKSHOP AT CSX 2017 NORTH AMERICA CONFERENCE

Mark Thomas gives insight on what his upcoming workshop will be about at the CSX
2017 North America Conference. As part of the knowledge, tools and guidance
provided through the globally respected Cybersecurity Nexus (CSX) program, ISACA
has developed a guide and course: Implementing NIST Cybersecurity Framework
Using COBIT 5. This course presents deep insights on the Cybersecurity Framework
(CSF), its goals, implementation steps and the ability to apply this
information. The course is well-suited for individuals who have a basic
understanding of both COBIT 5 and security concepts, and who are involved in
improving the cyber security program for their enterprises. Students will learn
to understand the goals of the CSF and what it means to align to it, understand
the seven CSF implementation steps, and apply and evaluate the steps using COBIT
5. Register for CSX 2017 North America and/or workshops here:
http://bit.ly/2sMnBY8 Learn more about about this workshop and Mark Thomas here:
http://bit.ly/2sLC3Q9 Learn more about the overall CSX 2017 North America
Program here: http://bit.ly/2sMbMRH

510 Views • 2 years ago

VIDEO


SPONSORSHIP OPPORTUNITIES

Connect with your target audience; 150,000 IS & IT Professionals in audit &
assurance, cybersecurity, governance & risk and control. Jeff McNaughton of
Vanguard Integrity Professionals and Chris Parkerson of Adobe talk about their
experiences sponsoring ISACA events. For more information on ISACA sponsorship
opportunities, visit our website: http://bit.ly/2sy1vsu

224 Views • 2 years ago

VIDEO


NETWORK WITH OTHERS AT CSX 2017 ASIA PACIFIC

CSX 2017 Asia Pacific builds on the globally respected Cybersecurity Nexus™
(CSX) program. This immersive experience supports regional security
practitioners, managers and teams in enhancing how to identify, analyze and plan
for security breaches and cyber-attacks. You will do more than just listen to
speakers. You will collaborate with peers to help solve today’s issues and
better prepare for tomorrow’s challenges. http://bit.ly/2suxNo9

132 Views • 2 years ago

VIDEO


ALI PABRAI INVITES YOU TO ENGAGE AT CSX 2017 CAIRO

Renowned cyber security and compliance expert Uday Ali Pabrai presents and
moderates a day of collaborative discussion about cyber security vulnerability
assessment at CSX 2017 Cairo. Ali is a member of Infragard, a public-private
partnership between U.S. businesses and the U.S. Federal Bureau of
Investigation. He also is chief executive of ecfirst, an Inc. Magazine 500
fastest-growing business. Register today and leave energized, better connected
with peers and with new knowledge on how to improve your organization’s cyber
security defenses. Sign up here: http://bit.ly/2stGUoR

287 Views • 2 years ago

VIDEO


CRISC VIRTUAL EXAM PREP WITH MARK THOMAS

CRISC Exam Prep Course: 10-13 July 2017 | Online. Leverage the best of both
worlds—personal interaction with highly-qualified and experienced instructors,
and the convenience of online access to a virtual classroom. Grow your
knowledge, enhance your skills and advance your career with Virtual
Instructor-Led Training from ISACA. This easy-to-use web-based training connects
you from anywhere to lectures, demonstrations and hand-on instruction that will
develop your expertise in vital areas of information systems.
http://bit.ly/2sT7Z8s

1K Views • 2 years ago

VIDEO


TED HARRINGTON EXPLAINS HIS UPCOMING WORKSHOP AT CSX 2017 NORTH AMERICA
CONFERENCE

In his seminal work The Art of War, Sun Tzu advocated that we must “know thy
enemy” in order to defeat that enemy. Utilizing a mixture of presentation and
group exercise modules, this workshop leverages that mantra, adopting the
attacker’s viewpoint in order to understand how to defend. Presented by the
elite group of security researchers and consultants widely known as the first
company to hack the iPhone, this session examines secure design principles,
attack anatomies, and real world case studies from a variety of industries.
Notably, this session extracts lessons from recently published security research
by the presenters, including the seminal whitepaper Hacking Hospitals, in which
it was investigated how hackers could cause patient harm or fatality. Attendees
can expect to be challenged to consider a new defense paradigm, and will leave
with actionable guidance that can be immediately implemented at their
organizations. Register now: http://bit.ly/2sTnldo

206 Views • 2 years ago

VIDEO


GRC CONFERENCE INVITATION

ISACA invites you to the 2017 Governance, Risk and Control Conference. Mark
Thomas discusses what will be happening at this year’s conference, and what you
can expect to gain from the conference. Be a part of the dynamic and
collaborative learning atmosphere at 2017 Governance, Risk and Control
Conference, Aug. 16-18, 2017 | Gaylord Texan Resort & Convention Center |
Grapevine, TX. Register now: http://bit.ly/2sT77kc

1K Views • 2 years ago

VIDEO


EUROCACS 2017 RECAP

There were 45+ speakers, 50+ sessions, 4 workshops and endless networking
opportunities. See all of the fun that was had at EuroCACS 2017 in Munich,
Germany this this year. Sign up for EuroCACS 2018 in Edinburgh, Scotland here:
http://bit.ly/2sDF3kZ

744 Views • 2 years ago

VIDEO


CSX NORTH AMERICA - NETWORKING TESTIMONIAL

After attending 2015 CSX North America, attendees give testimonials about their
experience. Click here to sign up for the 2016 conference in Las Vegas:
http://bit.ly/2clARuC

357K Views • 2 years ago

VIDEO


CSX NORTH AMERICA - SESSIONS TESTIMONIAL

In this video, CSX North America 2015 attendees give testimonials about their
experience. Click here to sign up for the 2016 conference in Las Vegas:
http://bit.ly/2cTR8w8

90K Views • 2 years ago

VIDEO


CSX EUROPE - NETWORKING TESTIMONIAL

After attending 2015 CSX Europe, attendees give testimonials about their
experience. Click here to sign up for the 2016 conference in London:
http://bit.ly/2clEYah

219K Views • 2 years ago

VIDEO


CSX EUROPE - SESSIONS TESTIMONIAL

In this video, CSX Europe 2015 attendees give testimonials about their
experience. Click here to sign up for the 2016 conference in London:
http://bit.ly/2clFtkt

630K Views • 2 years ago

VIDEO


OVERVIEW OF DIGITAL FORENSICS

When a cyber incident occurs, IT’s best practice is to respond with a set of
predetermined actions. Applying digital forensics to aid in the recovery and
investigation of material on digital media and networks is one of these actions.
Digital forensics is defined as the “process of identifying, preserving,
analyzing and presenting digital evidence in a manner that is legally acceptable
in any legal proceedings (i.e., a court of law).” To download the accompanying
whitepaper, click here: http://bit.ly/2rerSCZ. For a suite of cyber security
learning solutions for individuals and enterprises, check out Cybersecurity
Nexus (CSX) from ISACA: http://bit.ly/2sxqAXx

168K Views • 2 years ago

VIDEO


ISACA OFFICIAL CISA ONLINE REVIEW COURSE

Get the CISA training you need here: http://bit.ly/2qZK17D. Prepare to obtain
the Certified Information Systems Auditor® (CISA) certification and be
recognized among the world’s most-qualified information systems professionals.
The CISA Online Review Course provides online, on-demand instruction and is
ideal for preparing you and fellow audit, assurance, control, security and cyber
security professionals for the CISA certification exam. The course covers all
five of the CISA domains, and each section corresponds directly to the CISA job
practice. It uses proven instructional design techniques, incorporating video,
narrated interactive eLearning modules, downloadable, interactive workbooks,
downloadable job aids, case study activities and pre- and-post-course
assessments. You will be able to navigate the course at your own pace following
a recommended structure or target preferred job practice areas. You may also
start and stop the course based on your preferred study schedule, picking up
exactly where you left off the next time you return. Trained by ISACA. Certified
by ISACA. Purchase here: http://bit.ly/2qZK17D

13K Views • 2 years ago

VIDEO


AFRICA CACS 2017 OVERVIEW

Mark your calendars for 11-12 September 2017 and join us in Accra, Ghana! Don’t
miss the opportunity to earn up to 29 CPE hours and be a part of the top
conference for Audit and Security professionals. http://bit.ly/2pX2GAk

1K Views • 2 years ago

VIDEO


CSX 2017 CONFERENCES INVITATION

ISACA invites you to the CSX 2017 conferences. Frank Downs discusses what will
be happening at this year’s CSX conferences, and what you can expect to gain
from the conference. Be a part of the dynamic and collaborative learning
atmosphere at CSX 2017 North America, 2-4 October 2017 in Washington DC or CSX
2017 Europe, 30 October – 1 November 2017 in London, UK!

2K Views • 2 years ago

VIDEO


NORTH AMERICA CACS 2017 HIGHLIGHTS

The North America CACS 2017 conference in Las Vegas just ended. Check out the
conference highlights and register for NACACS 2018 in Chicago here:
http://bit.ly/2pXnHO5

1K Views • 2 years ago

VIDEO


2016 ANNUAL REPORT: A YEAR OF IMPACT, INNOVATION AND GROWTH

ISACA achieved many milestones in 2016 that allowed us to make substantial
progress in our programs and pursue several new opportunities for our global
community. The 2016 Annual Report highlights the year’s accomplishments, which
were made possible through the commitment and support of ISACA members,
volunteers and professional staff. See the full report here:
http://bit.ly/2prGVLF

693 Views • 2 years ago

VIDEO


ISACA VOLUNTEER APPRECIATION

It's National Volunteer Appreciation Week and ISACA wants to thank all of our
dedicated volunteers. In a world where time is our most precious commodity, your
willingness to give back inspires us all, especially knowing that you do so
above and beyond your many other professional and personal responsibilities.
Read what ISACA CEO, Matt Loeb has to say about volunteers:
http://bit.ly/2oOb57W

813 Views • 2 years ago

VIDEO


IT AUDIT LEADERS FORUM AT EUROCACS 2017

In an effort to provide IT Audit Leaders with a forum to discuss common needs
and solutions, ISACA is organizing an “invitation only” complimentary one-day
event held adjacent to ISACA’s 2017 EuroCACS. This one day forum offers an
unrivaled opportunity to expand your network, build onto your knowledge and
skills and to discuss common needs and solutions among peers. Learn more here:
http://bit.ly/2nHO3mn.

221 Views • 2 years ago

VIDEO


JEFF CIVILLICO - NORTH AMERICA CACS 2017 EMCEE

North America CACS Emcee, Jeff Civillico, shares why you should attend #NACACS!
Learn more here: http://bit.ly/2nxzKAS.

127 Views • 2 years ago

VIDEO


EUROCACS 2017 OVERVIEW

Mark your calendar for 29 – 31 May 2017 and join us in Munich, Germany! Don’t
miss the opportunity to earn up to 32 CPE hours and be a part of the top
conference for IS audit and security professionals! http://bit.ly/2mzt0Pb

650 Views • 2 years ago

VIDEO


NORTH AMERICA CACS 2017 CLOSING KEYNOTE SPEAKER

Mark your calendar for 1 – 3 May 2017 and join us in Las Vegas, NV for North
America CACS 2017. You are not going to want to miss our keynote speakers:
http://bit.ly/2mDXrq6 Opening Keynote: Brent Bushnell CEO of Two Bit Circus, a
Los Angeles-based experiential entertainment company Closing Keynote: Daymond
John FUBU Clothing Founder, Urban Entrepreneur, CEO, Author, Marketing &
Branding Expert, Shark Tank Reality TV Judge, Motivational Speaker

106 Views • 2 years ago

VIDEO


NACACS 2017 WORKSHOP - COBIT 5 FOUNDATION

Learn the importance of an effective framework to enable business value during
the COBIT 5 Foundation workshop available at #NACACS 2017. Learn more here:
http://bit.ly/2no2iJn

131 Views • 2 years ago

VIDEO


NORTH AMERICAN CACS 2017 OVERVIEW

Mark your calendar for 1 – 3 May 2017 and join us in Las Vegas, Nevada! Don’t
miss the opportunity to earn up to 39 CPE hours and be a part of the top
conference for IS audit and security professionals! http://bit.ly/2mo8W2X

570 Views • 2 years ago

VIDEO


NORTH AMERICA CACS 2017 OPENING KEYNOTE SPEAKER

Mark your calendar for 1 – 3 May 2017 and join us in Las Vegas, NV for North
America CACS 2017. You are not going to want to miss our keynote speakers:
http://bit.ly/2mkgBj1 Brent Bushnell CEO of Two Bit Circus, a Los Angeles-based
experiential entertainment company Daymond John FUBU Clothing Founder, Urban
Entrepreneur, CEO, Author, Marketing & Branding Expert, Shark Tank Reality TV
Judge, Motivational Speaker

120 Views • 2 years ago

VIDEO


EARN 39 CPE HOURS AT NORTH AMERICA CACS 2017 CONFERENCE

Mark your calendar for 1 – 3 May 2017 and join us in Las Vegas, Nevada! Don’t
miss the opportunity to earn up to 39 CPE hours and be a part of the top
conference for IS audit and IT security professionals!In addition to the 39 CPE
hours for attending the North America CACS conference, take advantage of the
four pre-conference workshops and four post-conference workshops. To learn more:
http://bit.ly/2mGYyGc

118 Views • 2 years ago

VIDEO


WHY I WORK AT ISACA

ISACA employees explain how they demonstrate ISACA's values and why they enjoy
working at ISACA. To learn more about open job positions at ISACA, click here:
http://bit.ly/2mOl8dc

638 Views • 2 years ago

VIDEO


EUROCACS 2017 WORKSHOP - COBIT 5 FOUNDATION

EuroCACS 2017 in Munich has 1 and 2 day workshops available before the
conference. Click here to learn more and sign up for the COBIT 5 Foundation
workshop: http://bit.ly/2l0WKUp

496 Views • 2 years ago

VIDEO


ISACA SPONSORSHIP OPPORTUNITIES - LLOYD'S REGISTER

Lloyd's Register explains why they sponsored ISACA's CSX Europe conference. To
learn more about how you can experience the power of partnership with ISACA,
visit our website: http://bit.ly/2kGRFji

236 Views • 2 years ago

VIDEO


ISACA SPONSORSHIP OPPORTUNITIES - TURN KEY CONSULTING

Turn Key Consulting explains what made them decide to become a sponsor for
ISACA's CSX Europe conference. To learn more about how you can experience the
power of partnership with ISACA, visit our website: http://bit.ly/2kH4utT

330 Views • 2 years ago

VIDEO


GET INVOLVED IN ISACA

People share what motivated them to volunteer for ISACA and the benefits they
have received from getting involved. Learn more about becoming a volunteer here:
http://bit.ly/2kyEoJo

1K Views • 2 years ago

VIDEO


CSX NORTH AMERICA OVERALL EXPERIENCE TESTIMONIAL

2015 attendees give testimonials about their experience at CSX North America.
Don't miss out on the 2016 conference in Las Vegas. Sign up here:
http://bit.ly/2cTRu5S

187K Views • 2 years ago

VIDEO


CSX EUROPE - OVERALL EXPERIENCE TESTIMONIAL

2015 attendees give testimonials about their experience at CSX Europe. Don't
miss out on the 2016 conference in London. Sign up here: http://bit.ly/2clEJfn

887K Views • 2 years ago

VIDEO


CSX ASIA - OVERALL EXPERIENCE TESTIMONIAL

2015 attendees give testimonials about their experience at CSX Asia Pacific.
Don't miss out on the 2016 conference in Singapore. Sign up here:
http://bit.ly/2clFy7I

1M Views • 2 years ago

VIDEO


CSX ASIA PACIFIC - SESSIONS TESTIMONIAL

In this video, CSX Asia Pacific 2015 attendees give testimonials about their
experience. Click here to sign up for the 2016 conference in Singapore:
http://bit.ly/2clFiFS

156K Views • 2 years ago

VIDEO


6TH ANNUAL IT AUDIT BENCHMARKING SURVEY

ISACA, in partnership with Protiviti, has released the 6th Annual IT Audit
Benchmarking Survey results. View the full survey results, infographic, and more
at http://bit.ly/2l1mFer.

587 Views • 2 years ago

VIDEO


WHY SHOULD YOU GET A CYBERSECURITY NEXUS PRACTITIONER CERTIFICATION (CSXP)?

Are you contemplating getting a Cybersecurity Nexus Practitioner Certification
(CSXP)? Watch this video to see what motivated Adam Khan to pursue it. Learn
more about the CSXP certification here: http://bit.ly/2k9ox5g

3K Views • 2 years ago

VIDEO


CSX 2017 NORTH AMERICA - CALL FOR SPEAKERS

ISACA is now accepting proposals for educational sessions at the CSX 2017 North
America Conference taking place 2-4 October, 2017 at Marriott Wardman Park in
Washington DC! Click here to submit your proposal: http://bit.ly/2kui9su We want
to be sure we are offering the most relevant, engaging and hands-on education in
the industry and we need YOU to make that happen!

147 Views • 2 years ago

VIDEO


AFRICA CACS CALL FOR SPEAKERS

Are you an industry expert, thought-leader or passionate professional willing to
share your experiences, insights and knowledge with colleagues and peers? ISACA
is now accepting proposals for educational sessions at the globally recognised
Africa CACS 2017 Conference. http://bit.ly/2jZiyCI

203 Views • 2 years ago

VIDEO


CRISC CERTIFICATION HOLDERS EXPRESS WHAT MOTIVATED THEM TO GET CERTIFIED

Certified in Risk and Information Systems Control (CRISC) certification holders
discuss how what motivated them to pursue the CRISC. Learn more about the CRISC
certification here: http://bit.ly/2jHZWX9

25K Views • 2 years ago

VIDEO


CSX ASIA - NETWORKING TESTIMONIAL

After attending 2015 CSX Asia Pacific, attendees give testimonials about their
experience. Click here to sign up for the 2016 conference in Singapore:
http://bit.ly/2clFAMK

1M Views • 2 years ago

VIDEO


EUROCACS 2017 PROMO

Mark your calendar for 29–31 May 2017 and join us in Munich, Germany! Don’t miss
the opportunity to earn up to 32 CPE hours and be a part of the top conference
for Audit and Security professionals! http://bit.ly/2hb0YJO

400 Views • 2 years ago

VIDEO


CHRISTOS K. DIMITRIADIS | OPENING REMARKS AT CSX ASIA PACIFIC CONFERENCE

Christos K. Dimitriadis, Ph.D., CISA, CISM, CRISC, is chair of ISACA’s Board of
Directors and group director of information security for INTRALOT, a
multinational supplier of integrated gaming and transaction processing systems.
Dimitriadis has built INTRALOT’s Global Information Security operations and is
responsible for the alignment of the Group’s security strategy with the business
needs. He also designed INTRALOT’s innovation program in 2013 and heads the
office of the CTO, managing business transformation.

580 Views • 2 years ago

VIDEO


ISACA CGEIT CERTIFICATION HOLDERS EXPLAIN HOW THEY PUT CREDENTIALS TO USE

Individuals with Certified in the Governance of Enterprise IT (CGEIT)
classifications discuss the professional benefits of CGEIT.
http://bit.ly/2gh8pgK The uniquely governance-focused CGEIT certification
ensures holders are capable of bringing IT governance into an organization, can
grasp the complex subject holistically, and enhance the value that the
enterprise obtains from its IT solutions. Since its inception in 2007, thousands
of professionals around the world have earned the industry-leading CGEIT
designation as a means to affirm that they have the broad knowledge and the
wide-ranging experience necessary to support and advance the IT governance of an
enterprise; ensuring that business IT systems align with optimum effectiveness
and efficiency. Learn more about the CGEIT certification: http://bit.ly/2gh8pgK

16K Views • 2 years ago

VIDEO


ISACA CISA CERTIFICATION HOLDERS DESCRIBE CAREER BENEFITS

Certified Information Systems Auditor (CISA) certification holders discuss the
professional benefits of earning and maintaining their CISA certification.
http://bit.ly/2gh4QHd For some business and government agencies, CISA
certifications have become a prerequisite for information systems and
information technology roles. CISA certifications are world-renowned as the
standard of achievement for those who assess an organization’s information
technology and business systems and provide assurance on their availability and
sustainability. Since its inception in 1978, more than 129,000 people have
become CISA certified to validate their expertise. Learn more about the CISA
certification: http://bit.ly/2gh4QHd

63K Views • 2 years ago

VIDEO


CSX 2016 ASIA PACIFIC CONFERENCE HIGHLIGHTS INSIGHTS

Don't miss out on highlights and insights from the CSX 2016 Asia Pacific
Conference in Singapore! The inaugural conference brought together globally
respected experts and professionals at the Marina Bay Sands hotel to share
expertise and make new connections. Thank you to all the attendees, volunteers
and staff for making this event a success! http://bit.ly/2f7ZlLF

694 Views • 2 years ago

VIDEO


CSX 2016 ASIA PACIFIC CONFERENCE SLIDESHOW

Check out the CSX 2016 Asia Pacific Conference Slideshow! Attendees at the
Marina Bay Sands hotel in Singapore took part in engaging keynote presentations,
high-impact break out sessions and more. Thank you to all the attendees,
volunteers and staff for making this event a success! http://bit.ly/2fZcft1

262 Views • 2 years ago

VIDEO


ENGAGE AND EXPERIENCE NORTH AMERICA CACS 2017

Exceed ordinary - become legendary. Attend North America CACS and stack the odds
in your favor: http://bit.ly/2fbZON4

802 Views • 2 years ago

VIDEO


ISACA’S IT RISK/REWARD BAROMETER: AUGMENTED REALITY

241 Views • 2 years ago

VIDEO


CSX 2016 EUROPE CONFERENCE HIGHLIGHTS

See the highlights from CSX 2016 Europe Conference that was held in London.
Attendees took part in engaging keynote presentations. As well as high-impact
break out sessions that provided the unique opportunity to learn from top
experts in the field in this inaugural conference. Thank you to all the
attendees, volunteers and staff. http://bit.ly/2enygDQ

955 Views • 2 years ago

VIDEO


NORTH AMERICA CACS 2017 CALL FOR SPEAKERS

http://bit.ly/2eeTm7B: ISACA is now accepting proposals for educational sessions
at the globally recognized North America CACS 2017 Conference, which is taking
place 1-3 May 2017 at The Cosmopolitan of Las Vegas! The majority of attendees
are information systems professionals with 10+ years of experience in
Audit/Assurance, Compliance, Risk, Security and Strategy/Governance roles. This
is a great opportunity for you to lead a hot-button session and expand your
business network.

273 Views • 2 years ago

VIDEO


CSX 2016 NORTH AMERICA CONFERENCE HIGHLIGHTS

Enjoy the very best of what CSX 2016 North America had to offer in this
highlight video. The attendees at the Cosmopolitan Hotel in Las Vegas, each
engaging keynote and session speaker, the interactive Cyber Challenge and more
made this history-making cyber event a resounding success! We cannot wait to see
everyone next year in Washington D.C.

1K Views • 2 years ago

VIDEO


CSX 2016 NORTH AMERICA CONFERENCE PHOTO HIGHLIGHTS

Take a look at photos from the CSX 2016 North America conference . The attendees
at the Cosmopolitan Hotel in Las Vegas, each engaging keynote and session
speaker, the interactive Cyber Challenge and more made this history-making cyber
event a resounding success! We cannot wait to see everyone next year in
Washington D.C.

254 Views • 2 years ago

VIDEO


CSX CONFERENCE TESTIMONIALS

Here is what last years attendees had to say about the inaugural CSX
Conferences. Click here to register for the 2016 conferences in Las Vegas,
London and Singapore: http://bit.ly/2cTUzmw

6K Views • 2 years ago

VIDEO


LATIN CACS 2016 - PUERTO RICO

Latin CACS ofrece el chance de ampliar tus redes de contactos y profundizar
conocimientos/habilidades. Inscríbete en: http://bit.ly/2clzo7D

1K Views • 2 years ago

VIDEO


HOW CAN AUDITORS USE COBIT 5 TO BENEFIT THE BUSINESS?

Shaun Kirby emphasizes COBIT’s value in allowing organizations to audit in line
with industry standards. For more information, visit http://bit.ly/2bgXa3Q.

2K Views • 2 years ago

VIDEO


HOW DO YOU EXPLAIN COBIT TO YOUR DAD – OR YOUR CEO?

Mark Pardee says that COBIT helps convey complicated concepts in simple business
terms. For more information, visit http://bit.ly/2bgYlAc.

3K Views • 2 years ago

VIDEO


HOW DOES COBIT 5 HELP WITH KNOWLEDGE MANAGEMENT AND INNOVATION?

Marjorie Hechavarria explains how COBIT helps organizations work across
departments to achieve business goals. For more information, visit
http://bit.ly/2bfVNYE.

1K Views • 2 years ago

VIDEO


WHY SWITCH TO COBIT 5?

James Lloyd addresses the benefits of switching to COBIT 5 from previous
versions. For more information, visit http://bit.ly/2bfDjaW.

812 Views • 2 years ago

VIDEO


HOW CAN YOU CUSTOMIZE COBIT?

Gwen Clopton lauds COBIT for its flexibility. For more information, visit
http://bit.ly/2bfCq20.

485 Views • 2 years ago

VIDEO


HOW CAN COBIT 5 PROVIDE A COMMON LANGUAGE FOR BUSINESS AND IT?

Bernard K. Akowuah describes how COBIT 5 helps business and IT better understand
one another. For more information, visit http://bit.ly/2bftMR4.

1K Views • 2 years ago

VIDEO


ISACA NORTH AMERICA CACS 2016 HIGHLIGHTS

ISACA North America CACS 2016 Highlights - See a recap of the NACACS event in
New Orleans, LA.

1K Views • 2 years ago

VIDEO


LATIN AMERICA CACS 2016 - JULIO JOLLY

Nuestro conferencista magistral, Julio Jolly, le invita a participar en
LatinCACS para impulsar su carrera profesional. Inscribase hoy:
http://bit.ly/2aWKtQD

1K Views • 2 years ago

VIDEO


CHRISTOS DIMITRIADIS INVITES YOU TO AFRICACACS

ISACA Board of Directors Chair, Christos Dimitriadis, invites you to the
inaugural AfricaCACS conference in Nairobi, Kenya 8-9 August. Sign up today!
http://bit.ly/2aoswu4

361 Views • 2 years ago

VIDEO


INTRODUCTION TO COBIT VIDEO SERIES

This self-paced video series offers an easy and convenient way for employees,
practitioners, managers and executives to learn about the basics of COBIT 5 and
the value of governance of enterprise IT (GEIT). Click here for full series:
http://bit.ly/2aoyUS4 The videos provide a baseline of knowledge for COBIT and
governance programs. If a lack of COBIT training resources is a problem in your
geographical region, this on demand video series can help fill that need. Sign
up and watch on your schedule. Enterprise/group learning packages are also
available.

35K Views • 2 years ago

VIDEO


ISACA 2015 ANNUAL REPORT

The 2015 Annual Report spotlights ISACA’s accomplishments last year and
emphasizes that we can achieve great things. #WeAreOne

605 Views • 2 years ago

VIDEO


ISACA EUROCACS 2016

ISACA EuroCACS 2016 Conference - Dublin, Ireland

2K Views • 2 years ago

VIDEO


SIMON T. BAILEY - NORTH AMERICA CACS 2016

Don't miss your chance to see Keynote Speaker, Simon T. Bailey, at ISACA's North
America CACS Conference on May 4, 2016. Register now: http://bit.ly/21RcsPO

729 Views • 2 years ago

VIDEO


NORTH AMERICA COBIT CONFERENCE - PROMO

Register for North America COBIT Conference today!

132 Views • 2 years ago

VIDEO


NORTH AMERICA CACS 2016 - PROMO

Register for North America CACS today!

248 Views • 2 years ago

VIDEO


SIMON T. BAILEY PROMOTES NORTH AMERICA CACS 2016

Register for the North America CACS 2016 Conference to see keynote speaker Simon
T. Bailey http://bit.ly/1T4cDaA

923 Views • 2 years ago

VIDEO


EUROCACS CONFERENCE 2015 - SUPER SPY ME EVENT

ISACA's 2015 EuroCACS conference was in Copenhagen, Denmark. The special event,
Super Spy Me, was a hit with attendees.

682 Views • 2 years ago

VIDEO


CYBERSECURITY NEXUS (CSX) TRAINING & CERTIFICATIONS

ISACA International President Christos Dimitriadis discusses new cybersecurity
career resources.

2K Views • 2 years ago

VIDEO


CSX 2015: ISACA'S INAUGURAL CYBER SECURITY CONFERENCE

ISACA International President Christos Dimitriadis Invites You to CSX North
America 2015.

663 Views • 2 years ago

VIDEO


ISACA OVERVIEW

6K Views • 2 years ago

VIDEO


2014 ISACA ANNUAL REPORT OVERVIEW

ISACA marked a milestone year in 2014 by reaching its 45th anniversary. While we
are extremely proud of our history and accomplishments, we took this notable
year as an opportunity to look forward and position our organization for future
growth. We live in a world where change is an everyday event. We need to adapt,
innovate, lead with vision and create an impact. And most important, we need to
assure trust in everything we do and in every tool and piece of knowledge we
create. Take a look back at 2014.

505 Views • 2 years ago

VIDEO


RESOURCES FOR PRIVACY PROFESSIONALS

Learn more about the resources available from ISACA to help privacy
professionals.

153 Views • 2 years ago

VIDEO


COBIT 5, THE EDGE YOU HAVE BEEN WAITING FOR

440 Views • 2 years ago

VIDEO


NORTH AMERICA CACS 2015 | HIGHLIGHTS

ISACA members, IS audit, assurance, security and risk management and governance
professionals came together for North America CACS 2015. See video highlights
from the conference.

215 Views • 2 years ago

VIDEO


JOIN US FOR COBIT CONFERENCE IN MARCH 2015

IT audit, assurance, security and risk management and governance professionals
join together to expand networks and build onto their COBIT knowledge and
skills. Join them in March 2015 in Orlando, Florida.

139 Views • 2 years ago

VIDEO


UPDATE FROM ISACA’S CYBERSECURITY NEXUS (CSX)

ISACA International President Robert Stroud shares a cybersecurity update from
ISACA’s Cybersecurity Nexus (CSX).

1K Views • 2 years ago

VIDEO


ISACA'S 2014 IT RISK/REWARD BAROMETER

ISACA International President Robert Stroud shares global survey findings on the
Internet of Things, wearable tech in the workplace, and other key business/IT
trends.

353 Views • 2 years ago

VIDEO


CYBERSECURITY AWARENESS MONTH

Robert E Stroud, CGEIT, CRISC, 2014-2015 ISACA International President talks
about cybersecurity awareness month.

639 Views • 2 years ago

VIDEO


COBIT 5 BENEFITS

Robert E Stroud, CGEIT, CRISC, 2014-2015 ISACA International President talks
about the benefits of COBIT 5.

628 Views • 2 years ago

VIDEO


COBIT ONLINE BENEFITS

Robert E Stroud, CGEIT, CRISC, 2014-2015 ISACA International President talks
about COBIT 5 online - a brand new way to access and use the COBIT guidance.

310 Views • 2 years ago

VIDEO


ISACA 2014 EUROCACS/ISRM CONFERENCE

Robert E Stroud, CGEIT, CRISC, 2014-2015 ISACA International President, invites
you to the ISACA 2014 EuroCACS ISRM Conference.

188 Views • 2 years ago

VIDEO


BHAVESH BHAGAT: COMMUNICATING TECH TRENDS TO BOARDS

Bhavesh Bhagat, CEO/founder of Confident Governance and member of ISACA's
Emerging Business and Technology Committee, discusses how critical it is to
communicate to boards about emerging trends and technologies that can benefit
enterprises.

319 Views • 2 years ago

VIDEO


INTRODUCING: COBIT 5 ONLINE

COBIT 5 online makes COBIT even more practical and easier to use, and provides
industry and COBIT news and insights. While the full capabilities of COBIT
online will be released in August (including customizable goals cascade and RACI
tools), today's version immediately simplifies the process of navigating,
searching and exporting the principles, practices, analytical tools and models
that make COBIT 5 a key resource for the governance and management of enterprise
IT. Learn more and begin using COBIT online here: http://ow.ly/wQkuR

1K Views • 2 years ago

VIDEO


LOOKING BACK AT ISACA'S NORTH AMERICA CACS 2014 CONFERENCE

More than 90 presenters and 1,000 attendees gathered in Las Vegas for ISACA's
2014 North America CACS Conference last month. Topics ranging from BYOD and
audit analytics to career management and cybersecurity guidance helped attendees
prepare for the latest issues affecting our field. During the conference, ISACA
launched its new Cybersecurity Nexus program and previewed the upcoming online
version of COBIT 5. ISACA's Young Professionals were given VIP treatment at a
Spazmatics concert at the House of Blues, and photographers snapped free
headshots so attendees could update their ISACA and social media profile
pictures. Keynotes Harry Markopolos (Bernie Madoff whistle-blower) and Mike
Mullane (NASA shuttle astronaut) provided attendees with key insights on fraud
prevention and leadership. "To me, North America CACS is one of the best
conferences available," surmised Ferry Harris. "The energy level is high and
throughout three days I learned a great deal from experts and by networking with
other participants."

430 Views • 2 years ago

VIDEO


INTRODUCING: CYBERSECURITY NEXUS

In enterprise IT, there is a single point where everything that matters in
information, technology and business converges: Cybersecurity Nexus (CSX), a new
security knowledge platform and professional program from ISACA. CSX is helping
shape the future of cybersecurity through cutting-edge thought leadership, as
well as training and certification programs for the professionals who are
leading it there. Building on the strength of ISACA's globally-recognized
expertise, it gives cybersecurity professionals a smarter way to keep
organizations and their information more secure. With CSX, business leaders and
cyber professionals can obtain the knowledge, tools, guidance and connections to
be at the forefront of a vital and rapidly changing industry. Because
Cybersecurity Nexus is at the center of everything that's coming next.
http://www.isaca.org/cyber

29K Views • 2 years ago

VIDEO


CYBERSECURITY NEXUS GROUP PHOTO TIMELAPSE

Want to see how ISACA captured that CSX group photo? Take a look...

468 Views • 2 years ago

VIDEO


ISACA SLOVENSKO CHAPTER ANNIVERSARY MESSAGE

ISACA Slovensko Chapter President Peter Borak shares his thoughts on the 15th
anniversary of the group. Congratulations on this milestone, Slovensko!

201 Views • 2 years ago

VIDEO


THE BENEFITS OF CRISC: TROY STAIRWALT

Troy Stairwalt explains why he obtained ISACA's CRISC certification and details
the benefits he receives from it.

1K Views • 2 years ago

VIDEO


WHY DO YOU USE ISACA'S KNOWLEDGE CENTER?

ISACA members explain why they use the Knowledge Center.

225 Views • 2 years ago

VIDEO


TICHAONA ZORORO ON THE VALUE OF ISACA MEMBERSHIP

ISACA volunteer Tichaona Zororo describes the benefits he receives as an
association member.

1K Views • 2 years ago

VIDEO


CAPTAIN RICHARD PHILLIPS AT ISACA'S ISRM

Captain Phillips previews his presentation at ISACA's North America ISRM
Conference.

137 Views • 2 years ago

VIDEO


JACK CALLAGHAN ON BIG DATA AT ISACA'S NORTH AMERICA ISRM CONFERENCE

Live from ISACA's North America ISRM Conference, Jack Callaghan provides a
preview of his presentation.

125 Views • 2 years ago

VIDEO


RENEE MURPHY PREVIEWS NA ISRM PRESENTATION

252 Views • 2 years ago

VIDEO


BHAVESH BHAGAT ON EMERGING TECHNOLOGIES

Confident Governance Founder/CEO Bhavesh Bagat, a member of ISACA's Emerging
Business and Technology Committee, discusses emerging technologies,

265 Views • 2 years ago

VIDEO


ISACA EUROCACS/ISRM 2013 CONFERENCE REVIEW

Take a look back at ISACA's EuroCACS/ISRM 2013 conference in London, England.
Then view the invite to EuroCACS/ISRM 2014 in Barcelona, Spain.

268 Views • 2 years ago

VIDEO


ISACA/THE IIA'S GOVERNANCE, RISK AND CONTROL CONFERENCE 2013 RECAP

Take a look back at the Governance, Risk and Control 2013 conference, cohosted
by ISACA and The IIA in Phoenix, Arizona.

211 Views • 2 years ago

VIDEO


ISACA'S COBIT AND CISA IN THE MAURITIUS GOVERNMENT

ISACA Mauritius Chapter President Kris Seeburn explains how his government is
using COBIT and CISA.

719 Views • 2 years ago

VIDEO


EDDIE SCHWARTZ INVITES YOU TO ISACA'S NORTH AMERICA ISRM

Eddie Schwartz, chief information security officer for RSA, will deliver the
opening keynote address at ISACA's North America Information Security and Risk
Management conference this November in Las Vegas. Here, he invites you to join
him.

215 Views • 2 years ago

VIDEO


INVITATION TO 2013 GOVERNANCE, RISK AND CONTROL CONFERENCE

Nelson Gibbs invites you to join him at the 2013 Governance, Risk and Control
2013 conference in Phoenix, Arizona, co-hosted by ISACA and The IIA.

134 Views • 2 years ago

VIDEO


PREVIEW: COBIT 5 FOR RISK

Elza Adams describes his work with COBIT 5 for Risk and previews the framework.

1K Views • 2 years ago

VIDEO


INSIGHTS 2013 SLIDESHOW

INSIGHTS 2013 was a great success. Here, we take a look back.

170 Views • 2 years ago

VIDEO


ISACA STUDENT ACADEMIC SUBCOMMITTEE

Dr. Hubert Glover, ISACA Student Academic Subcommittee chair, details the
group's mission to welcome more students to the association.

205 Views • 2 years ago

VIDEO


LIVE FROM INSIGHTS 2013

ISACA volunteer and CA Technologies Vice President Robert Stroud shares
highlights of ISACA's INSIGHTS 2013 conference in Berlin.

101 Views • 2 years ago

VIDEO


ISACA'S NORTH AMERICA CACS 2013 SLIDESHOW

ISACA's North America CACS 2013 conference in Dallas, Texas was a great success.
Here we take a look back in pictures. To learn more about all of ISACA's
conferences, visit www.isaca.org.

311 Views • 2 years ago

VIDEO


WE ARE ISACA

For more than 40 years, ISACA has been a pace-setting global organization for
information governance, control, security and audit professionals. View this
video to get to know ISACA and visit us at www.isaca.org.

10K Views • 2 years ago

VIDEO


NORTH AMERICA CACS 2013 RECAP

ISACA's North America CACS 2013 conference welcomed more than 750 professionals
for three days of inspiration, education, networking and some Texas-sized fun.
Take a look...

316 Views • 2 years ago

VIDEO


NORTH AMERICA CACS TESTIMONIAL

Nelson Gibbs provides a highlight of today's sessions at ISACA's North America
CACS conference.

73 Views • 2 years ago

VIDEO


FROM INSIGHTS 2012, ROB STROUD LOOKS AHEAD TO INSIGHTS 2013

While in San Francisco during ISACA's INSIGHTS 2012 conference, Rob Stroud
looked ahead to INSIGHTS 2013, taking place this June in Berlin, Germany. Learn
more about INSIGHTS 2013 here:
http://www.isaca.org/Education/Conferences/Pages/INSIGHTS-2013.aspx

186 Views • 2 years ago

VIDEO


IT CHALLENGES AND OPPORTUNITIES IN 2013

At a recent ISACA conference, we asked attendees about the key business/tech
issues, challenges and opportunities facing them in 2013. Take a look.
www.isaca.org

502 Views • 2 years ago

VIDEO


LOOKING BACK AT ISRM, LOOKING AHEAD TO NORTH AMERICA CACS

Take a look back at ISACA's ISRM/IT GRC conference, held in Las Vegas, Nevada in
November. And consider joining ISACA at North America CACS, this April in
Dallas, Texas. http://ht.ly/gRTrB

261 Views • 2 years ago

VIDEO


ISACA AND ENISA DISCUSS SECURITY CHALLENGES AND OPPORTUNITIES

286 Views • 2 years ago

VIDEO


THE VALUE OF SMART IT GOVERNANCE

1K Views • 2 years ago

VIDEO


ISACA MEMBERSHIP

With 100,000+ constituents in 180 countries, ISACA is internationally recognized
as a high-performing nonprofit, independent membership association, that
addresses global, national and local information systems and business issues
related to IT Governance, IT Audit, IT Security and IT Risk.

4K Views • 2 years ago

VIDEO


CRISC IS THE CERTIFICATION FOR RISK PROFESSIONALS

CRISC is the only certification that prepares and enables IT professionals for
the unique challenges of IT and enterprise risk management, and positions them
to become strategic partners to the enterprise.

42K Views • 2 years ago

VIDEO


EL VICEPRESIDENTE DE ISACA LE INVITA A LA CONFERENCIA CACS/ISRM 2012 EN
LATINOAMÉRICA

Luis Carselle, Vicepresidente de ISACA, le invita a la Conferencia CACS/ISRM
2012 en Latinoamérica.

381 Views • 2 years ago

VIDEO


CISM SECURITY MANAGEMENT CERTIFICATION OPENS DOORS

Garry Barnes, managing consultant at stratsec, discusses how the CISM
certification helps open doors to gain new career and business opportunities.

2K Views • 2 years ago

VIDEO


CRISC: POSITIONING RISK AND CONTROL PROFESSIONALS FOR GROWTH

Shawna Flanders, Productivity Specialist at PSCU Financial Services, discusses
how the CRISC certification from ISACA can help Risk and Control professionals
advance their careers.

1K Views • 2 years ago

VIDEO


INTRODUCING COBIT 5

IT is complicated. IT Governance doesn't have to be. COBIT 5 for Business
Management and Governance of Enterprise IT.

211K Views • 2 years ago

VIDEO


COBIT 5 - GOVERN AND MANAGE ENTERPRISE IT

ISACA International President Ken Vander Wal discusses the 5 Principles of COBIT
5 and how the framework helps Govern and Manage Enterprise IT.

9K Views • 2 years ago

VIDEO


ISACA CHINA HONG KONG CHAPTER CELEBRATES 30 YEARS

ISACA International President, Ken Vander Wal, congratulates the ISACA China
Hong Kong Chapter on its 30 year anniversary.

159 Views • 2 years ago

VIDEO


THE BUSINESS BENEFITS OF COBIT 5

Derek Oliver, Member of the ISACA Framework Committee and Director at Ravenswood
Consultants UK, discusses the business benefits of using COBIT 5.

1K Views • 2 years ago

VIDEO


U.S. EMPLOYEES REVEAL SECURITY CONCERNS OVER ONLINE SHOPPING HABITS

Ken Vander Wal, ISACA International President, discloses security concerns from
U.S. employees over online shopping habits uncovered in the 2011 ISACA Shopping
on the Job Survey.

193 Views • 2 years ago

VIDEO


INSIGHTS FROM ISACA'S RISK REWARD BAROMETER

Brian Barnier, Principal of ValueBridge Advisors discusses the insights from
ISACA's Risk Reward Barometer.

199 Views • 2 years ago

VIDEO


COBIT 5: AN INTRODUCTION

John Lainhart, Partner IBM Global Business Solutions and Co-chair ISACA's COBIT
5 Task Force, discusses the upcoming release of COBIT 5.

5K Views • 2 years ago

VIDEO


GET INVOLVED

Todd Weinman, President of The Weinman Group, discusses how his involvement with
ISACA has benefitted both his professional career and personal life.

219 Views • 2 years ago

VIDEO


THREE REASONS TO VOLUNTEER FOR ISACA

Matt Snider, Manager IT Assurance Services, discusses the benefits he received
by volunteering for ISACA.

271 Views • 2 years ago

VIDEO


THE VALUE OF BMIS

Ramses Gallego, General Manager of Entel Security and Risk Management at Entel
IT Consulting discusses the value of the BMIS framework. The Business Model for
Information Security is a framework available from ISACA.

1K Views • 2 years ago

VIDEO


THE VALUE OF ISACA NETWORKING

ISACA members discuss the value of networking with other members and IT
professionals both locally and around the world.

147 Views • 2 years ago

VIDEO


THE VALUE OF ISACA CREDENTIALS

ISACA certification holders discuss the value of CISA, CISM, CGEIT and CRISC
certifications.

1K Views • 2 years ago

VIDEO


THE VALUE OF CRISC

Bruce Wilkins, CEO and President of TWM Associates Inc., talks about the value
of the CRISC certification.

1K Views • 2 years ago

VIDEO


IT KNOWLEDGE CENTER

Marc Vael discusses the value of the ISACA Knowledge Center, which offers
forums, discussions, blogs, research and white papers for IT Professionals in
the fields of IT Governance, IT Auditing, IT Security and IT Risk.

273 Views • 2 years ago

VIDEO


MOBILE DEVICE RISKS AND BENEFITS

Mark Lobel, Partner at PricewaterhouseCoopers, discusses the Risks and Benefits
of Mobile Devices and what companies can do to educate their employees about
internet safety.

346 Views • 2 years ago

VIDEO


ONLINE SHOPPING RISKS

John Pironti, President of IP Architects, discusses Online Shopping Risks and
what measures companies can take to educate their employees on internet safety.

892 Views • 2 years ago

VIDEO


IT PROFESSIONAL DEVELOPMENT

ISACA provides professional development to IT professionals engaged in IT audit,
security, governance and risk.

283 Views • 2 years ago

VIDEO


IT COMMUNITY AND LEADERSHIP

ISACA provides a community and leadership for IT professionals engaged in IT
audit, security, governance, assurance and risk.

166 Views • 2 years ago

VIDEO


IT RESEARCH AND KNOWLEDGE

ISACA provides IT research and knowledge related to IT audit, security,
governance and risk.

476 Views • 2 years ago

VIDEO


CONNECT BUSINESS PROCESSES TO IT GOVERNANCE FOR BETTER SERVICE DELIVERY

249 Views • 2 years ago

VIDEO


I AM A CISM - CERTIFIED INFORMATION SECURITY MANAGER

Testimonials on the benefits of being a CISM. Certified Information Security
Manager.

5K Views • 2 years ago

VIDEO


I AM A CGEIT - CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT

Testimonials on the benefits of being a CGEIT. Certified in the Governance of
Enterprise IT.

4K Views • 2 years ago

VIDEO


ISACA CPE - IT CONTINUING PROFESSIONAL EDUCATION

ISACA offers Continuing Professional Education credits for CISA, CISM, CGEIT and
CRISC certifications.

806 Views • 2 years ago

VIDEO


I AM A CISA - CERTIFIED INFORMATION SYSTEMS AUDITOR

Testimonials on the benefits of being a CISA. Certified Information Systems
Auditor.

12K Views • 2 years ago

VIDEO


ISACA'S 50TH ANNIVERSARY CELEBRATION HIGHLIGHTS

ISACA celebrated its 50th anniversary throughout 2019 while looking ahead to an
even more promising future.

836 Views • 4 years ago

VIDEO


ISACA IN THE 1970S

Take a look back at ISACA during the 1970s, a time when the association
established its roots in the IT community and marked many milestones, including
the hire of its first employee, the launch of its first national conference, the
opening of its first international chapter and the introduction of the CISA
certification. Learn how you can be part of the celebration!
http://bit.ly/2EV5oRZ

1K Views • 5 years ago

VIDEO


ISACA IN THE 1980S

Revisit the 1980s, when the association, then known as EDPAA, continued to
expand, increasing its number of conferences and chapters, as well as marking
the milestone of its first CISA certification exam. Find out how you can be part
of the ISACA50 celebration! http://bit.ly/2EU2xsC

781 Views • 5 years ago

VIDEO


ISACA IN THE 2000S

As ISACA entered into the new millennium, it successfully navigated Y2K,
provided impactful guidance around Sarbanes-Oxley, and introduced its CISM and
CGEIT certifications, while growing its membership to 186 chapters in 77
countries. Find out how you can be part of the ISACA50 celebration!
http://bit.ly/2EV2A7t

388 Views • 5 years ago

VIDEO


ISACA IN THE 1990S

During the 1990s, the association celebrated its 25th anniversary and changed
its name from EDPAA to ISACA. ISACA also introduced COBIT to help professionals
govern and manage enterprise IT. Learn how you can be part of the celebration!
http://bit.ly/2ERwmKp

444 Views • 5 years ago

VIDEO


ISACA IN THE 2010S

In a decade marked by increased cyber threats, ISACA introduced its CRISC
certification and launched Cybersecurity Nexus (CSX) for cybersecurity
professionals. The association has continued to expand with its acquisition of
CMMI Institute, new international office in Beijing, and a new headquarters in
Schaumburg, Illinois, as well as to reach its members in new ways, including
through the introduction of the SheLeadsTech program. Learn how you can be part
of the celebration! http://bit.ly/2EUkLtS

530 Views • 5 years ago

VIDEO


CERTIFICATION THROUGH THE YEARS

Take a look back at the history of ISACA’s certifications for IT audit,
security, governance and risk professionals—CISA, CISM, CGEIT, CRISC and CSXP—
and listen to ISACA members reflect on the impact the certifications have had on
their careers. Find out how you can be part of the ISACA50 celebration!
http://bit.ly/2EW3AYK

589 Views • 5 years ago

VIDEO


CYBERSECURITY

ISACA has provided an array of resources to help its professional community
adapt to the challenging cybersecurity landscape, including through its launch
of the Cybersecurity Nexus (CSX) and the introduction of its CSXP credential.
Learn how you can be part of the celebration! http://bit.ly/2EX9eKc

1K Views • 5 years ago



 * 
 * 
 * 
 * 
 * 

 * Contact Us
 * Terms
 * Privacy
 * Cookie Notice
 * Cookie Settings
 * Fraud Reporting
 * Bug Reporting

1700 E. Golf Road, Suite 400, Schaumburg, Illinois 60173,
USA  |  +1-847-253-1545  |  ©2024 ISACA. All rights reserved.


ISACA COOKIE CONSENT INFORMATION

This website uses information gathering tools including cookies, and other
similar technology. We use cookies to personalize content and ads, to provide
social media features and to analyze our traffic. We also share information
about your use of our site with our social media, advertising and analytics
partners. Ad and Cookie Policy
Cookie Settings Deny All Cookies Accept All Cookies



COOKIE SETTINGS



Your Opt Out Preference Signal is Honored


 * YOUR ISACA COOKIE PRIVACY...


 * STRICTLY NECESSARY COOKIES


 * PERFORMANCE COOKIES


 * FUNCTIONAL COOKIES


 * TARGETING COOKIES

YOUR ISACA COOKIE PRIVACY...

When you visit our website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information

User ID: ff57f258-5012-4280-b976-0117e816fa29
This User ID will be used as a unique identifier while storing and accessing
your preferences for future.
Timestamp: --



STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies


These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.    All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies


These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages.    If you do not allow these cookies then
some or all of these services may not function properly.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies


These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Cookies Details‎
Back Button


COOKIE LIST

Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Clear
checkbox label label
Apply Cancel
Confirm My Choices
Deny All Allow All