ISACA Podcast
Risk After COVID-19: A New Workforce

Risk After COVID-19: A New Workforce

February 22, 2021

The COVID-19 pandemic has prompted massive changes within the modern workforce, providing risk assurance and audit professionals a unique opportunity to assess how they approach the risk framework. In this podcast, ISACA® Journal columnist Cindy Baxter discusses how technology shapes behavior, what tips information systems professionals can use for success and what risk will look like post-pandemic.

The Perils of Overlooking Physical Security

The Perils of Overlooking Physical Security

February 4, 2021

With today’s advanced cloud capabilities, cybersecurity is an obvious priority at many organizations. But that can leave physical security diminished or outright neglected. In this episode of the podcast, security experts Dustin Brewer and Frank Downs discuss what makes it so important to secure physical assets and how enterprises can do so effectively.

Assessing the Ethical Implications of Information Technology

Assessing the Ethical Implications of Information Technology

January 27, 2021

IT enterprises with strong ethical frameworks are successful not only in making a greater, more positive impact on society, but in terms of financial and reputational status as well. To achieve this, however, organizations must be able to involve everyone from entry-level staff to executive leadership, all while anticipating scenarios that could occur in the future. In this episode of the ISACA® Podcast, ISACA® Journal columnist Ian Cooke explains the risk zones of the Ethical Operating System, the impact of bias upon ethics, the role of automated technology within an ethical context and more.

What Makes a Threat an APT?

What Makes a Threat an APT?

December 22, 2020

APTS are typically driven by experienced cyberactors, significant funding and a target that possesses extremely sensitive data. The depth of these threats means that virtually no enterprise is immune, even those which have implemented highly sophisticated cybersecurity measures. In this podcast, ISACA® security experts Dustin Brewer and Frank Downs discuss how to identify APTs, what makes them unique and how any organization can fall victim to such a threat.

Exploring the Push for Zero Trust

Exploring the Push for Zero Trust

December 16, 2020

Increasing pressure on many organizations to meet compliance requirements has resulted in a push to adopt a zero trust approach. But for implementation to be successful, enterprises must obtain a thorough understanding of the nuances of the framework. In this episode of the ISACA® Podcast, sponsored by Vanguard Integrity Professionals, Brian Marshall and Milt Rosberg from Vanguard Integrity Professionals discuss why it is important to “trust nobody and verify everybody” from a security perspective, how to get stakeholder buy-in, what makes internal threats particularly dangerous and more.

The Microcomputing Revolution

The Microcomputing Revolution

December 3, 2020

Since its conception, microcomputing has made waves in the open source community, providing an accessible and relatively user-friendly way for technology owners to create their own amateur smart devices before mass-manufactured ones hit the market. Rather than investing in an expensive, highly controlled computer setup, microcomputing offered users a low-cost, highly customizable method of achieving wireless access. In this podcast, ISACA® security experts Dustin Brewer and Frank Downs discuss how microcomputing has evolved and the many ways it can be used.

Strategies for Securing Remote Technology

Strategies for Securing Remote Technology

November 11, 2020

The dust of the COVID-19 pandemic has begun to settle and professionals around the globe are now more comfortable with the realities of remote work. Yet even increased familiarity with working from home still leaves room for security threats to arise. In this podcast, Edward Morse and Vasant Raval, authors of the ISACA® Journal, vol. 5 article “Working From Home—Reassessing Risk and Opportunities,” discuss how enterprises can evaluate the risk of remote software and devices, describe the most effective ways to secure home technology and consider what parts of working from home are here to stay even beyond the pandemic.

Managing Malware Threats

Managing Malware Threats

November 4, 2020

Phishing emails and dangerous links are among the most pervasive threats to cybersecurity, capable of targeting everyone from seemingly impenetrable government organizations to college students’ university email accounts. The COVID-19 pandemic has only worsened the malware problem, as malicious hackers attempt to impersonate health authorities to steal personal information through social engineering. In this podcast, ISACA security experts Dustin Brewer and Frank Downs discuss malware: what it is, what forms it can take and how it spreads.

The Evolution of Wi-Fi

The Evolution of Wi-Fi

October 15, 2020

Once a technological marvel, the idea of a wireless connection to the Internet has become so engrained in the digital world that it is hard to fathom a time when that was not the case. But just because Wi-Fi has gone mainstream does not mean it is static. In this episode of the Cyber Pros Exchange series, security experts Dustin Brewer and Frank Downs consider the history of Wi-Fi, how it reached its position today and why it’s so important that it be secured properly.

Why You Need a Proactive Approach to Risk

Why You Need a Proactive Approach to Risk

October 14, 2020

The wave of remote working arrangements implemented as a response to the COVID-19 pandemic has introduced new and often unpredictable IT vulnerabilities. This has made it all the more important to identify Key Risk Indicators, or KRIs, as a method of providing a warning before risk can develop any further. In this episode of the ISACA Podcast, sponsored by Galvanize, Greg Slayton discusses ways that the pandemic has stretched technology’s limits and how organizations can use KRIs to restore proper risk management.

Play this podcast on Podbean App