
576.7K
Downloads
313
Episodes
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
Episodes

Wednesday Mar 04, 2026
SheLeadsTech Fireside Chat: Celebrating Women in Cybersecurity
Wednesday Mar 04, 2026
Wednesday Mar 04, 2026
Women in cybersecurity leaders share their stories and career advice in this SheLeadsTech fireside chat celebrating International Women’s Day.
In celebration of International Women’s Day and Women’s History Month, ISACA’s SheLeadsTech initiative brings together three inspiring leaders in cybersecurity for a special fireside conversation.
Join Debbie Lew and Jo Stewart-Rattray, both ISACA Hall of Fame inductees and recipients of the Eugene Frank Founders Award, as they sit down with Gail Coury, who will be inducted into the ISACA Hall of Fame in 2026.
In this warm and engaging discussion, they reflect on their journeys into cybersecurity, the evolving role of women in technology, and the power of mentorship, leadership, and community in shaping the future of the profession.
In this episode, they discuss:
• Their personal paths into cybersecurity and IT
• How opportunities for women in tech have evolved over time
• Lessons learned from leadership and service within the ISACA community
• Advice for the next generation of women entering the field
The conversation wraps up with a fun rapid-fire round that offers a glimpse into the personalities behind these accomplished careers.
Whether you're an experienced professional or just beginning your journey in technology, this fireside chat offers inspiration, insight, and encouragement from women helping shape the future of cybersecurity.
🔗 Learn more about ISACA’s SheLeadsTech initiative:
https://www.isaca.org/membership/sheleadstech
🎧 Explore more ISACA Podcasts:
https://www.isaca.org/resources/news-and-trends/isaca-podcast-library
📺 Subscribe to ISACA on YouTube:
https://www.youtube.com/@IsacaHq
#WomenInCybersecurity
#SheLeadsTech
#WomenInTech

Tuesday Mar 03, 2026
Humans Are IT Security’s Weakest Link
Tuesday Mar 03, 2026
Tuesday Mar 03, 2026
📚 Related Resources & Stay Connected
📖 Read the full article:
Humans Are IT Security’s Weakest Link
https://www.isaca.org/resources/news-and-trends/industry-news/2024/humans-are-it-securitys-weakest-link
🎙 Explore More ISACA Podcast Episodes:
Dive deeper into cybersecurity, governance, risk, and emerging tech insights.
https://www.isaca.org/resources/news-and-trends/isaca-podcast-library
▶️ Subscribe to ISACA on YouTube:
Stay ahead with expert interviews, industry analysis, and cybersecurity leadership insights.
https://www.youtube.com/@IsacaHq
🔔 Don’t forget to like, comment, and subscribe for more conversations shaping the future of IT and cybersecurity.

Thursday Feb 19, 2026
Thursday Feb 19, 2026
You’re listening to Secure Your Privates™ brought to you by ISACA Podcasts - where security meets privacy, risk meets reality, and governance finally makes sense. We’re here to cut through the noise and get real about what’s actually happening in cyber. The no-BS podcast on security and privacy. We talk about what’s broken, what’s working, and what nobody’s telling you in between.

Thursday Feb 12, 2026
Securing Data in the Age of AI with DSPM: Lessons from a High-Impact ISACA Webinar
Thursday Feb 12, 2026
Thursday Feb 12, 2026
In this ISACA Podcast episode, host Safia Kazi, Principal Research Analyst – Privacy, is joined by Dirk Schrader, VP of Security Research at Netwrix, to discuss how generative AI is revealing long-standing gaps in enterprise data security and governance.
This episode builds on insights from a recent ISACA webinar that explored how generative AI is exposing weaknesses in enterprise data security and governance. The discussion examines why many organizations lack visibility into where sensitive data resides and who can access it, particularly across hybrid and cloud environments. The conversation also addresses emerging risks introduced by AI tools, including non-human access and overexposed data. Listeners will gain practical, governance-focused guidance on how DSPM helps organizations assess risk, support compliance, and prepare data responsibly for AI initiatives.
Related Resources:
-
Watch the ISACA Webinar from the ISACA Virtual Summit 2025: “Securing Data in the Age of AI with DSPM”
https://www.isaca.org/training-and-events/online-training/virtual-summits/ai-governance-strategies -
Learn more from Netwrix:
https://netwrix.com/en/resources/ -
Explore more ISACA Podcasts:
https://www.isaca.org/resources/news-and-trends/isaca-podcast-library -
ISACA on YouTube:
https://www.youtube.com/@IsacaHq

Thursday Sep 04, 2025
Elevate Your Career with Lauren Hasson
Thursday Sep 04, 2025
Thursday Sep 04, 2025
Lauren Hasson is the Founder of DevelopHer, an award-winning career development platform. In this podcast, she'll share a bit about her background and give a sneak peek at her upcoming CPE-eligible event.

Wednesday Jun 04, 2025
Cyberrisk Quantification: Strengthening Financial Resilience
Wednesday Jun 04, 2025
Wednesday Jun 04, 2025
In this episode, ISACA's Lisa Cook engages with Yakir Golan, Executive Officer (CEO) and Co-Founder of Kovrr, to explore the critical role of Cyberrisk Quantification (CRQ) in enhancing organizational financial resilience. They discuss how CRQ solutions provide objective assessments of an organization's cybersecurity posture, enabling leaders to make informed decisions that align risk mitigation strategies with business objectives. The conversation also highlights the importance of translating cyberrisk exposure into monetary terms to facilitate high-level discussions and protect shareholder confidence.
Listen & Subscribe Catch this episode—and more—on the ISACA Podcast Library: https://www.isaca.org/resources/news-and-trends/isaca-podcast-library
or on your favorite podcast platform.

Thursday May 15, 2025
Securing Desktops and Data from Ransomware Attacks
Thursday May 15, 2025
Thursday May 15, 2025
Ransomware remains one of the most formidable cybersecurity threats facing organizations worldwide.
In this episode of the ISACA Podcast, host Chris McGowan speaks with Netwrix endpoint protection expert Jeremy Moskowitz, who explains how ransomware infiltrates and cripples desktop environments. He explains cybercriminals' tactics to exploit social engineering and system misconfigurations to gain unauthorized access, offering actionable insights on the most effective prevention and mitigation strategies.
Additionally, Jeremy delivers practical advice that security teams can use to resist ransomware. He shares tips on safeguarding locally stored data, implementing robust backup solutions, enforcing strict access controls and system patching, and educating staff on common red flags associated with ransomware.
Listen & Subscribe to ISACA Podcast
Catch this episode—and more—on the ISACA Podcast Library
or on your favorite podcast platform.
Connect & Learn More about Netwrix
- Netwrix Data Loss Prevention Solution: Learn more
- Follow Netwrix on LinkedIn: Netwrix Corporation: Posts | LinkedIn
- Additional Resources Provided by Netwrix:

Tuesday Mar 11, 2025
Cyberresilience and Cybersecurity
Tuesday Mar 11, 2025
Tuesday Mar 11, 2025
Cybersecurity and the role of internal audit, an urgent call to action: The forces driving business growth and efficiency contribute to a broad attack surface for cyber assaults. How is the end user protected with good service while not being compromised?
- First Line includes internet, cloud, mobile, and social technologies, now mainstream, are platforms inherently oriented for sharing. Outsourcing, contracting, and remote workforces are shifting operational control.
- Second line includes information and technology risk management leaders who establish governance and oversight, monitor security operations, and take-action as needed, often under the direction of the chief information security officer (CISO)
- Third line of cyber defense—independent review of security measures and performance by the internal audit function. Internal audit should play an integral role in assessing and identifying opportunities to strengthen enterprise security. At the same time, internal audit has a duty to inform the audit committee and board of directors that the controls for which they are responsible are in place and functioning correctly, a growing concern across boardrooms as directors face potential legal and financial liabilities.

Tuesday Jan 07, 2025
Cybersecurity Predictions for 2025
Tuesday Jan 07, 2025
Tuesday Jan 07, 2025
The prevalence of ransomware and the security concerns associated with AI have made the role of cybersecurity professionals vital for enterprise success. The complex security landscape can make cybersecurity jobs stressful, but enterprises can take steps to retain cybersecurity talent and ensure enterprise assets are protected. In this podcast, Justin Rende, founder and CEO at Rhymetec, shares insight on the top concerns for cybersecurity professionals, the most in-demand skills, and the impact of AI on cybersecurity.

Tuesday Dec 10, 2024
Examining Authentication in the Deepfake Era with Dr. Chase Cunningham
Tuesday Dec 10, 2024
Tuesday Dec 10, 2024
Given the dynamic nature of cyberthreats and the ever-expanding digital ecosystem, authentication is more critical than ever. In this episode, ISACA director of professional practices and innovation discusses a new content piece titled, "Examining Authentication in the Deepfake Era" with author Dr. Chase Cunningham. Their conversation of the paper explores the evolution, current state, and future trajectory of authentication technologies.
