Understanding an organization’s culture is essential when building a cybersecurity program. But how can security professionals learn about the culture, and how should that drive security programs? In this podcast, we discuss how to build a strong cybersecurity culture, how to leverage the organization’s culture when developing security initiatives and strategies to overcome impediments to a cyberculture.
Complex interdependencies in the supply chain and elsewhere can make assessing risk difficult, particularly when it comes to protecting critical infrastructure. In this episode of the ISACA Podcast, guest Charlie Harry provides his perspective on how governments and organizations can overcome these challenges.
To tackle the complex challenges of the cyberlandscape, strong leaders are needed. But what makes someone a leader, and what should be expected of leaders? In this podcast, Matt Doan discusses how to be a leader, why more cyberleaders are necessary and why it’s beneficial to think of cybersecurity in an ecosystem context. Share your thoughts on the podcast here https://www.research.net/r/9GR6F2D
An unsophisticated attack on industrial control systems can halt the operations of manufacturing plants, resulting in lost revenue and reputational harm. But a few simple steps can help organizations prevent attacks from happening and recover quickly when they do occur. In this podcast, we discuss the steps organizations can take to secure their operations. Share your opinions about the ISACA Podcast here: https://www.research.net/r/9GR6F2D
Many organizations are intimidated by the dark web or don't think they have the needed expertise to counter security threats that originate there. In this episode of the ISACA Podcast, recorded from the Infosecurity-ISACA North America Expo and Conference, conference presenter Alex Holden makes the case for why organizations need to prioritize understanding the dark web, and explains how they can go about doing it.
Computer-assisted audit tools can help auditors improve testing and more efficiently deal with the barrage of data being created these days. Infosecurity-ISACA North America Expo and Conference presenter Rochelle Vargas discusses why she considers these tools to be game-changers for auditors.
Learning and certification have been at the heart of ISACA's 50-year history, but many of the ways in which technology professionals have pursued industry expertise have changed with the times. Guest Allan Boardman provides his perspective on what has changed and what has stayed constant for learners in ISACA's professional community.
The use of VPNs is often touted as a strong security measure, but what happens when the VPN service you use is compromised? In this podcast, Dustin Brewer and Frank Downs discuss the recent NordVPN hack, the importance of pen testing and auditing, and lessons learned from the incident. Share your opinions about the ISACA Podcast here: https://www.research.net/r/9GR6F2D
The misconceptions about why women are underrepresented in the tech workforce are numerous – some cling to the notion that girls and women aren't as interested or proficient in tech fields, despite plenty of evidence to the contrary. In this SheLeadsTech Series episode of the ISACA Podcast, guest Beverly Allen addresses some of the misconceptions about the gender gap in technology fields such as cybersecurity.
Every organizations uses suppliers, and these suppliers (while adding value) also can pose a risk. In this podcast, Mark Thomas discusses some of the main challenges organizations face when managing their vendor and supplier risk, how to use COBIT to govern and manage this risk, and how organizations not using COBIT can put the tips presented in this podcast into practice. Share your opinions about the ISACA Podcast here: https://www.research.net/r/9GR6F2D