540.3K
Downloads
305
Episodes
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
Episodes
Wednesday Jun 16, 2021
Just the Fax on Cybersecurity
Wednesday Jun 16, 2021
Wednesday Jun 16, 2021
Is your home printer or fax machine an IOT device? You bet it is! Dubbed ‘Faxploit’, research has shown how cyber criminals can infiltrate any home or corporate network by exploiting wireless printers and fax machines. A fax numbers is all it takes to launch this type of attack.
Listen in as Cyber Pros, Dustin Brewer and Frank Downs discuss the need for these home devices, how—they too—are at risk of being hacked and their best suggestions on how to mitigate this vulnerability.
So fill your paper tray, test your fax connection and press play …it’s time for a Cyber Pros breakdown!
Tuesday May 18, 2021
Supply Chain Security Considerations
Tuesday May 18, 2021
Tuesday May 18, 2021
The computer chip shortage resulting from the COVID-19 pandemic may sound like a mere supply chain issue, but the ramifications of it have also been felt in the cybersecurity sector. In this episode of the ISACA® Podcast, sponsored by ESET, security experts Dustin Brewer and Frank Downs explore the impact of the ongoing computer chip shortage and discuss what makes it a concern from both a security and a business operations perspective.
Tuesday May 18, 2021
The Relationship Between Privacy and Research
Tuesday May 18, 2021
Tuesday May 18, 2021
Volunteering to participate in medical research is a commendable act of service, but to do so can understandably raise questions about subject privacy. In this episode of the ISACA® Podcast, ISACA® Journal columnist Cindy Baxter discusses how patient privacy has changed in the digital age and explores ways that auditors can conduct better audits of privacy programs within research organizations.
Wednesday May 05, 2021
Pursuing Risk Resilience
Wednesday May 05, 2021
Wednesday May 05, 2021
To survive—and thrive—after a digital transformation, organizations must establish a robust resilience program. In this episode of the ISACA® Podcast, sponsored by ServiceNow, Risk Solutions Specialist Brandon Reese explains how to navigate the path to resilience by continuously monitoring compliance, creating cross-functional workflows and embedding risk awareness throughout the entire enterprise. To access the ServiceNow webinar on which this podcast is based, visit the Future of Data Protection, Privacy and IT Risk Management page of the ISACA website.
Tuesday Apr 06, 2021
The State of Cryptocurrency
Tuesday Apr 06, 2021
Tuesday Apr 06, 2021
Cryptocurrency has helped make blockchain technology mainstream, lauded by the general public for its decentralizing capabilities and in the cybersecurity space due to its integrity and self auditing. In this episode of the ISACA® Podcast, sponsored by ESET, security experts Dustin Brewer and Frank Downs discuss how and why cryptocurrency has been so widely adopted and predict where they think it will go next.
Monday Mar 29, 2021
Diversifying the Security Hiring Pool
Monday Mar 29, 2021
Monday Mar 29, 2021
It is no secret that there has long been a gap in the cybersecurity workforce. But enterprises can take a step toward filling it by looking to nontraditional candidates, according to Adobe’s Director of Application Security, David Lenoe. In this episode of the ISACA® Podcast, sponsored by Adobe, Lenoe discusses how enterprises can diversify the talent and hiring pool for security, including best practices and tips for attracting great candidates, and gives advice to professionals that may not have traditional security experience but are hoping to break into the field.
Tuesday Mar 09, 2021
Remote Access Tools From a Hacker Perspective
Tuesday Mar 09, 2021
Tuesday Mar 09, 2021
Remote access tools can be an IT blessing, allowing tech support to quickly and remotely troubleshoot computer problems while reducing the need for lengthy conversations with confused employees. But just as remote access can be used for good, malicious cyberactors can leverage it to cause financial or even biological harm. In this episode of the ISACA® Podcast, security experts Dustin Brewer and Frank Downs explore different ways remote access tools can be exploited and how it can be avoided.
Monday Feb 22, 2021
Risk After COVID-19: A New Workforce
Monday Feb 22, 2021
Monday Feb 22, 2021
The COVID-19 pandemic has prompted massive changes within the modern workforce, providing risk assurance and audit professionals a unique opportunity to assess how they approach the risk framework. In this podcast, ISACA® Journal columnist Cindy Baxter discusses how technology shapes behavior, what tips information systems professionals can use for success and what risk will look like post-pandemic.
Thursday Feb 04, 2021
The Perils of Overlooking Physical Security
Thursday Feb 04, 2021
Thursday Feb 04, 2021
With today’s advanced cloud capabilities, cybersecurity is an obvious priority at many organizations. But that can leave physical security diminished or outright neglected. In this episode of the podcast, security experts Dustin Brewer and Frank Downs discuss what makes it so important to secure physical assets and how enterprises can do so effectively.
Wednesday Jan 27, 2021
Assessing the Ethical Implications of Information Technology
Wednesday Jan 27, 2021
Wednesday Jan 27, 2021
IT enterprises with strong ethical frameworks are successful not only in making a greater, more positive impact on society, but in terms of financial and reputational status as well. To achieve this, however, organizations must be able to involve everyone from entry-level staff to executive leadership, all while anticipating scenarios that could occur in the future. In this episode of the ISACA® Podcast, ISACA® Journal columnist Ian Cooke explains the risk zones of the Ethical Operating System, the impact of bias upon ethics, the role of automated technology within an ethical context and more.