540.3K
Downloads
305
Episodes
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
Episodes
Tuesday Dec 22, 2020
What Makes a Threat an APT?
Tuesday Dec 22, 2020
Tuesday Dec 22, 2020
APTS are typically driven by experienced cyberactors, significant funding and a target that possesses extremely sensitive data. The depth of these threats means that virtually no enterprise is immune, even those which have implemented highly sophisticated cybersecurity measures. In this podcast, ISACA® security experts Dustin Brewer and Frank Downs discuss how to identify APTs, what makes them unique and how any organization can fall victim to such a threat.
Wednesday Dec 16, 2020
Exploring the Push for Zero Trust
Wednesday Dec 16, 2020
Wednesday Dec 16, 2020
Increasing pressure on many organizations to meet compliance requirements has resulted in a push to adopt a zero trust approach. But for implementation to be successful, enterprises must obtain a thorough understanding of the nuances of the framework. In this episode of the ISACA® Podcast, sponsored by Vanguard Integrity Professionals, Brian Marshall and Milt Rosberg from Vanguard Integrity Professionals discuss why it is important to “trust nobody and verify everybody” from a security perspective, how to get stakeholder buy-in, what makes internal threats particularly dangerous and more.
Thursday Dec 03, 2020
The Microcomputing Revolution
Thursday Dec 03, 2020
Thursday Dec 03, 2020
Since its conception, microcomputing has made waves in the open source community, providing an accessible and relatively user-friendly way for technology owners to create their own amateur smart devices before mass-manufactured ones hit the market. Rather than investing in an expensive, highly controlled computer setup, microcomputing offered users a low-cost, highly customizable method of achieving wireless access. In this podcast, ISACA® security experts Dustin Brewer and Frank Downs discuss how microcomputing has evolved and the many ways it can be used.
Wednesday Nov 11, 2020
Strategies for Securing Remote Technology
Wednesday Nov 11, 2020
Wednesday Nov 11, 2020
The dust of the COVID-19 pandemic has begun to settle and professionals around the globe are now more comfortable with the realities of remote work. Yet even increased familiarity with working from home still leaves room for security threats to arise. In this podcast, Edward Morse and Vasant Raval, authors of the ISACA® Journal, vol. 5 article “Working From Home—Reassessing Risk and Opportunities,” discuss how enterprises can evaluate the risk of remote software and devices, describe the most effective ways to secure home technology and consider what parts of working from home are here to stay even beyond the pandemic.
Wednesday Nov 04, 2020
Managing Malware Threats
Wednesday Nov 04, 2020
Wednesday Nov 04, 2020
Phishing emails and dangerous links are among the most pervasive threats to cybersecurity, capable of targeting everyone from seemingly impenetrable government organizations to college students’ university email accounts. The COVID-19 pandemic has only worsened the malware problem, as malicious hackers attempt to impersonate health authorities to steal personal information through social engineering. In this podcast, ISACA security experts Dustin Brewer and Frank Downs discuss malware: what it is, what forms it can take and how it spreads.
Thursday Oct 15, 2020
The Evolution of Wi-Fi
Thursday Oct 15, 2020
Thursday Oct 15, 2020
Once a technological marvel, the idea of a wireless connection to the Internet has become so engrained in the digital world that it is hard to fathom a time when that was not the case. But just because Wi-Fi has gone mainstream does not mean it is static. In this episode of the Cyber Pros Exchange series, security experts Dustin Brewer and Frank Downs consider the history of Wi-Fi, how it reached its position today and why it’s so important that it be secured properly.
Wednesday Oct 14, 2020
Why You Need a Proactive Approach to Risk
Wednesday Oct 14, 2020
Wednesday Oct 14, 2020
The wave of remote working arrangements implemented as a response to the COVID-19 pandemic has introduced new and often unpredictable IT vulnerabilities. This has made it all the more important to identify Key Risk Indicators, or KRIs, as a method of providing a warning before risk can develop any further. In this episode of the ISACA Podcast, sponsored by Galvanize, Greg Slayton discusses ways that the pandemic has stretched technology’s limits and how organizations can use KRIs to restore proper risk management.
Thursday Oct 08, 2020
Engineering an Effective Privacy Game Plan
Thursday Oct 08, 2020
Thursday Oct 08, 2020
Putting effective privacy measures into practice can be a difficult task for organizations that lack a comprehensive, well-documented privacy strategy. Without one, enterprises may be exposing customer data to vulnerabilities, and could find themselves at risk of noncompliance with privacy regulations. In this episode of the podcast, Tim Clements, a featured speaker at EuroCACS 2020, explains why every organization should be creating and implementing a privacy strategy, what is at risk if one does not exist and how to get started with creating one. Clements will host the EuroCACS session “Privacy Strategy and Roadmap—Do You Have One, and Is It Aligned With Your Business Strategy?” with Clara Kromann from Pandora on 28 October 2020.
Wednesday Oct 07, 2020
Finding the Human Factor in Work From Home
Wednesday Oct 07, 2020
Wednesday Oct 07, 2020
Once considered a privilege, remote work has become a necessity resulting from the public health risk posed by COVID-19. Telecommunication technologies such as video conferencing are core tools in the adoption of remote work, but virtual communication lacks the depth of in-person professional connections. In this episode of the ISACA Podcast, Vasant Raval and Edward Morse discuss how to make working from home productive, secure and personally fulfilling.
Wednesday Sep 23, 2020
Breaking Down Blockchain
Wednesday Sep 23, 2020
Wednesday Sep 23, 2020
At its core, blockchain functions to maintain the integrity of data and systems. But how does it compare to other databases and when should it be used? In this episode of the ISACA podcast, cybersecurity experts Dustin Brewer and Frank Downs define blockchain, explain how it relates to cryptocurrency and the cloud, and discuss applications where it may prove useful.