
574.2K
Downloads
313
Episodes
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
Episodes

Tuesday May 18, 2021
The Relationship Between Privacy and Research
Tuesday May 18, 2021
Tuesday May 18, 2021
Volunteering to participate in medical research is a commendable act of service, but to do so can understandably raise questions about subject privacy. In this episode of the ISACA® Podcast, ISACA® Journal columnist Cindy Baxter discusses how patient privacy has changed in the digital age and explores ways that auditors can conduct better audits of privacy programs within research organizations.

Wednesday May 05, 2021
Pursuing Risk Resilience
Wednesday May 05, 2021
Wednesday May 05, 2021
To survive—and thrive—after a digital transformation, organizations must establish a robust resilience program. In this episode of the ISACA® Podcast, sponsored by ServiceNow, Risk Solutions Specialist Brandon Reese explains how to navigate the path to resilience by continuously monitoring compliance, creating cross-functional workflows and embedding risk awareness throughout the entire enterprise. To access the ServiceNow webinar on which this podcast is based, visit the Future of Data Protection, Privacy and IT Risk Management page of the ISACA website.

Tuesday Apr 06, 2021
The State of Cryptocurrency
Tuesday Apr 06, 2021
Tuesday Apr 06, 2021
Cryptocurrency has helped make blockchain technology mainstream, lauded by the general public for its decentralizing capabilities and in the cybersecurity space due to its integrity and self auditing. In this episode of the ISACA® Podcast, sponsored by ESET, security experts Dustin Brewer and Frank Downs discuss how and why cryptocurrency has been so widely adopted and predict where they think it will go next.

Monday Mar 29, 2021
Diversifying the Security Hiring Pool
Monday Mar 29, 2021
Monday Mar 29, 2021
It is no secret that there has long been a gap in the cybersecurity workforce. But enterprises can take a step toward filling it by looking to nontraditional candidates, according to Adobe’s Director of Application Security, David Lenoe. In this episode of the ISACA® Podcast, sponsored by Adobe, Lenoe discusses how enterprises can diversify the talent and hiring pool for security, including best practices and tips for attracting great candidates, and gives advice to professionals that may not have traditional security experience but are hoping to break into the field.

Tuesday Mar 09, 2021
Remote Access Tools From a Hacker Perspective
Tuesday Mar 09, 2021
Tuesday Mar 09, 2021
Remote access tools can be an IT blessing, allowing tech support to quickly and remotely troubleshoot computer problems while reducing the need for lengthy conversations with confused employees. But just as remote access can be used for good, malicious cyberactors can leverage it to cause financial or even biological harm. In this episode of the ISACA® Podcast, security experts Dustin Brewer and Frank Downs explore different ways remote access tools can be exploited and how it can be avoided.

Monday Feb 22, 2021
Risk After COVID-19: A New Workforce
Monday Feb 22, 2021
Monday Feb 22, 2021
The COVID-19 pandemic has prompted massive changes within the modern workforce, providing risk assurance and audit professionals a unique opportunity to assess how they approach the risk framework. In this podcast, ISACA® Journal columnist Cindy Baxter discusses how technology shapes behavior, what tips information systems professionals can use for success and what risk will look like post-pandemic.

Thursday Feb 04, 2021
The Perils of Overlooking Physical Security
Thursday Feb 04, 2021
Thursday Feb 04, 2021
With today’s advanced cloud capabilities, cybersecurity is an obvious priority at many organizations. But that can leave physical security diminished or outright neglected. In this episode of the podcast, security experts Dustin Brewer and Frank Downs discuss what makes it so important to secure physical assets and how enterprises can do so effectively.

Wednesday Jan 27, 2021
Assessing the Ethical Implications of Information Technology
Wednesday Jan 27, 2021
Wednesday Jan 27, 2021
IT enterprises with strong ethical frameworks are successful not only in making a greater, more positive impact on society, but in terms of financial and reputational status as well. To achieve this, however, organizations must be able to involve everyone from entry-level staff to executive leadership, all while anticipating scenarios that could occur in the future. In this episode of the ISACA® Podcast, ISACA® Journal columnist Ian Cooke explains the risk zones of the Ethical Operating System, the impact of bias upon ethics, the role of automated technology within an ethical context and more.

Tuesday Dec 22, 2020
What Makes a Threat an APT?
Tuesday Dec 22, 2020
Tuesday Dec 22, 2020
APTS are typically driven by experienced cyberactors, significant funding and a target that possesses extremely sensitive data. The depth of these threats means that virtually no enterprise is immune, even those which have implemented highly sophisticated cybersecurity measures. In this podcast, ISACA® security experts Dustin Brewer and Frank Downs discuss how to identify APTs, what makes them unique and how any organization can fall victim to such a threat.

Wednesday Dec 16, 2020
Exploring the Push for Zero Trust
Wednesday Dec 16, 2020
Wednesday Dec 16, 2020
Increasing pressure on many organizations to meet compliance requirements has resulted in a push to adopt a zero trust approach. But for implementation to be successful, enterprises must obtain a thorough understanding of the nuances of the framework. In this episode of the ISACA® Podcast, sponsored by Vanguard Integrity Professionals, Brian Marshall and Milt Rosberg from Vanguard Integrity Professionals discuss why it is important to “trust nobody and verify everybody” from a security perspective, how to get stakeholder buy-in, what makes internal threats particularly dangerous and more.
