
574.2K
Downloads
313
Episodes
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
Episodes

Thursday Dec 03, 2020
The Microcomputing Revolution
Thursday Dec 03, 2020
Thursday Dec 03, 2020
Since its conception, microcomputing has made waves in the open source community, providing an accessible and relatively user-friendly way for technology owners to create their own amateur smart devices before mass-manufactured ones hit the market. Rather than investing in an expensive, highly controlled computer setup, microcomputing offered users a low-cost, highly customizable method of achieving wireless access. In this podcast, ISACA® security experts Dustin Brewer and Frank Downs discuss how microcomputing has evolved and the many ways it can be used.

Wednesday Nov 11, 2020
Strategies for Securing Remote Technology
Wednesday Nov 11, 2020
Wednesday Nov 11, 2020
The dust of the COVID-19 pandemic has begun to settle and professionals around the globe are now more comfortable with the realities of remote work. Yet even increased familiarity with working from home still leaves room for security threats to arise. In this podcast, Edward Morse and Vasant Raval, authors of the ISACA® Journal, vol. 5 article “Working From Home—Reassessing Risk and Opportunities,” discuss how enterprises can evaluate the risk of remote software and devices, describe the most effective ways to secure home technology and consider what parts of working from home are here to stay even beyond the pandemic.

Wednesday Nov 04, 2020
Managing Malware Threats
Wednesday Nov 04, 2020
Wednesday Nov 04, 2020
Phishing emails and dangerous links are among the most pervasive threats to cybersecurity, capable of targeting everyone from seemingly impenetrable government organizations to college students’ university email accounts. The COVID-19 pandemic has only worsened the malware problem, as malicious hackers attempt to impersonate health authorities to steal personal information through social engineering. In this podcast, ISACA security experts Dustin Brewer and Frank Downs discuss malware: what it is, what forms it can take and how it spreads.

Thursday Oct 15, 2020
The Evolution of Wi-Fi
Thursday Oct 15, 2020
Thursday Oct 15, 2020
Once a technological marvel, the idea of a wireless connection to the Internet has become so engrained in the digital world that it is hard to fathom a time when that was not the case. But just because Wi-Fi has gone mainstream does not mean it is static. In this episode of the Cyber Pros Exchange series, security experts Dustin Brewer and Frank Downs consider the history of Wi-Fi, how it reached its position today and why it’s so important that it be secured properly.

Wednesday Oct 14, 2020
Why You Need a Proactive Approach to Risk
Wednesday Oct 14, 2020
Wednesday Oct 14, 2020
The wave of remote working arrangements implemented as a response to the COVID-19 pandemic has introduced new and often unpredictable IT vulnerabilities. This has made it all the more important to identify Key Risk Indicators, or KRIs, as a method of providing a warning before risk can develop any further. In this episode of the ISACA Podcast, sponsored by Galvanize, Greg Slayton discusses ways that the pandemic has stretched technology’s limits and how organizations can use KRIs to restore proper risk management.

Thursday Oct 08, 2020
Engineering an Effective Privacy Game Plan
Thursday Oct 08, 2020
Thursday Oct 08, 2020
Putting effective privacy measures into practice can be a difficult task for organizations that lack a comprehensive, well-documented privacy strategy. Without one, enterprises may be exposing customer data to vulnerabilities, and could find themselves at risk of noncompliance with privacy regulations. In this episode of the podcast, Tim Clements, a featured speaker at EuroCACS 2020, explains why every organization should be creating and implementing a privacy strategy, what is at risk if one does not exist and how to get started with creating one. Clements will host the EuroCACS session “Privacy Strategy and Roadmap—Do You Have One, and Is It Aligned With Your Business Strategy?” with Clara Kromann from Pandora on 28 October 2020.

Wednesday Oct 07, 2020
Finding the Human Factor in Work From Home
Wednesday Oct 07, 2020
Wednesday Oct 07, 2020
Once considered a privilege, remote work has become a necessity resulting from the public health risk posed by COVID-19. Telecommunication technologies such as video conferencing are core tools in the adoption of remote work, but virtual communication lacks the depth of in-person professional connections. In this episode of the ISACA Podcast, Vasant Raval and Edward Morse discuss how to make working from home productive, secure and personally fulfilling.

Wednesday Sep 23, 2020
Breaking Down Blockchain
Wednesday Sep 23, 2020
Wednesday Sep 23, 2020
At its core, blockchain functions to maintain the integrity of data and systems. But how does it compare to other databases and when should it be used? In this episode of the ISACA podcast, cybersecurity experts Dustin Brewer and Frank Downs define blockchain, explain how it relates to cryptocurrency and the cloud, and discuss applications where it may prove useful.

Tuesday Sep 01, 2020
The Road to Achieving Privacy by Design
Tuesday Sep 01, 2020
Tuesday Sep 01, 2020
Most organizations would agree that privacy by design is fundamental to growing a successful business and building customer trust. Yet putting this ideal into practice can often prove challenging. In this episode of the podcast, ISACA Journal columnist Steven Ross elaborates on his article “Privacy by Implementation and Execution” and explores some of the obstacles of implementing privacy by design.

Wednesday Aug 05, 2020
Cybersecurity Degrees or Certificates?
Wednesday Aug 05, 2020
Wednesday Aug 05, 2020
When it comes to the ever-expanding field that is cybersecurity, passionate practitioners should adopt the attitude that there is always more to learn. Yet it is true that the very foundation of one’s education can impact what direction a career takes. In this episode of the ISACA podcast, Dustin Brewer and Frank Downs explore the value of cybersecurity degrees compared to certificates, and discuss how each accreditation can take participants in a different direction professionally.
