540.4K
Downloads
305
Episodes
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
Episodes
Wednesday Feb 22, 2017
Addressing Cyber Security Vulnerabilities
Wednesday Feb 22, 2017
Wednesday Feb 22, 2017
Internet security is a growing concern and IT leaders need to increase public awareness of cyber security. Unchecked cyber security risk factors can greatly harm enterprises. In this podcast, we discuss areas for improvement that could prevent cyberattacks.
Wednesday Feb 22, 2017
Will the Attacker Always Get Through?
Wednesday Feb 22, 2017
Wednesday Feb 22, 2017
Some chief information officers believe that it is unnecessary to build protections against cyberattackers because the attackers will always get through. But even if that were the case, there are still several steps that prudent enterprises should follow. In this podcast, we discuss the steps that can be taken to minimize risk if a cyberattack occurs.
Wednesday Feb 22, 2017
The Criticality of Security in the Internet of Things
Wednesday Feb 22, 2017
Wednesday Feb 22, 2017
The Internet of Things is evolving at a rapid pace, and it is becoming increasingly difficult to keep up with these “smart” devices. Because this technology is advancing so quickly, it is necessary to build security and privacy controls into connected devices. In this podcast, we discuss why these controls should be built in, how to incorporate security into device building and some of the barriers of developing with security in mind.
Wednesday Feb 22, 2017
Cyber Security for a “Simple” Auditor
Wednesday Feb 22, 2017
Wednesday Feb 22, 2017
Because cyber security and information security are often conflated, their audit processes might also be conflated. Despite the lack of cyber security standards, it is possible to develop a cyber security audit process. In this podcast, we discuss the ways to develop a process for cyber security audits.
Wednesday Feb 22, 2017
Cyber/Privacy
Wednesday Feb 22, 2017
Wednesday Feb 22, 2017
Should cyberattacks be considered privacy violations? If cyberattacks are framed as privacy violations, the Generally Accepted Privacy Principles could be applied to cyberattacks. In this podcast, we use GAPP to provide insight on how privacy can be protected from cyberattackers.
Wednesday Feb 22, 2017
Why Everyone Dislikes the IT Auditor and How to Change It
Wednesday Feb 22, 2017
Wednesday Feb 22, 2017
IT auditors have a very important role, but are often criticized by management or users of IT audit services. While some attitudes cannot be changed, auditors can work to gain the trust and respect of those whom they are auditing. In this podcast, we discuss some of the common critiques and how IT auditors can address these issues.
Wednesday Feb 22, 2017
Weary Willy’s Guide to Cyberrisk Management
Wednesday Feb 22, 2017
Wednesday Feb 22, 2017
Cyberrisk can never be eliminated, but it can be minimized so that it is more manageable. In this podcast, we discuss the professionals who should be involved with cyberrisk management and what effectively managed cyberrisk looks like.
Wednesday Feb 22, 2017
Auditing Agile: A Brave New World
Wednesday Feb 22, 2017
Wednesday Feb 22, 2017
Auditing Agile can be difficult, but auditing Agile and Scrum artifacts can provide considerable value to an enterprise. In this podcast, we discuss how to audit Agile and the myriad benefits it can provide.
Wednesday Feb 22, 2017
Protecting Information—Practical Strategies for CIOs and CISOs
Wednesday Feb 22, 2017
Wednesday Feb 22, 2017
Information is one of the most valuable assets of every organization. Protecting information typically a high priority for chief information officers, but better protection is more likely if the CIO works with a chief information security officer. In this podcast, we discuss the role of the CIO and CISO and provide a management and reporting structure.
Wednesday Feb 22, 2017
Information Security Challengeable Truths
Wednesday Feb 22, 2017
Wednesday Feb 22, 2017
There are many widely held information security beliefs, but do all of them hold true? In this podcast, we challenge some commonly held information security beliefs and explore whether or not they should be held as truths.