
559.7K
Downloads
309
Episodes
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
Episodes
Wednesday Feb 22, 2017
Weary Willy’s Guide to Cyberrisk Management
Wednesday Feb 22, 2017
Wednesday Feb 22, 2017
Cyberrisk can never be eliminated, but it can be minimized so that it is more manageable. In this podcast, we discuss the professionals who should be involved with cyberrisk management and what effectively managed cyberrisk looks like.
Wednesday Feb 22, 2017
Auditing Agile: A Brave New World
Wednesday Feb 22, 2017
Wednesday Feb 22, 2017
Auditing Agile can be difficult, but auditing Agile and Scrum artifacts can provide considerable value to an enterprise. In this podcast, we discuss how to audit Agile and the myriad benefits it can provide.
Wednesday Feb 22, 2017
Protecting Information—Practical Strategies for CIOs and CISOs
Wednesday Feb 22, 2017
Wednesday Feb 22, 2017
Information is one of the most valuable assets of every organization. Protecting information typically a high priority for chief information officers, but better protection is more likely if the CIO works with a chief information security officer. In this podcast, we discuss the role of the CIO and CISO and provide a management and reporting structure.
Wednesday Feb 22, 2017
Information Security Challengeable Truths
Wednesday Feb 22, 2017
Wednesday Feb 22, 2017
There are many widely held information security beliefs, but do all of them hold true? In this podcast, we challenge some commonly held information security beliefs and explore whether or not they should be held as truths.
Wednesday Feb 22, 2017
Benefits and the Security Risk of Software-defined Networking
Wednesday Feb 22, 2017
Wednesday Feb 22, 2017
The growth in connected devices is increasing the difficulty of managing devices and related network traffic. Software-defined networking can make the process of managing these devices more efficient. In this podcast, we discuss the benefits and challenges associated with software-defined networking.
Wednesday Feb 22, 2017
Chief Cyber Officer
Wednesday Feb 22, 2017
Wednesday Feb 22, 2017
Chief information security officers are typically thought of as being responsible for cyber security. But is this structural model the most effective way to manage cyber security? In this podcast, we discuss the merits of creating the role of chief cyber officer to deal with cyber security issues.
Wednesday Feb 22, 2017
Balancing the Cyber Security Battlefield
Wednesday Feb 22, 2017
Wednesday Feb 22, 2017
Cyber security is a priority for enterprises, but the skills shortage in security is a global concern. Women can provide a unique perspective on cyber security, but are still vastly underrepresented in information security. In this podcast, we discuss some of the challenges women in cyber security face and how to overcome these challenges.
Wednesday Feb 22, 2017
Unsung Security Heroes
Wednesday Feb 22, 2017
Wednesday Feb 22, 2017
Information security is no longer the sole responsibility of IT professionals. People across the enterprise contribute to keeping information safe. In this podcast, we discuss some roles that support information security, but are not typically thought of as security roles.
Wednesday Feb 22, 2017
Performance Measurement Metrics for IT Governance
Wednesday Feb 22, 2017
Wednesday Feb 22, 2017
As technology evolves and transforms, enterprises rely more and more on technology resources and vendors. Because of this reliance, key performance indicators are necessary to measure the performance of IT service delivery. In this podcast, we discuss how to develop performance metrics, the criteria for good metrics and leveraging COBIT 5 to develop performance metrics.
