ISACA Podcast

By ISACA Podcast

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by ISACA Podcast

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 57
Reviews: 0
Episodes: 100

Description

The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.

Episode Date
Unlocking Strategic Value from a Bug Bounty Program
Apr 03, 2024
The Cyber Standard Podcast - Episode 1
Feb 28, 2024
Measuring Security Risk Against Dynamic Threats
Feb 21, 2024
Reflecting on 25 Years of Information Security Matters
Feb 14, 2024
A View into CTEM Exposure Management: Reducing your Attack Surface 3x
Feb 07, 2024
Improving Security while Enabling Market Access with CCF
Jan 31, 2024
Leveraging Agile Concepts for Neurodiverse Auditors
Jan 17, 2024
Minimizing Risk and Audit Requests
Jan 03, 2024
Issue Management Confidential: Tools and Best Practices for Improving IT Issue Management
Dec 27, 2023
Improving Security while Enabling Market Access with CCF
Dec 13, 2023
Scaling Your Threat Modeling Program
Nov 15, 2023
Secure your Supply Chain with an Effective Vendor Security Program
Oct 05, 2023
Cultivating Inspired Leaders with Kristi Hedges
Oct 03, 2023
Exploring the Benefits of Neurodiversity within Cybersecurity
Sep 27, 2023
Internal Audits That Create Stakeholder Value Adopting an Agile Mindset
Aug 16, 2023
Strategies for Avoiding Burnout
Aug 09, 2023
The Danger of Distraction in Augmented Reality
Aug 02, 2023
Managing Human Risk Requires More Than Just Awareness Training
Jul 26, 2023
Preparing for Interruptions, Disruptions and Emergence Events
Jul 19, 2023
IS Audit in Practice: Data Integrity On Demand
Jul 11, 2023
ISACA Live | Digital Trust Priorities for Privacy and Emerging Tech
Jun 28, 2023
Processes of Engagement with Scott Gould
Jun 21, 2023
Delivering Security Value to Product Teams Using the Power of Data
Jun 13, 2023
AI Ethics and the Role of IT Auditors
Jun 06, 2023
Using a Risk-Based Approach to Prioritize Vulnerability Remediation
Jun 01, 2023
The True Cost of a Data Breach
May 23, 2023
2023 IT Compliance and Risk Benchmark Report
May 16, 2023
What Kind of Glasses Are You Wearing? Your View of Risk May Be Your Biggest Risk of All
May 09, 2023
How Organizations Can Consistently Reduce Cyberrisk
May 04, 2023
Key Considerations for Conducting Remote IT Audits
May 02, 2023
Seven Things to Know Before Automating IT General Control Audits
Apr 27, 2023
Understanding, Assessing, Aligning and Transforming Organizational Culture
Apr 20, 2023
Topics in Emerging Technology, Governance and Ethics
Apr 18, 2023
Industry Spotlight - Julia Kanouse
Apr 11, 2023
What Is Your IP Address Cybersecurity IQ? The Role of IP Address Data in a Digital World
Apr 04, 2023
The Future of Technology Risk: 4 Ways to Build Stakeholder Trust in the Technology Risk Imperative
Mar 21, 2023
Measuring Security Resilience from the Lens of the Adversary Community
Mar 14, 2023
Risky Business – Jon Brandt
Mar 07, 2023
Building Digital Trust Through Advocacy
Mar 02, 2023
Advertising Information Security
Feb 28, 2023
Rethinking Identity Governance
Feb 21, 2023
2023: The Year of Risk
Feb 14, 2023
Improving Cyber Resilience in an Age of Continuous Attacks
Feb 09, 2023
Advancing Digital Trust Through Audit and Assurance
Feb 07, 2023
ISACA Live_Critical Infrastructure Security
Feb 02, 2023
ISACA Live | Risk Scenarios
Jan 31, 2023
ISACA Live | How to Mature Your Privacy Compliance Program
Jan 26, 2023
Career Coach Advice: How to Launch Your IT Audit Career
Jan 24, 2023
ISACA Live | Advancing Digital Trust Through Data Privacy
Jan 19, 2023
ISACA Live | The Dark Future of Privacy
Jan 17, 2023
Information Privacy Contradiction: Interest-Based Posture of Compliance and Violation
Jan 12, 2023
ISACA Live | Advancing Digital Trust Through IT
Jan 05, 2023
Should Cybersecurity Be Subject to a SOX-Type Regulation?
Dec 29, 2022
Beware the Traps of Data Governance and Data Management Practice
Dec 27, 2022
Convergence: Where Next?
Dec 22, 2022
Do Data Go To Waste
Dec 20, 2022
Protecting Your Enterprise and Deterring Fraud in a New Risk Era
Dec 13, 2022
The Circle of Failure: Why the Cyber Security Industry Doesn’t Work
Dec 09, 2022
Meeting Attackers Where They Are
Nov 29, 2022
Taking Security Strategy to the Next Level: The Cyber Kill Chain vs. MITRE ATT&CK
Nov 22, 2022
Auditee Buy-In—A Key Component of Effective Audits
Nov 10, 2022
Breaking Down the ESET T2 2022 Threat Report
Nov 08, 2022
Enabling Digital Trust through Canada’s Digital Charter
Nov 04, 2022
It’s About (Down) Time
Nov 01, 2022
How Social Engineering Bypasses Technical Controls
Oct 27, 2022
What Makes Risk Assessments So Unpleasant and How to Change That
Oct 26, 2022
ISACA CyberPros – Naomi Buckwalter
Oct 21, 2022
Quantifying the Qualitative Risk Assessment
Oct 18, 2022
Gaining More Actionable Intelligence Using a Smarter Security Data Lake
Oct 13, 2022
ISACA Industry Spotlight | Ali Pabrai
Oct 11, 2022
Managing Cybersecurity Risk as Enterprise Risk
Oct 06, 2022
Implementing Artificial Intelligence: Capabilities and Risk
Oct 04, 2022
Audit in Practice: Auditing Culture
Sep 29, 2022
Incident Report & Continuous Control Monitoring
Sep 27, 2022
Industry Spotlight - Lisa Young
Sep 22, 2022
Defending Data Smartly
Sep 20, 2022
Foco de la industria - Arnulfo Espinosa Dominguez Parte II
Sep 16, 2022
Ethical AI Shifting the Conversation Left
Sep 15, 2022
Foco de la industria - Arnulfo Espinosa Dominguez Parte I
Sep 14, 2022
Why (And How to) Dispose of Digital Data
Sep 13, 2022
Industry Spotlight - Johann Dettweiler Part II
Sep 08, 2022
Industry Spotlight - Johann Dettweiler Part I
Sep 06, 2022
Achieving Effective Cloud Risk Management
Sep 01, 2022
Industry Spotlight - Dr. Blake Curtis Part II
Aug 30, 2022
Industry Spotlight - Dr. Blake Curtis Part I
Aug 25, 2022
Industry Spotlight - Arnulfo Espinosa Dominguez Part II
Aug 23, 2022
Industry Spotlight - Arnulfo Espinosa Dominguez Part I
Aug 18, 2022
Current State of Cybersecurity in K12
Aug 16, 2022
Industry Spotlight - Todd Fitzgerald
Aug 11, 2022
Advancing Digital Trust Through Audit and Assurance
Aug 09, 2022
Managing Security Across Disparate Database Technologies
Aug 04, 2022
Implementing Emerging Technologies: Agile SDLC Still Works
Aug 02, 2022
ISACA Live | Managing Supply Chain Risk with Richard Hollis
Jul 28, 2022
Industry Spotlight - Pam Nigro
Jul 26, 2022
The Impact of People on the Information Technology Landscape
Jul 21, 2022
GRC for Intelligent Ecosystems (GRCIE): An Innovative Approach to Workforce Enablement Part II
Jul 19, 2022
GRC for Intelligent Ecosystems (GRCIE): An Innovative Approach to Workforce Enablement Part I
Jul 14, 2022
Smarter Testing = Safer Digital Experiences
Jul 12, 2022
Cyber Decisions Only Executives Can Make
Jul 07, 2022
Breaking Down the ESET T1 2022 Threat Report
Jun 30, 2022