News

Enterprises rely heavily on internal audit functions to stay on track with business objectives, meet regulatory requirements, and handle risk effectively.
View the exclusive survey infographic now to uncover the key takeaways and see where your organization stands in the quantum race. Explore ISACA's quantum roadmap revealing key steps to take to ...
Author: Engr. Muhammad Mushfiqur Rahman, CISA, CCISO, CISSP, OSCP, PMP, LPT (Master), CISM, CRISC, CGEIT, CDPSE, CEH, CHFI, ECSA, CSA, CTIA, CLPTP, ISO 27001 LA, CND ...
Author: Ramona Ratiu, MS, CISM, CISA, Head of Cyber Resilience Testing, Zurich Insurance, and Past President of ISACA Chicago Chapter ...
Author: Ejona Preçi, CISM, CRISC, ITIL, Information Security Risk Manager at FREE NOW (BMW & Daimler joint venture), Germany, and Curtis Simms, MBA, CISM, CISA ...
Author: Chetan Anand, CDPSE, Agile Scrum Master, CCIO, CPISI, OneTrust Fellow of Privacy Technology, IRAM2, ISO 27001 LA, ISO 22301 LA, ISO 27701, ISO 31000, ISO 9001 ...
Author: Andre Pitkowski, CRISC, CGEIT, COBIT Foundation Trainer, CRMA, ISO 27001 LA, ISO 31000 LA, OCTAVE, Scrum PSM, and Daniel Bispo de Jesus, COBIT 5 Foundation ...
The data center is the central nervous system for any organization. As the hub of servers that host business-critical data, the data center needs special attention. There are some basic checks ...
When confidentiality, integrity and availability (CIA) were established as the main information security attributes in the 1990s, employees around the world were not working from home due to a global ...
These days, cyberadversaries are coming up with different kinds of capabilities and objectives behind each of their new cyberattacks, which has forced organizations to do a deeper, more introspective ...
No matter the size of an organization, every organization that depends on information technology to conduct any part of its business should have a functioning cybersecurity program. Over the last ...
Organizations aim to achieve their objectives while managing risk within their risk appetites. A good governance structure for managing risk is to establish three lines of defense. Briefly, the first ...