News
To secure valuable data, organizations need to implement digital trust in software supply chains; however, several key ...
The convergence of information technology (IT) and operational technology (OT) is rapidly changing the industrial landscape ...
Two of the most significant challenges in remote auditing are enabling key relationships and accessing information. But ...
The evolution of technology has transformed human–machine relationships, resulting in an unprecedented computing environment ...
Can organizations balance harnessing the value of data with protecting consumer privacy? What is the balance between the ...
Get involved in your professional community and expand your network through ISACA Engage. Engage offers many opportunities to get involved in ways that align with your time, talent, and interests.
Cyber Risk and Communicating to a Board of Directors Part I--Digital transformation has heightened due to the pandemic. We went from, “we can’t work from home” to “we can only work from home moving ...
Certified Information Security Manager (CISM) certification holders give advice to those considering becoming CISM certified.
Experience ISACA through our lens. Explore our educational content, ISACA news and events, in-depth interviews with experts in cybersecurity, IT audit, governance and so much more, plus a link to ...
A review of the quality audit process from what triggers an audit, what an audit entails, and what are the possible results of the audit.
Experts on GDPR from ISACA, IAPP, and ENISA joined together to discuss the impending GDPR Regulation implementation 25 May 2018 at 2017 CSX Europe. The panel discussed what GDPR is, what is involved ...
Review of the Process Quality Assurance (PQA) Practice Area. We will discuss the intent of this Practice Area and look at what value it can provide to an organization, as well as looking at the ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results