ISACA Podcast
ISACA Podcast
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
Categories: Technology
Listen to the last episode:
Tune in to the inaugural episode of "The Cyber Standard Podcast," “The Vision!” Join host Ameet Jugnauth as he interviews Robin Lyons, ISACA Principal, IT Audit Professional Practices, and Annmarie Dann, Director of Professional Standards at the UK Cyber Security Council, in a compelling discussion about the standardization of specialisms in cybersecurity. Explore the Council's and ISACA's visions for the future, the significance of the Audit & Assurance specialism, and the collaborative efforts between the two organizations. Don't miss this insightful conversation that sets the stage for the podcast's journey into the world of cybersecurity standardization. Explore Further: Delve deeper into the subject with additional resources provided in the episode description. https://www.isaca.org/about-us/newsroom/press-releases/2023/uk-cyber-security-council-partners-with-isaca-for-audit-and-assurance-pilot-scheme
Previous episodes
-
297 - The Cyber Standard Podcast - Episode 1 Wed, 28 Feb 2024 - 0h
-
296 - Measuring Security Risk Against Dynamic Threats Wed, 21 Feb 2024 - 0h
-
295 - Reflecting on 25 Years of Information Security Matters Wed, 14 Feb 2024 - 0h
-
294 - A View into CTEM Exposure Management: Reducing your Attack Surface 3x Wed, 07 Feb 2024 - 0h
-
293 - Improving Security while Enabling Market Access with CCF Wed, 31 Jan 2024 - 0h
-
292 - Leveraging Agile Concepts for Neurodiverse Auditors Wed, 17 Jan 2024 - 0h
-
291 - Minimizing Risk and Audit Requests Wed, 03 Jan 2024 - 0h
-
290 - Issue Management Confidential: Tools and Best Practices for Improving IT Issue Management Wed, 27 Dec 2023 - 0h
-
289 - Improving Security while Enabling Market Access with CCF Wed, 13 Dec 2023 - 0h
-
288 - Scaling Your Threat Modeling Program Wed, 15 Nov 2023 - 0h
-
287 - Secure your Supply Chain with an Effective Vendor Security Program Thu, 05 Oct 2023 - 0h
-
286 - Cultivating Inspired Leaders with Kristi Hedges Tue, 03 Oct 2023 - 0h
-
285 - Exploring the Benefits of Neurodiversity within Cybersecurity Wed, 27 Sep 2023 - 0h
-
284 - Internal Audits That Create Stakeholder Value Adopting an Agile Mindset Wed, 16 Aug 2023 - 0h
-
283 - Strategies for Avoiding Burnout Wed, 09 Aug 2023 - 0h
-
282 - The Danger of Distraction in Augmented Reality Wed, 02 Aug 2023 - 0h
-
281 - Managing Human Risk Requires More Than Just Awareness Training Wed, 26 Jul 2023 - 0h
-
280 - Preparing for Interruptions, Disruptions and Emergence Events Wed, 19 Jul 2023 - 0h
-
279 - IS Audit in Practice: Data Integrity On Demand Tue, 11 Jul 2023 - 0h
-
278 - ISACA Live | Digital Trust Priorities for Privacy and Emerging Tech Wed, 28 Jun 2023 - 0h
-
277 - Processes of Engagement with Scott Gould Wed, 21 Jun 2023 - 0h
-
276 - Delivering Security Value to Product Teams Using the Power of Data Tue, 13 Jun 2023 - 0h
-
275 - AI Ethics and the Role of IT Auditors Tue, 06 Jun 2023 - 0h
-
274 - Using a Risk-Based Approach to Prioritize Vulnerability Remediation Thu, 01 Jun 2023 - 0h
-
273 - The True Cost of a Data Breach Tue, 23 May 2023 - 0h
-
272 - 2023 IT Compliance and Risk Benchmark Report Tue, 16 May 2023 - 0h
-
271 - What Kind of Glasses Are You Wearing? Your View of Risk May Be Your Biggest Risk of All Tue, 09 May 2023 - 0h
-
270 - How Organizations Can Consistently Reduce Cyberrisk Thu, 04 May 2023 - 0h
-
269 - Key Considerations for Conducting Remote IT Audits Tue, 02 May 2023 - 0h
-
268 - Seven Things to Know Before Automating IT General Control Audits Thu, 27 Apr 2023 - 0h
-
267 - Understanding, Assessing, Aligning and Transforming Organizational Culture Thu, 20 Apr 2023 - 0h
-
266 - Topics in Emerging Technology, Governance and Ethics Tue, 18 Apr 2023 - 0h
-
265 - Industry Spotlight - Julia Kanouse Tue, 11 Apr 2023 - 0h
-
264 - What Is Your IP Address Cybersecurity IQ? The Role of IP Address Data in a Digital World Tue, 04 Apr 2023 - 0h
-
263 - The Future of Technology Risk: 4 Ways to Build Stakeholder Trust in the Technology Risk Imperative Tue, 21 Mar 2023 - 0h
-
262 - Measuring Security Resilience from the Lens of the Adversary Community Tue, 14 Mar 2023 - 0h
-
261 - Risky Business – Jon Brandt Tue, 07 Mar 2023 - 0h
-
260 - Building Digital Trust Through Advocacy Thu, 02 Mar 2023 - 0h
-
259 - Advertising Information Security Tue, 28 Feb 2023 - 0h
-
258 - Rethinking Identity Governance Tue, 21 Feb 2023 - 0h
-
257 - 2023: The Year of Risk Tue, 14 Feb 2023 - 0h
-
256 - Improving Cyber Resilience in an Age of Continuous Attacks Thu, 09 Feb 2023 - 0h
-
255 - Advancing Digital Trust Through Audit and Assurance Tue, 07 Feb 2023 - 0h
-
254 - ISACA Live_Critical Infrastructure Security Thu, 02 Feb 2023 - 0h
-
253 - ISACA Live | Risk Scenarios Tue, 31 Jan 2023 - 0h
-
252 - ISACA Live | How to Mature Your Privacy Compliance Program Thu, 26 Jan 2023 - 0h
-
251 - Career Coach Advice: How to Launch Your IT Audit Career Tue, 24 Jan 2023 - 0h
-
250 - ISACA Live | Advancing Digital Trust Through Data Privacy Thu, 19 Jan 2023 - 0h
-
249 - ISACA Live | The Dark Future of Privacy Tue, 17 Jan 2023 - 0h
-
248 - Information Privacy Contradiction: Interest-Based Posture of Compliance and Violation Thu, 12 Jan 2023 - 0h