ISACA Podcast show

ISACA Podcast

Summary: The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. The experts interviewed in the ISACA Podcast have valuable perspectives they have gained from their years of experience in the field. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.

Join Now to Subscribe to this Podcast

Podcasts:

 Social Media Risk and Rewards | File Type: audio/mpeg | Duration: 00:13:56

Most enterprises use social media, and the use of these sites can help organizations be closer to their clients. But the use of social media also poses some threats to an organization. In this podcast, learn more about the benefits of social media, the risk associated with social media use and how to mitigate this risk.

 Sustainability | File Type: audio/mpeg | Duration: 00:21:35

It is becoming increasingly important for enterprises to implement sustainable practices. But how can enterprises strike a balance between profitability and sustainability? In this podcast, we discuss what green IT looks like, the business benefits of sustainability and the role of an auditor in a sustainable enterprise.

 COBIT 5 Principles: Where Did They Come From? | File Type: audio/mpeg | Duration: 00:11:35

COBIT 5, a framework for the governance and management of enterprise IT, is a valuable resource that leverages proven practices, global thought leadership and groundbreaking tools. In this podcast, we discuss the COBIT 5 principles, where they came from and how enterprises can leverage the framework.

 Implementing the NIST Cybersecurity Framework | File Type: audio/mpeg | Duration: 00:25:01

The US National Institute of Standards and Technology’s Cybersecurity Framework can help enterprises secure their valuable information assets. The COBIT® 5 framework can be used to implement the NIST framework. In this podcast, we discuss the specific ways in which COBIT 5 can help enterprises that want to implement the Cybersecurity Framework.

 The Automation Conundrum | File Type: audio/mpeg | Duration: 00:18:41

The increasing proliferation of artificial intelligence systems presents many concerns. But not adopting AI systems could result in enterprises falling behind and missing key opportunities. In this podcast, we discuss AI threats, how to prevent these threats and the benefits of adopting AI systems.

 The G7 and Cyber Security | File Type: audio/mpeg | Duration: 00:13:08

A recent G7 meeting produced a document on cyber security, outlining international state cyber security behavior. While discussing cyber security at this level shows great progress, there is still room for growth. In this podcast, we discuss the G7 Principles and Actions on Cyber, why it is important, and areas for improvement.

 Cyberwhatsit | File Type: audio/mpeg | Duration: 00:05:59

The word “cyber” is growing in usage, but there is a lack of verbal clarity with respect to what it actually means. This ambiguity can lead to uncertainty about how to handle cyberrisk. In this podcast, we discuss the definitions of cybertheft, cyberattacks, cyberthreats and cyber security and the implications of these definitions.

 Frameworkers of the World Unite | File Type: audio/mpeg | Duration: 00:05:40

How are organizations complying with the US National Institute of Standards and Technology Cybersecurity Framework? In this podcast, we look at the framework as though it were a standard to determine how organizations can adhere to it.

 Three Ways to Simplify Auditing Software Security Requirements and Design | File Type: audio/mpeg | Duration: 00:08:54

Building security into software is a prerequisite for information assurance, and it is far cheaper to fix a defect in design than to fix it after production. Auditors can play a role in ensuring security is built into software. In this podcast, we discuss the ways in which organizations can incorporate security into the software design process.

 Are Software Flaws a Security Problem? | File Type: audio/mpeg | Duration: 00:09:39

Who is responsible when customer-facing systems crash? Program crashes can cause security problems. In this podcast, we explore how many causes of unexpected downtime are the same as those that lead to security breaches.

 Addressing Cyber Security Vulnerabilities | File Type: audio/mpeg | Duration: 00:08:26

Internet security is a growing concern and IT leaders need to increase public awareness of cyber security. Unchecked cyber security risk factors can greatly harm enterprises. In this podcast, we discuss areas for improvement that could prevent cyberattacks.

 Will the Attacker Always Get Through? | File Type: audio/mpeg | Duration: 00:09:51

Some chief information officers believe that it is unnecessary to build protections against cyberattackers because the attackers will always get through. But even if that were the case, there are still several steps that prudent enterprises should follow. In this podcast, we discuss the steps that can be taken to minimize risk if a cyberattack occurs.

 The Criticality of Security in the Internet of Things | File Type: audio/mpeg | Duration: 00:09:38

The Internet of Things is evolving at a rapid pace, and it is becoming increasingly difficult to keep up with these “smart” devices. Because this technology is advancing so quickly, it is necessary to build security and privacy controls into connected devices. In this podcast, we discuss why these controls should be built in, how to incorporate security into device building and some of the barriers of developing with security in mind.

 Cyber Security for a “Simple” Auditor | File Type: audio/mpeg | Duration: 00:08:52

Because cyber security and information security are often conflated, their audit processes might also be conflated. Despite the lack of cyber security standards, it is possible to develop a cyber security audit process. In this podcast, we discuss the ways to develop a process for cyber security audits.

 Cyber/Privacy | File Type: audio/mpeg | Duration: 00:09:59

Should cyberattacks be considered privacy violations? If cyberattacks are framed as privacy violations, the Generally Accepted Privacy Principles could be applied to cyberattacks. In this podcast, we use GAPP to provide insight on how privacy can be protected from cyberattackers.

Comments

Login or signup comment.