ISACA Podcast show

ISACA Podcast

Summary: The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. The experts interviewed in the ISACA Podcast have valuable perspectives they have gained from their years of experience in the field. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.

Join Now to Subscribe to this Podcast

Podcasts:

 Why Everyone Dislikes the IT Auditor and How to Change It | File Type: audio/mpeg | Duration: 00:09:48

IT auditors have a very important role, but are often criticized by management or users of IT audit services. While some attitudes cannot be changed, auditors can work to gain the trust and respect of those whom they are auditing. In this podcast, we discuss some of the common critiques and how IT auditors can address these issues.

 Weary Willy’s Guide to Cyberrisk Management | File Type: audio/mpeg | Duration: 00:06:59

Cyberrisk can never be eliminated, but it can be minimized so that it is more manageable. In this podcast, we discuss the professionals who should be involved with cyberrisk management and what effectively managed cyberrisk looks like.

 Auditing Agile: A Brave New World | File Type: audio/mpeg | Duration: 00:06:52

Auditing Agile can be difficult, but auditing Agile and Scrum artifacts can provide considerable value to an enterprise. In this podcast, we discuss how to audit Agile and the myriad benefits it can provide.

 Protecting Information—Practical Strategies for CIOs and CISOs | File Type: audio/mpeg | Duration: 00:08:19

Information is one of the most valuable assets of every organization. Protecting information typically a high priority for chief information officers, but better protection is more likely if the CIO works with a chief information security officer. In this podcast, we discuss the role of the CIO and CISO and provide a management and reporting structure.

 Information Security Challengeable Truths | File Type: audio/mpeg | Duration: 00:07:55

There are many widely held information security beliefs, but do all of them hold true? In this podcast, we challenge some commonly held information security beliefs and explore whether or not they should be held as truths.

 Benefits and the Security Risk of Software-defined Networking | File Type: audio/mpeg | Duration: 00:06:47

The growth in connected devices is increasing the difficulty of managing devices and related network traffic. Software-defined networking can make the process of managing these devices more efficient. In this podcast, we discuss the benefits and challenges associated with software-defined networking.

 Chief Cyber Officer | File Type: audio/mpeg | Duration: 00:09:13

Chief information security officers are typically thought of as being responsible for cyber security. But is this structural model the most effective way to manage cyber security? In this podcast, we discuss the merits of creating the role of chief cyber officer to deal with cyber security issues.

 Balancing the Cyber Security Battlefield | File Type: audio/mpeg | Duration: 00:11:15

Cyber security is a priority for enterprises, but the skills shortage in security is a global concern. Women can provide a unique perspective on cyber security, but are still vastly underrepresented in information security. In this podcast, we discuss some of the challenges women in cyber security face and how to overcome these challenges.

 Unsung Security Heroes | File Type: audio/mpeg | Duration: 00:10:38

Information security is no longer the sole responsibility of IT professionals. People across the enterprise contribute to keeping information safe. In this podcast, we discuss some roles that support information security, but are not typically thought of as security roles.

 Performance Measurement Metrics for IT Governance | File Type: audio/mpeg | Duration: 00:11:31

As technology evolves and transforms, enterprises rely more and more on technology resources and vendors. Because of this reliance, key performance indicators are necessary to measure the performance of IT service delivery. In this podcast, we discuss how to develop performance metrics, the criteria for good metrics and leveraging COBIT 5 to develop performance metrics.

Comments

Login or signup comment.