No items have been added to your cart yet
Read the ISACA Journal to gain practical insights on technical topics from your peers.
Advanced Data Analytics for IT Auditors. ISACA reviews data analytics techniques & tools that can help auditors discover hidden knowledge in data.
Assessing Security Controls: Keystone of the Risk Management Framework. Informed decisions involves risk-decision fidelity & risk acceptance.
The European Union (EU) General Data Protection Regulation (GDPR) was published in the Official Journal of the European Union and officially set an application date.
Implementing an audit follow-up process using the COBIT 5 enablers and ISACA's Information Technology Assurance Framework (ITAF) 2 provide value to the enterprise.
Performance Measurement Metrics for IT Governance. Enterprises use key performance indicators (KPIs) to measure IT performance service delivery.
The emergence of cyberspace has produced a new crop of rather difficult-to-resolve dilemmas, although the precepts and paradigms to address them remain the same.
In May 2016, the G7 leaders met in Ise-Shima, Japan, and produced a document that has real meaning for all of us who care about cyber security.
Challenges set before auditors today are imposing. With seemingly endless changes in technology and the resulting effect on organizations, there is a tendency to feel overwhelmed.
Previous columns have explored how to facilitate the process of learning to learn, and covering knowledge acquisition.
What is the biggest security challenge that will be faced in 2017? How should it be addressed?
Achieving Excellence in Supplier Risk Management. Review of robust supplier risk management framework incorporating regulatory expectations.
Privacy breaches disturb trust and run the risk of losing security. In this article, ISACA explains how to follow an ethical approach to data privacy protection.
Organizations are increasingly realizing that the management of cyber security risk in complex environments needs to be addressed using suitable decision-making techniques.
In my early days as a practitioner, the use of computers was referred to as data processing and electronic data processing (EDP).
The Dilemma for Workplace Usage: Wearable Technology. ISACA community’s attitudes toward wearables’ potential risk & security impacts at work.
The New EU General Data Protection Regulation—Benefits and First Steps to Meeting Compliance. Sets expectations for controlling personal data for EU citizens.
Thought leaders have long recognized that strong leadership and ethical culture are foundational building blocks of enterprises with top-performing risk management programs.
Vendor Management Using COBIT 5. ISACA discusses life cycle management for third-party services and the overall vendor management process.