News
Enterprises rely heavily on internal audit functions to stay on track with business objectives, meet regulatory requirements, and handle risk effectively.
Only 28% of organizations have a formal AI policy, leaving many at risk. Protect your enterprise with ISACA's customizable AI ...
Plan your IT Governance Manager role. Understand employer expectations, build leadership skills, and explore resources to ...
Get to know the Director of Cybersecurity role. Understand employer expectations, build leadership skills, and explore resources to advance in cybersecurity leadership.
Author: Andre Pitkowski, CRISC, CGEIT, COBIT Foundation Trainer, CRMA, ISO 27001 LA, ISO 31000 LA, OCTAVE, Scrum PSM, and Daniel Bispo de Jesus, COBIT 5 Foundation ...
Organizations aim to achieve their objectives while managing risk within their risk appetites. A good governance structure for managing risk is to establish three lines of defense. Briefly, the first ...
View the exclusive survey infographic now to uncover the key takeaways and see where your organization stands in the quantum race. Explore ISACA's quantum roadmap revealing key steps to take to ...
No matter the size of an organization, every organization that depends on information technology to conduct any part of its business should have a functioning cybersecurity program. Over the last ...
COVID-19 imposed change on every aspect of life and business in 2020, but 2020 was also a significant year in the world of privacy protection for reasons beyond the pandemic. In 2020, enforcement of ...
Author: Ejona Preçi, CISM, CRISC, ITIL, Information Security Risk Manager at FREE NOW (BMW & Daimler joint venture), Germany, and Curtis Simms, MBA, CISM, CISA ...
How important is individual identity in human beings, really? There are several possible answers, ranging from irrelevant to fundamental, but it depends on the context. In prehistory, there was likely ...
Author: Jason Lau, CGEIT, CRISC, CISA, CISM, CDPSE, CISSP, CIPP/E, CIPM, CIPT, CEH, HCISPP, FIP, ISACA Board Director, and Chief Information Security Officer at ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results