Get the latest scoop on a global and local scale, right here.
成为ISACA的一员，这是一个激动人心的时刻®! Our international community operates as THE platform for shaping the future of technology, 与来自世界各地的专家建立联系, 交换想法和经验. Our 获得澳门赌场官方软件(MGAM)计划 gives you the opportunity to help shape the future of the IS/IT industry by recruiting new members while rewarding you for your effort. You will be credited for each colleague you recruit to become a new ISACA member. 你招募的成员越多, 你能得到的回报就越大, 奖品价值高达500美元. 该项目将于2022年1月31日结束!
Digital Operational Resilience in the EU Financial Sector
The 2008 financial crisis was one of the most devastating and far-reaching global recessions in modern history. While the reforms that followed strengthened the resilience of the financial sector, they only indirectly addressed information and communications technology (ICT) and did not fully address digital operational resilience. 2020年9月, the European Union (EU) released the Digital Operational Resilience Act (DORA) draft, a proposal to synchronize its digital operation resilience rules for EU financial institutions. Learn more about DORA and its role in the growing digital landscape with ISACA®新白皮书， Digital Operational Resilience in the EU Financial Sector: A Risk-Based Approach, where you will learn how DORA addresses multiple areas of digital operational resilience.
探索最新的ISACA版本, resources, 专家的见解, 志愿服务机会, 以及实时发生的新事情.
Three Key Priorities for Governance Practitioners in 2022
The accelerating technological advancements and digital transformation did not reduce its pace in 2021 and it does not figure to in 2022, 在可预见的未来也不会.2021年12月10
ISACA导演, 渠道业务发展, Chris DeMale is joined by ServiceNow’s Director of Product Marketing, Karl Klaessig in this follow up interview that takes a deeper look into his presentation during ISACA’s Virtual Summit session, 2021年的安全操作挑战.2021年12月10
Audit practitioners who want to get the most out of Agile auditing practices will benefit from diving into the concepts and approaches outlined in this white paper.2021年12月10
Evidence-Based Prioritization of Cybersecurity Threats
The landscape of cybersecurity threats is evolving at a tremendous pace. New adversaries with increasingly sophisticated tactics and tradecraft seem to emerge on a continuous basisAuthors: Richard Kerkdijk, Sebastiaan Tesink, Frank Fransen and Federico Falconieri
Three Key Priorities for Cyberrisk Practitioners in 2022
It’s that time of the year again where people are making prognostications about what will happen in the new year.2021年12月9日
Three Key Priorities for Privacy Practitioners in 2022
Each year privacy professionals have more and more issues to address. 现有的隐私风险从未真正消失. They simply lurk beneath the new issues that claim the attention of privacy pros until the time is prime to exploit those old vulnerabilities.2021年12月8日
Reduced Appetite: How COVID-19 Will Impact Future Business Continuity Planning
No one could have predicted the far-reaching effects of the COVID-19 outbreak. However, many organizations had invested in business continuity and disaster recovery (BC/DR) to prepare for such 意外中断.Authors: Pascal A. 伊扎洛和亚伦·惠勒
Information Security Programs Need to be Ubiquitous, Proactive, and Vigilant
This ISACA TV interview is a discussing about 信息安全 concerns (and challenges), evolution, 和未来. 涵盖的主题包括移动计算设备, 物联网(IoT), 人工智能(AI), 网络威胁情报(CTI), 软件工具...2021年12月7日
Three Key Priorities for Cybersecurity Practitioners in 2022
The availability of security talent — or lack thereof — has emerged as the key limiting factor in 信息安全’s ability to secure the modern business.2021年12月7日
过去的两年对每个人来说都很难熬. Most are still learning how to work differently and re-evaluating their strategies to get the best out of the worst season.2021年12月6日
COBIT Focus Area: Information and Technology Risk—A Model for Internal Audit Analysis
Risk management is an important function in any organization. Financial services organizations often employ the three lines of defense approach to manage risk within the organization.2021年12月6日
It is a common perception that marketing is generally at odds with security and privacy. Although these are broad generalizations with plenty of excluded nuances and exceptions, 市场营销被认为是依赖于数据——而且数据越多越好, the better.2021年12月6日
在工业革命的时代.0, cybersecurity has become a more pressing and disturbing concern for both boards and senior management globally.2021年12月3日
The Impact of Schrems II on the Modern Multinational Information Security Practice, Part 1
The transfer of personal data out of the European Union (EU) to nations around the world takes place tens of thousands of times every day, and it has been occurring for so long that it has largely become routine business.Author: Scott M. Giordano
AI in Cybersecurity: How to Cut Through the Overhype and Maximize the Potential
人工智能(AI), 机器学习(毫升), and deep learning (DL) are often applied in cybersecurity, but their applications may not always work as intended.2021年12月2