1. EachPod
EachPod
Certified: The ISACA CISA Audio Course - Podcast

Certified: The ISACA CISA Audio Course

The Bare Metal Cyber CISA Audio Course is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impact review before test day, this series delivers in-depth instruction, clear explanations, and strategic insights tailored for exam success

Education Technology Courses
Update frequency
every day
Average duration
11 minutes
Episodes
105
Years Active
2025
Share to:
Episode 105: Evaluating Risks of Emerging Technologies and Practices

Episode 105: Evaluating Risks of Emerging Technologies and Practices

Staying ahead of risk means understanding new technologies and trends. This episode focuses on how to evaluate emerging threats related to artificial intelligence, blockchain, edge computing, and evo…

00:11:15  |   Sun 06 Jul 2025
Episode 104: Providing Guidance on Information Systems Quality Improvement

Episode 104: Providing Guidance on Information Systems Quality Improvement

Auditors are expected to identify improvement opportunities and support quality initiatives. In this episode, you will learn how to evaluate continuous improvement programs, recommend control enhance…

00:10:07  |   Sun 06 Jul 2025
Episode 103: Evaluating Threat and Vulnerability Management

Episode 103: Evaluating Threat and Vulnerability Management

Organizations must proactively manage threats and vulnerabilities to remain secure. This episode covers how to audit threat intelligence collection, vulnerability assessments, scanning schedules, rem…

00:10:44  |   Sun 06 Jul 2025
Episode 102: Evaluating Shadow IT Risks and Controls

Episode 102: Evaluating Shadow IT Risks and Controls

Shadow IT introduces risk outside of sanctioned governance. This episode teaches you how to audit unsanctioned applications, unauthorized system use, and spreadsheet-based end-user tools. You will al…

00:11:01  |   Sun 06 Jul 2025
Episode 101: Evaluating Policies Related to IT Asset Lifecycle Management

Episode 101: Evaluating Policies Related to IT Asset Lifecycle Management

IT assets require controls from acquisition through disposal. In this episode, you will learn how to evaluate lifecycle policies, including procurement, tagging, usage, reassignment, retirement, and …

00:11:03  |   Sun 06 Jul 2025
Episode 100: Evaluating Privacy and Data Classification Programs

Episode 100: Evaluating Privacy and Data Classification Programs

Privacy and data classification are integral to protecting information assets. This episode explains how to audit privacy frameworks, policy enforcement, classification schemes, and data-handling pro…

00:11:17  |   Sun 06 Jul 2025
Episode 99: Evaluating Data Governance Program

Episode 99: Evaluating Data Governance Program

Data governance defines how information is managed, secured, and used. This episode covers how to evaluate data ownership, stewardship, classification, and lifecycle controls. You will learn how audi…

00:10:50  |   Sun 06 Jul 2025
Episode 98: Evaluating IT Operations and Maintenance Practices

Episode 98: Evaluating IT Operations and Maintenance Practices

Operations and maintenance are critical to IT service delivery and risk control. In this episode, you will learn how to audit operational support, preventive maintenance routines, service management …

00:10:38  |   Sun 06 Jul 2025
Episode 97: Evaluating Enterprise Architecture Alignment

Episode 97: Evaluating Enterprise Architecture Alignment

Enterprise architecture must align with organizational strategy to ensure long-term IT value. This episode teaches you how to assess architectural documentation, governance processes, technology stan…

00:11:07  |   Sun 06 Jul 2025
Episode 96: Evaluating End-User Support Processes

Episode 96: Evaluating End-User Support Processes

Supporting end users requires processes that are responsive, secure, and well-documented. This episode focuses on how to audit help desk operations, ticket resolution, escalation paths, and training …

00:10:40  |   Sun 06 Jul 2025
Episode 95: Evaluating Supply Chain Risk and Integrity Issues

Episode 95: Evaluating Supply Chain Risk and Integrity Issues

Modern IT environments rely on complex supply chains that must be evaluated for risk. This episode explores how to assess supplier integrity, dependency risk, cybersecurity posture, and fraud potenti…

00:10:49  |   Sun 06 Jul 2025
Episode 94: Evaluating IT Vendor Selection and Contract Management

Episode 94: Evaluating IT Vendor Selection and Contract Management

Auditors play an essential role in verifying that vendor selection and contract oversight meet organizational, legal, and regulatory expectations. In this episode, you will learn how to evaluate proc…

00:10:34  |   Sun 06 Jul 2025
Episode 93: Evaluating IT Key Performance and Risk Indicators

Episode 93: Evaluating IT Key Performance and Risk Indicators

Key performance and risk indicators provide insight into IT effectiveness and exposure. This episode teaches you how to evaluate how KPIs and KRIs are selected, monitored, and used to guide decision-…

00:11:12  |   Sun 06 Jul 2025
Episode 92: Evaluating Ownership of IT Risks, Controls, and Standards

Episode 92: Evaluating Ownership of IT Risks, Controls, and Standards

Effective risk management requires clearly assigned ownership. In this episode, you will learn how to evaluate whether an organization has defined responsibility for IT risks, control implementation,…

00:10:49  |   Sun 06 Jul 2025
Episode 91: Evaluating IT Resource and Project Management Alignment

Episode 91: Evaluating IT Resource and Project Management Alignment

To succeed on the CISA exam, you must be able to assess whether IT resources and project management practices support enterprise objectives. This episode walks through how to evaluate resource alloca…

00:10:46  |   Sun 06 Jul 2025
Episode 90: Evaluating IT Governance Effectiveness

Episode 90: Evaluating IT Governance Effectiveness

Strong governance ensures that IT delivers value and manages risk. This episode explains how to evaluate governance frameworks, board oversight, decision-making processes, and policy enforcement. You…

00:10:51  |   Sun 06 Jul 2025
Episode 89: Evaluating IT Strategy Alignment

Episode 89: Evaluating IT Strategy Alignment

IT strategy must support business goals and risk tolerance. In this episode, you will learn how to assess whether IT initiatives are aligned with enterprise objectives, supported by governance, and t…

00:10:42  |   Sun 06 Jul 2025
Episode 88: Quality Assurance and Improvement of Audit Processes

Episode 88: Quality Assurance and Improvement of Audit Processes

Audit functions must be continuously evaluated and improved. This episode covers quality assurance techniques including internal assessments, external reviews, performance metrics, and lessons learne…

00:11:40  |   Sun 06 Jul 2025
Episode 87: Evaluating Automation and Decision-Making Systems

Episode 87: Evaluating Automation and Decision-Making Systems

Automated systems introduce unique risks and controls. This episode teaches you how to audit robotic process automation, decision engines, AI tools, and algorithmic logic. You will learn how to asses…

00:11:19  |   Sun 06 Jul 2025
Episode 86: Utilizing Data Analytics in Auditing

Episode 86: Utilizing Data Analytics in Auditing

Data analytics is transforming how audits are conducted. In this episode, you will explore how to apply analytic tools for risk assessment, control testing, and anomaly detection. You will also learn…

00:11:24  |   Sun 06 Jul 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Dr Jason Edwards. This content is not affiliated with or endorsed by eachpod.com.