1. EachPod
EachPod
ISACA Podcast - Podcast

ISACA Podcast

The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. The experts interviewed in the ISACA Podcast have valuable perspectives they have gained from their years of experience in the field. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.

Business Technology Tech News News
Update frequency
every 5 days
Average duration
28 minutes
Episodes
101
Years Active
2022 - 2025
Share to:
Elevate Your Career with Lauren Hasson

Elevate Your Career with Lauren Hasson

Lauren Hasson is the Founder of DevelopHer, an award-winning career development platform. In this podcast, she'll share a bit about her background and give a sneak peek at her upcoming CPE-eligible e…

00:18:06  |   Thu 04 Sep 2025
Cyberrisk Quantification: Strengthening Financial Resilience

Cyberrisk Quantification: Strengthening Financial Resilience

In this episode, ISACA's Lisa Cook engages with Yakir Golan, Executive Officer (CEO) and Co-Founder of Kovrr, to explore the critical role of Cyberrisk Quantification (CRQ) in enhancing organizationa…

00:35:33  |   Wed 04 Jun 2025
Securing Desktops and Data from Ransomware Attacks

Securing Desktops and Data from Ransomware Attacks

Ransomware remains one of the most formidable cybersecurity threats facing organizations worldwide.

In this episode of the ISACA Podcast, host Chris McGowan speaks with Netwrix endpoint protection ex…

00:39:30  |   Thu 15 May 2025
Cyberresilience and Cybersecurity

Cyberresilience and Cybersecurity

Cybersecurity and the role of internal audit, an urgent call to action: The forces driving business growth and efficiency contribute to a broad attack surface for cyber assaults. How is the end user …

00:24:10  |   Tue 11 Mar 2025
Cybersecurity Predictions for 2025

Cybersecurity Predictions for 2025

The prevalence of ransomware and the security concerns associated with AI have made the role of cybersecurity professionals vital for enterprise success. The complex security landscape can make cyber…

00:26:07  |   Tue 07 Jan 2025
Examining Authentication in the Deepfake Era with Dr. Chase Cunningham

Examining Authentication in the Deepfake Era with Dr. Chase Cunningham

Given the dynamic nature of cyberthreats and the ever-expanding digital ecosystem, authentication is more critical than ever. In this episode, ISACA director of professional practices and innovation …

00:38:28  |   Tue 10 Dec 2024
Safely and Responsibly Using Emerging Health Technology

Safely and Responsibly Using Emerging Health Technology

Emerging healthcare technologies have the potential to revolutionize healthcare and accessibility-related concerns, but these advancements are not without risk. To maximize the value and minimize the…

00:25:10  |   Thu 05 Dec 2024
Addressing SAP Security Gaps

Addressing SAP Security Gaps

SAP systems are treated differently than many other enterprise applications from a cybersecurity perspective. Most SAP security teams are siloed and left to meet security objectives on their own. Sin…

00:25:49  |   Tue 17 Sep 2024
What Enterprises Need to Know About ChatGPT and Cybersecurity

What Enterprises Need to Know About ChatGPT and Cybersecurity

Many people are pondering whether generative artificial intelligence (AI) tool ChatGPT is a friend or a foe.

 

In this ISACA podcast episode, Camelot Secure Director of Solutions Engineering Zachary …

00:21:44  |   Wed 24 Jul 2024
The Cyber Standard Podcast - Episode 4

The Cyber Standard Podcast - Episode 4

Welcome to Episode 4 of "The Cyber Standard Podcast"!

Join host Ameet Jugnauth, Vice President of the London Chapter of ISACA, as he delves into the world of cybersecurity standardization. In this ep…

00:48:45  |   Thu 30 May 2024
The Cyber Standard Podcast - Episode 3

The Cyber Standard Podcast - Episode 3

Welcome to Episode 3 of "The Cyber Standard Podcast"!

Join host Ameet Jugnauth, Vice President of the London Chapter of ISACA, as he delves into the essential aspects of applying for and assessing ca…

00:55:25  |   Thu 25 Apr 2024
Effective Third Party Risk Management in 2024: AI’s Impact and Future Trends

Effective Third Party Risk Management in 2024: AI’s Impact and Future Trends

Traditional security questionnaires just aren't cutting it anymore.

Tune into this ISACA Podcast episode, Chris McGowan chats with VISO TRUST CEO and Co-founder, Paul Valente as they delve into the e…

00:31:23  |   Wed 24 Apr 2024
Unlocking Strategic Value from a Bug Bounty Program

Unlocking Strategic Value from a Bug Bounty Program

Are you curious about how to maximize the strategic value and impact of your bug bounty program?

In this episode, you can learn how Adobe continuously develops and improves its bounty program to enga…

00:27:14  |   Wed 03 Apr 2024
The Cyber Standard Podcast - Episode 2

The Cyber Standard Podcast - Episode 2

Welcome to Episode 2 of "The Cyber Standard Podcast"!

Join host Ameet Jugnauth, Vice President of the London Chapter of ISACA, as he delves into the intricacies of cybersecurity standardization. In t…

00:42:35  |   Thu 28 Mar 2024
The Cyber Standard Podcast - Episode 1

The Cyber Standard Podcast - Episode 1

Tune in to the inaugural episode of "The Cyber Standard Podcast," “The Vision!”

Join host Ameet Jugnauth as he interviews Robin Lyons, ISACA Principal, IT Audit Professional Practices, and Annmarie D…

00:41:39  |   Wed 28 Feb 2024
Measuring Security Risk Against Dynamic Threats

Measuring Security Risk Against Dynamic Threats

Getting dressed is a routine example of everyday life packed with choices. Should I wear pants or shorts? Do I need a sweater? Shoes or sandals? While we often make these choices subconsciously, even…

00:28:34  |   Wed 21 Feb 2024
Reflecting on 25 Years of Information Security Matters

Reflecting on 25 Years of Information Security Matters

ISACA recently marked the 25th anniversary of Steve Ross’ ISACA Journal Information Security Matters column. Over the last quarter century, technology, security, and the workforce have evolved, while…

00:13:54  |   Wed 14 Feb 2024
A View into CTEM Exposure Management: Reducing your Attack Surface 3x

A View into CTEM Exposure Management: Reducing your Attack Surface 3x

Organizations can no longer rely on legacy vulnerability management solutions to protect against even basic attacks. Instead, vulnerability management is just one small component in a unified continu…

00:43:00  |   Wed 07 Feb 2024
Leveraging Agile Concepts for Neurodiverse Auditors

Leveraging Agile Concepts for Neurodiverse Auditors

In this ISACA Podcast episode, we’ll delve into how leveraging Agile concepts can mitigate common challenges neurodiverse auditors face in the workplace. Neurodivergent auditors can bring a fresh and…

00:28:43  |   Wed 17 Jan 2024
Minimizing Risk and Audit Requests

Minimizing Risk and Audit Requests

With the increasing demand for audits and risk assessments, artifact requests will not be going away anytime soon. However, the burden these activities bring to the organization can be drastically re…

00:21:16  |   Wed 03 Jan 2024
Disclaimer: The podcast and artwork embedded on this page are the property of ISACA Podcast. This content is not affiliated with or endorsed by eachpod.com.