1. EachPod
EachPod
ISACA Podcast - Podcast

ISACA Podcast

The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. The experts interviewed in the ISACA Podcast have valuable perspectives they have gained from their years of experience in the field. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.

Business Technology Tech News News
Update frequency
every 5 days
Average duration
28 minutes
Episodes
101
Years Active
2022 - 2025
Share to:
Issue Management Confidential: Tools and Best Practices for Improving IT Issue Management

Issue Management Confidential: Tools and Best Practices for Improving IT Issue Management

Effective IT issue management is crucial for organizations to mitigate financial loss, reputational damage, and operational disruptions. Issue management tools streamline the process by tracking and …

00:28:40  |   Wed 27 Dec 2023
Improving Security while Enabling Market Access with CCF

Improving Security while Enabling Market Access with CCF

Software-as-a-Service (SaaS) providers continue to face increasing customer demand to attain security compliance certifications that demonstrate commitment to security, privacy, confidentiality, and …

00:22:22  |   Wed 13 Dec 2023
Scaling Your Threat Modeling Program

Scaling Your Threat Modeling Program

Understanding product security risk starts before a single code line is written. Teams can discover threats to the architecture of a system early in the development life cycle with Threat Modeling. W…

00:18:45  |   Wed 15 Nov 2023
Secure your Supply Chain with an Effective Vendor Security Program

Secure your Supply Chain with an Effective Vendor Security Program

Security risks introduced by vendors have become a top-of-mind concern for executives today, driven by recent supply chain incidents that have exposed organizations to operational and reputational ri…

00:15:43  |   Thu 05 Oct 2023
Cultivating Inspired Leaders with Kristi Hedges

Cultivating Inspired Leaders with Kristi Hedges

If we want people to bring their most creative, innovative selves to work, we need to cultivate a culture where inspiration is given, encouraged, and fostered.

 

In this ISACA Podcast, Kristi Hedges,…

00:21:11  |   Tue 03 Oct 2023
Exploring the Benefits of Neurodiversity within Cybersecurity

Exploring the Benefits of Neurodiversity within Cybersecurity

Neurodiversity within cybersecurity offers many benefits but requires organizations and hiring managers to re-evaluate hiring practices and job descriptions typically structured for neurotypical appl…

00:33:58  |   Wed 27 Sep 2023
Internal Audits That Create Stakeholder Value Adopting an Agile Mindset

Internal Audits That Create Stakeholder Value Adopting an Agile Mindset

Agile Scrum is a lightweight framework that promises to significantly improve internal audits by creating a mindset that generates stakeholder value through adaptive solutions for complex auditing pr…

00:22:09  |   Wed 16 Aug 2023
Strategies for Avoiding Burnout

Strategies for Avoiding Burnout

Chronic workplace stress can lead to burnout, which poses a significant risk to the mental health of busy professionals, such as auditors. But how can these professionals protect themselves from burn…

00:26:39  |   Wed 09 Aug 2023
The Danger of Distraction in Augmented Reality

The Danger of Distraction in Augmented Reality

While users of technology are becoming more educated in how to avoid cyberattacks such as phishing, a distracted user might be more prone to missing signs of social engineering. This project explored…

00:21:35  |   Wed 02 Aug 2023
Managing Human Risk Requires More Than Just Awareness Training

Managing Human Risk Requires More Than Just Awareness Training

A comprehensive information security awareness program must be in place to ensure that employees are aware of and educated about the threats they may encounter at the workplace. The workforce needs t…

00:21:22  |   Wed 26 Jul 2023
Preparing for Interruptions, Disruptions and Emergence Events

Preparing for Interruptions, Disruptions and Emergence Events

This podcast speaks about how an Information Systems (IS) Auditor can prepare for the Interruptions, Disruptions and the Emergence events that happen to the business and to technology.

Describing the…

00:36:00  |   Wed 19 Jul 2023
IS Audit in Practice: Data Integrity On Demand

IS Audit in Practice: Data Integrity On Demand

On this podcast, ISACA's Hollee Mangrum-Willis and special guest Cindy Baxter discuss the disparities between American communities and access to electronic health records. From there, they examine ho…

00:41:21  |   Tue 11 Jul 2023
ISACA Live | Digital Trust Priorities for Privacy and Emerging Tech

ISACA Live | Digital Trust Priorities for Privacy and Emerging Tech

ISACA Digital Trust Advisory Council Members Anne Toth and Michelle Finneran Dennedy will discuss privacy concerns and priorities around emerging tech and the most critical considerations for ensurin…

00:28:54  |   Wed 28 Jun 2023
Processes of Engagement with Scott Gould

Processes of Engagement with Scott Gould

Scott Gould is the author of 'The Shape of Engagement: The Simple Process Behind how Engagement Works.' In this podcast, Scott gives a sneak peak at his upcoming member-exclusive, CPE-eligible event.…

00:23:56  |   Wed 21 Jun 2023
Delivering Security Value to Product Teams Using the Power of Data

Delivering Security Value to Product Teams Using the Power of Data

In security, aligning with product teams has never been more important, especially when outmaneuvering adversaries. To foster a truly productive and action-oriented cybersecurity culture, security te…

00:22:00  |   Tue 13 Jun 2023
AI Ethics and the Role of IT Auditors

AI Ethics and the Role of IT Auditors

We, as a society, have always lived by certain norms that are driven by our communities. These norms are enforced by rules and regulations, societal influence and public interactions. But is the same…

00:30:08  |   Tue 06 Jun 2023
Using a Risk-Based Approach to Prioritize Vulnerability Remediation

Using a Risk-Based Approach to Prioritize Vulnerability Remediation

Organizations today struggle with vulnerability management. More specifically, remediating vulnerabilities in a timely manner poses a challenge. With vulnerability remediation backlogs growing at an …

00:27:53  |   Thu 01 Jun 2023
The True Cost of a Data Breach

The True Cost of a Data Breach

Guests Jack Freund and Natalie Jorion discuss the need for additional data for quantitative risk analyses and methods to derive that data when it does not exist. They cover how this was done in the p…

00:31:58  |   Tue 23 May 2023
2023 IT Compliance and Risk Benchmark Report

2023 IT Compliance and Risk Benchmark Report

Are you wondering about the ever-changing landscape of IT compliance and risk management? Look no further. Hyperproof, a leading SaaS compliance operations provider, conducts an annual survey of over…

00:24:39  |   Tue 16 May 2023
What Kind of Glasses Are You Wearing? Your View of Risk May Be Your Biggest Risk of All

What Kind of Glasses Are You Wearing? Your View of Risk May Be Your Biggest Risk of All

The world of business has changed dramatically over the past few years. Our digital world is more connected than ever, leaving security and technology teams stretched even thinner. Privacy and data r…

00:28:02  |   Tue 09 May 2023
Disclaimer: The podcast and artwork embedded on this page are the property of ISACA Podcast. This content is not affiliated with or endorsed by eachpod.com.