1. EachPod
EachPod
ISACA Podcast - Podcast

ISACA Podcast

The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. The experts interviewed in the ISACA Podcast have valuable perspectives they have gained from their years of experience in the field. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.

Business Technology Tech News News
Update frequency
every 5 days
Average duration
28 minutes
Episodes
101
Years Active
2022 - 2025
Share to:
ISACA Live | Advancing Digital Trust Through Data Privacy

ISACA Live | Advancing Digital Trust Through Data Privacy

Learn more at isaca.org/digital-trust 

00:16:53  |   Thu 19 Jan 2023
ISACA Live | The Dark Future of Privacy

ISACA Live | The Dark Future of Privacy

Privacy Mining will increase because of billions of IoT devices being connected every day. Combined with advanced psychologic research, this can be a very powerful tool for manipulating people's beha…

00:30:58  |   Tue 17 Jan 2023
Information Privacy Contradiction: Interest-Based Posture of Compliance and Violation

Information Privacy Contradiction: Interest-Based Posture of Compliance and Violation

Why do individuals, organizations, institutions, nations, or responsible agents work hard to preserve their personal and enterprise data, personnel information, trade secrets, intellectual properties…

00:32:53  |   Thu 12 Jan 2023
ISACA Live | Advancing Digital Trust Through IT

ISACA Live | Advancing Digital Trust Through IT

On National IT Professionals Day, ISACA's Kevin Keh explains how IT professionals can advance digital trust in their organizations and in their industries.

Learn more at isaca.org/digital-trust
00:12:13  |   Thu 05 Jan 2023
Should Cybersecurity Be Subject to a SOX-Type Regulation?

Should Cybersecurity Be Subject to a SOX-Type Regulation?

Numerous laws and regulations have been passed to protect sensitive information, both at the federal and state level, creating a patchwork of requirements for companies to comply with. 

However, with…

00:23:40  |   Thu 29 Dec 2022
Beware the Traps of Data Governance and Data Management Practice

Beware the Traps of Data Governance and Data Management Practice

Guy Pearce joins ISACA’s Lisa Villanueva for a conversation about the traps of Data Governance and management. Guy breaks down Lore vs. Data, reasons for not using information for decision-making, an…

00:36:11  |   Tue 27 Dec 2022
Convergence: Where Next?

Convergence: Where Next?

ISACA’s Jeff Champion welcomes Steven Ross to the ISACA podcast. Steven asks what the effect of Convergence on the Control Community and concludes that everything is connected to every role, and it i…

00:22:09  |   Thu 22 Dec 2022
Do Data Go To Waste

Do Data Go To Waste

The Impact of SOX on the Industry 20 Years Ago and Today. Opponents of Sarbanes Oxley, (SOX) contend the law is too costly for companies to operationalize given the small benefit that SOX regulation …

00:18:04  |   Tue 20 Dec 2022
Protecting Your Enterprise and Deterring Fraud in a New Risk Era

Protecting Your Enterprise and Deterring Fraud in a New Risk Era

As uncertainty persists due to the COVID-19 pandemic, the war in Ukraine, international cyberthreats, inflation, and a looming recession, it is clear that the world has entered a new era of risk. The…

00:22:02  |   Tue 13 Dec 2022
The Circle of Failure: Why the Cyber Security Industry Doesn’t Work

The Circle of Failure: Why the Cyber Security Industry Doesn’t Work

Richard Hollis, Director of Rick Crew, is serious about asking the tough questions.

ISACA’s Jon Brandt welcomes him to the ISACA podcast to have a conversation that challenges the status quo: Does th…

00:50:35  |   Fri 09 Dec 2022
Meeting Attackers Where They Are

Meeting Attackers Where They Are

The world's largest software companies leverage modern-day Red Teams to protect against real-world attacks. Many companies focus on vulnerability management, compliance, and patching to secure themse…

00:22:33  |   Tue 29 Nov 2022
Taking Security Strategy to the Next Level: The Cyber Kill Chain vs. MITRE ATT&CK

Taking Security Strategy to the Next Level: The Cyber Kill Chain vs. MITRE ATT&CK

In an era of rampant ransomware and other malicious cyberattacks, it’s mandatory to double down on cybersecurity analysis and strategy to ensure an optimal security posture and the protection of crit…

00:23:10  |   Tue 22 Nov 2022
Auditee Buy-In—A Key Component of Effective Audits

Auditee Buy-In—A Key Component of Effective Audits

As you plan and execute your audit, do you take time to invest in the stakeholder relationship? This can be an often-overlooked element but essential in an effective audit.

Tune into this ISACA Podca…

00:20:05  |   Thu 10 Nov 2022
Breaking Down the ESET T2 2022 Threat Report

Breaking Down the ESET T2 2022 Threat Report

 In this ISACA Podcast episode, ESET’s Chief Security Evangelist, Tony Anscombe, joins ISACA’s Principal, Emerging Technology Professional Practices, Collin Beder to discuss ESET’s recently released …

00:21:37  |   Tue 08 Nov 2022
Enabling Digital Trust through Canada’s Digital Charter

Enabling Digital Trust through Canada’s Digital Charter

Data are the lifelines of a digital economy. They drive innovation, enabling cutting-edge research and next-generation technologies, including artificial intelligence (AI), robotics, and the Internet…

00:25:05  |   Fri 04 Nov 2022
It’s About (Down) Time

It’s About (Down) Time

It is all about the system's downtime.

In this ISACA Podcast episode, Risk Masters International's Steven Ross tells ISACA's Collin Beder that organizations should start focusing on hours of unavaila…

00:14:36  |   Tue 01 Nov 2022
How Social Engineering Bypasses Technical Controls

How Social Engineering Bypasses Technical Controls

We are subjected to phishing scams almost every day, and even the most seasoned professional must examine an email to ensure the links included are safe.

Brown University and Federal Reserve Bank of …

00:15:10  |   Thu 27 Oct 2022
What Makes Risk Assessments So Unpleasant and How to Change That

What Makes Risk Assessments So Unpleasant and How to Change That

Ryan Cloutier's child came home from school one day and told him that he had figured out the staff Wi-Fi password. Frustrated that the security wasn't better for a school network, Ryan decided to do …

00:23:39  |   Wed 26 Oct 2022
ISACA CyberPros – Naomi Buckwalter

ISACA CyberPros – Naomi Buckwalter

Executive Director of Cybersecurity Gatebreakers Foundation, Naomi Buckwalter, joins ISACA’s Jon Brandt to discuss burnout.

There are many factors at play when discussing burnout: company culture, wo…

00:40:15  |   Fri 21 Oct 2022
Quantifying the Qualitative Risk Assessment

Quantifying the Qualitative Risk Assessment

In this ISACA podcast episode, IT Risk Director and Senior Vice President Mike Powers and IT Segment Risk Manager Julie Ebersbach discuss using the qualitative risk assessment as part of an organizat…

00:27:39  |   Tue 18 Oct 2022
Disclaimer: The podcast and artwork embedded on this page are the property of ISACA Podcast. This content is not affiliated with or endorsed by eachpod.com.