Current Issue: Volume 4  25 February 2015

@ISACA is a biweekly publication available from this page and delivered via email to ISACA members and subscribers. This electronic newsletter feature timely industry and ISACA news, as well as featured and updates relevant our readers.

Tips From Industry Experts


How do you think about your organization’s data? What do you think about regarding those data? And can your data fall into the hands of someone who should not have them?
Read More

The US Government’s Cyber Intelligence Sharing and Protection Bill facilitates the sharing of cyberthreat information between the intelligence community and cybersecurity entities. Organizational network security devices should also share information. Read More

ISACA will hold the first-ever COBIT Conference on 14-15 March in Orlando, Florida, USA. Audit, assurance, security and governance professionals from around the world are invited to attend the conference to better understand COBIT, earn the COBIT Foundation certificate or obtain practical guidance on applying the COBIT framework. Read More

Moving to another country, whether for professional or personal reasons, can be exciting and challenging. To learn more about adjusting to and working in a new culture, attend “Achieving Success by Stepping Outside Your Cultural Comfort Zone.” Read More

In recent months, several members of ISACA’s International Organization for Standardization Liaison Subcommittee (ILSC) represented ISACA at international standards development meetings. The International Organization for Standardization (ISO) develops voluntary international standards on a wide range of issues, including information security. Read More

ISACA certifications can help you advance your career and bring more value to your organization. Foote Partners LLC includes ISACA certifications in its list of highest paying IT certifications from July 2014 to October 2014. The Certified in the Governance of Enterprise IT (CGEIT) certification is tied for the 3rd highest paying certification. Read More

“Employers are looking for people with knowledge and skills on par with global standards,” says Isa Ojeda. “The Certified Information Security Manager (CISM) certification provided that recognition for me.” Ojeda pursued the CISM certification when she began her career as an auditor. Read More

Reviewed by Upesh Parekh, CISA

The US National Institute of Standards and Technology (NIST) Special Publication 800-30 “Guide for Conducting Risk Assessments” defines information security risk as the risk that arises from the loss of confidentiality, integrity or availability of information or information systems and reflects the potential adverse impact to organization operations, organizational assets, individuals, other organizations and the nation.