Current Issue: Volume 13  1 July 2015

@ISACA is a biweekly publication available from this page and delivered via email to ISACA members and subscribers. This electronic newsletter feature timely industry and ISACA news, as well as featured and updates relevant our readers.

Tips From Industry Experts

By Leighton Johnson, CISA, CISM, CIFI, CISSP

With the advent of the Internet of Things (IoT) and the extensive use of big data, there are 5 key areas for auditors and security professionals to focus on when reviewing big data systems, IoT systems and their deployments. Read More >>


Detective and preventive controls can help organizations mitigate the vulnerabilities that could lead to data breaches. To provide organizations with strategies to keep their data secure, ISACA has partnered with Oracle to create the “Securing Data in the Age of Mega Breaches” webinar. Read More >>


ISACA invites you to volunteer as a subject matter expert (SME) to review the ISACA Privacy Principles and Program Management Guide draft. Read More >>

By Dan Zitting

Tick marks, in the internal audit context, emerged from use in external financial auditing. In financial statement audits, for which the core goal is to foot, sum, agree, tie and recalculate until the auditor is reasonably sure that the numbers presented are accurate, tick marks, such as the following, are very useful... Read More >>

Reviewed by Ibe Etea, CISA, CRISC, CA, CFE, CIA, CRMA

The CERT Guide to Insider Threats is a glossary of incidents and insider attacks that serves as a casebook and an in-depth reference on information security insider threats and fraud. This book is not only relevant to IT and security professionals, but also to entrepreneurs and business managers, as it helps to build profiles of criminal minds and fraudsters whose actions can lead to reputational damage and financial losses.