Current Issue: Volume 15  24 July 2019

@ISACA is a biweekly publication available from this page and delivered via email to ISACA members and subscribers. This electronic newsletter features timely industry and ISACA news, as well as features and updates relevant to our readers.


Tips From Industry Experts

Lisa Young
By Lisa Young, CISA, CISM

News outlets across the world report that organizations of all types continue to suffer grave impacts from cyberthreats and incidents. Those organizations that have not yet experienced such an event find themselves wondering if the latest ransomware attack or personally identifiable information (PII) data breach could impact their enterprise. Read More >>


Learn, Network and Volunteer With Peers Around the World
ISACA News

Engage—ISACA’s online portal in which professional community members can learn, network and participate—will celebrate its 1-year anniversary in September 2019. The platform offers online discussion boards, global networking and volunteer opportunities. In the 9 months since ISACA transitioned to the new platform, participation has steadily grown. Read More >>


Listen and Learn More About the Baltimore Ransomware Attack
ISACA News

A ransomware attack leveraging an unpatched vulnerability affected several of Baltimore (Maryland, USA)’s, government services. In the recent Cyber Pros Exchange episode of the ISACA Podcast, Frank Downs and Dustin Brewer, 2 of ISACA’s in-house security experts, discuss how this ransomware attack occurred, the services it affected and lessons learned from this attack. Read More >>


ISACA News

What must the third line of defense do to evaluate the effectiveness of the IT risk management program? Regulators already expect that the first and second lines of defense operate mature IT risk management programs around complex IT systems. Failure to design and manage effective IT risk management functions could result in exposure to material business risk, inadequate prioritization of risk remediation efforts and the excessive cost for IT risk mitigation. Read More >>