Current Issue: Volume 2  28 January 2015

@ISACA is a biweekly publication available from this page and delivered via email to ISACA members and subscribers. This electronic newsletter feature timely industry and ISACA news, as well as featured and updates relevant our readers.


Tips From Industry Experts

Leighton Johnson
Leighton Johnson, CISA, CISM, CIFI, CISSP

The primary goals for any incident response effort often get lost when responding to outside events, especially those involving data breaches. This confusion may occur since everyone is, due to statutory and regulatory requirements, focused on notifying affected customers. Read More


The ISACA Journal strives to find new ways to bring you the information you need. In addition to providing new weekly online-exclusive content, the ISACA Journal is introducing a podcast to accompany each volume of the Journal. Read More

The most likely source of a data breach is an internal actor—an employee, contractor or partner. And although employees may unintentionally cause a data breach, it is important to have an identity management strategy in place to minimize this risk. Read More


ISACA’s certifications combine the achievement of passing an exam with proven work experience, giving you the credibility you need to advance in your career. Certification proves to employers that you have what it takes to add value to their enterprise. Read More


Volunteer Applications

Your opportunity to submit an application for the 2015-16 volunteer term will soon come to a close. The invitation to participate application period ends on Thursday, 12 February 2015. Act now and apply to participate on one of ISACA’s volunteer bodies.

Volunteering provides you an opportunity to collaborate with peers around the world, ensuring successful certification programs, insightful research and guidance, comprehensive and timely education programs, and representative professional standards. Read More


Vernon Mark Lomberg

The Certified Information Systems Auditor (CISA) certification helped Lomberg’s career by giving his expertise more credibility. “The certification gave me the all-around knowledge to be a good IT auditor because it covers each area in depth,” he says. “It also provides the recognition to others that you have the IT knowledge to apply in the real world.” Read More


Applied Cyber Security and the Smart Grid
Reviewed by Ibe Etea, CISA, CRISC, ACA, CFE, CIA, CRMA, ISO 9001:2008 QMS

Applied Cyber Security and the Smart Grid by Eric D. Knapp and Raj Samani explores a relatively new information security topic. This book is a valuable resource considering the relevance of the smart grid to not just the information security realm, but also to its application to modern existence and industry.