Current Issue: Volume 2  25 January 2017

@ISACA is a biweekly publication available from this page and delivered via email to ISACA members and subscribers. This electronic newsletter feature timely industry and ISACA news, as well as featured and updates relevant our readers.


Tips From Industry Experts

By Bruce R. Wilkins, CISA, CRISC, CISM, CGEIT, CISSP

Biological measurements are one of the oldest techniques used for identification. You may know it as anthropometry. This process of measuring different parts of the human body to identify an individual was developed during the early 1700s and was used in criminal profiling as early as the 1940s. Read More >>


ISACA News

COBIT 5 is a useful framework for resolving business problems, and seeing how it can be implemented helps practitioners better leverage it. To help enterprises learn how to use COBIT 5 to address problems, ISACA is presenting the Solving Business Problems with COBIT 5 webinar. Read More >>


ISACA News

With the proliferation of connected devices, people and enterprises are becoming more concerned about their privacy. But emerging technologies and legal requirements can make implementing a privacy management program challenging. By aligning privacy principles with commonly used privacy standards, frameworks and good practices, the Privacy Principles and Program Management Guide can be used to help enterprises overcome common privacy concerns. Read More >>


ISACA News

It is necessary for enterprises to have an information security policy, but an outdated policy can do significant harm to an organization. ISACA Journal volume 1 author David Eduardo Acosta R., CISA, CRISC, CISM, BS 25999 LA, CCNA Security, CEH, CHFI Trainer, CISSP Instructor, PCI QSA, OPST, discusses the ways in which work-to-rule can undermine an information security strategy in his article “Smashing the Information Security Policy for Fun and Profit.” Read More >>