Current Issue: Volume 24  30 November 2016

@ISACA is a biweekly publication available from this page and delivered via email to ISACA members and subscribers. This electronic newsletter feature timely industry and ISACA news, as well as featured and updates relevant our readers.


Tips From Industry Experts

By Sunil Bakshi, CISA, CRISC, CISM, CGEIT, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP

Recently, the term “cyber security” has been used more often to describe the protection of sensitive information. Prior to this, “information security” was the more commonly used term. Recently, a regulator expected reporting authorities to develop cyber security policies that were distinct from information security policies. Read More >>


ISACA News

A cyberattacker who has control of a privileged account or an insider working against an enterprise can cause significant damage. Threat analytics are essential to detect and mitigate breaches, but only 1% of breaches are detected by monitoring programs. To help enterprises better leverage threat analytics, ISACA has partnered with CA Technologies... Read More >>


ISACA News

With the growing concern surrounding cyber security, it is becoming increasingly important to audit technology and related processes. To help auditors better complete this task, ISACA is offering the “Suggested Tips Auditors Need to Know About Cyber Security” webinar. Read More >>


ISACA News

Exams for ISACA’s Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC), Certified Information Security Manager (CISM) and Certified in the Governance of Enterprise IT (CGEIT) certifications are being offered in 2017 through computer-based testing, providing exam takers with increased scheduling flexibility and decreased turnaround time for exam results. Read More >>


ISACA News

Are you an industry expert, thought leader or passionate professional willing to share your experiences, insights and knowledge with colleagues and peers? Become an author for ISACA content such as white papers, books and audit programs. To participate, candidates should send a brief research abstract on one of the following topics to Research@isaca.org... Read More >>


By David Brand

The results of Protiviti’s 2016 Internal Audit Capabilities and Needs Survey show 2 differentiators between top performers and the rest of the pack—a high level of board engagement in information security and the inclusion of cyber security in the audit plan. Read More >>