journal header

Volume 3, 2016

This Week's Online-Exclusive Feature

Technology and Regulatory Compliance in Global Organizations:
Stuck Between a Rock and a Hard Place

18 May 2016
Ola Bello, CISM, CISA

For big corporations, doing business in today’s world comes with the good (profits, shareholder satisfaction, growth into new and emerging markets), the bad (regulations, laws) and the ugly (competition).

The recent economic downturn that virtually brought the world to its knees was largely attributed to greed and avarice within the financial sector of the major economies “encouraged” by the lack of proper enforcement of regulations that the gatekeepers were supposed to enforce. According to Lord Adair Turner, speaking as chair of the UK Financial Services Authority on 6 February 2013, “The financial crisis of 2007 to 2008 occurred because we failed to constrain the financial system’s creation of private credit and money.” Read More >>

Indicates Online-Exclusive Content

 

 


This Week's Featured Author Blog

The Role of CIOs and CISOs
23 May 2016
Devassy Jose Tharakan, CISA, ISO 27001 LA, ITIL, PMP

Businesses of various sizes are extremely worried about information security. On a daily basis, we hear news of banks and financial institutions losing customer records, confidential information and money due to cyberattacks. Cyberattacks have increased exponentially over the last 5 years, and attack methods are becoming more sophisticated each day. On average, enterprises take about 100 days to identify an attack. It takes even more time to investigate, plug the gaps and prevent similar incidents. The goal of my recent Journal article is to help enterprises and security leaders realign the strategy of their information security teams by empowering the chief information officer (CIO) and the chief information security officer (CISO). Read More >>

Indicates Online-Exclusive Content

 

 


What's New for Nonmembers

IS Audit Basics Articles

Auditing IS/IT Risk Management, Part 2

Auditing IS/IT Risk Management, Part 1

Is There Such a Thing as a Bad IS Auditor? Part 2

Is There Such a Thing as a Bad IS Auditor? Part 1

Trust, but Verify

Auditors and Large Software Projects, Part 3

 

Full Journal Issues

Volume 3, 2015 Governance and Management of Enterprise IT (GEIT)

Volume 2, 2015 Opportunities and Challenges of New Technology

Volume 1, 2015 Analytics and Risk Intelligence

Volume 6, 2014 Cybersecurity

Volume 5, 2014 Mobile Devices

Volume 4, 2014 Governance and Management of Enterprise IT (GEIT)