journal header

Volume 5, 2016

This Week's Online-Exclusive Feature

Data Lineage and Compliance
26 October 2016
Eva Sweet, CISA, CISM

Data lineage is gaining momentum as the volume of data and complexity of systems environments and compliance requirements continue to grow. For those unfamiliar with the concept, data lineage is a way of looking at an organization’s data throughout the entirety of their cycle—from original to final destination—by creating a visual representation of the flow of data throughout the organization.

Data architecture and data governance activities can be bolstered by data lineage. Specifically, these activities rely on metadata (data about the data). Read More >>

Indicates Online-Exclusive Content



Podcast  New!
ISACA Journal Volume 5 Podcasts

This Week's Featured Blog

Reducing the Gender Disparity in Cyber Security
24 October 2016
Daksha Bhasker, CISM, CISSP

Bletchley Park is great historical evidence that women do well as contributors to national security, intelligence and technology development. At its peak, Bletchley Park, the British government’s Code and Cipher School, employed about 7,000 women in its 10,000-person code-breaking operations of the German Enigma machine during World War II. The age and education of the women in this intelligence operation varied, ranging from high school graduates at 17 years old to linguists, mathematicians and talented crossword puzzle solvers. Diversity in gender and skills were integrated successfully in cryptanalysis and some of the world’s most critical security operations. Read More >>

Indicates Online-Exclusive Content



What's New for Nonmembers

IS Audit Basics Articles

The Soft Skills Challenge, Part 5

The Soft Skills Challenge, Part 4

Elements of an IS/IT Audit Strategy, Part 2

Elements of an IS/IT Audit Strategy, Part 1

Auditing IS/IT Risk Management, Part 3

Auditing IS/IT Risk Management, Part 2

Auditing IS/IT Risk Management, Part 1


Full Journal Issues

Volume 5, 2015 Cybersecurity

Volume 4, 2015 Regulations & Compliance

Volume 3, 2015 Governance and Management of Enterprise IT (GEIT)

Volume 2, 2015 Opportunities and Challenges of New Technology

Volume 1, 2015 Analytics and Risk Intelligence

Volume 6, 2014 Cybersecurity