journal header

Volume 4, 2016

This Week's Online-Exclusive Feature

Privacidad en era de la monitorización y la vigilancia
27 July 2016
Jeimy J. Cano, Ph.D, CFC, CFE, CMAS

Estamos en un momento de la humanidad donde las tensiones geopolíticas, establecen momentos de incertidumbre, de dudas y miedos. No es posible prever las acciones de los países ni establecer con claridad sus intenciones. El mundo vive momentos de paz tensa donde todos de alguna manera observan a los otros, como una forma de tratar de entender y anticipar que puede pasar y no estar desprevenido.

La necesidad de conocer y saber está desbordada como quiera que quien no tiene la capacidad de explorar y pronosticar los próximos pasos de su inmediato competidor clave, está en desventaja y será presa de los sistemas de inteligencia de otros y lo que es peor, será desnudado sobre sus estrategias y ventajas competitivas para su sector de negocio. Read More: Spanish >>Read More: English >>

Indicates Online-Exclusive Content

 

 


This Week's Featured Blog

Managing the Enterprise Mobile App Security Environment
25 July 2016
Mohammed J. Khan, CISA, CRISC, CIPM

Look around you and, in fact, at your own behavior, it is true that we are living in the age of mobility and it is getting more mobile every day. At first, it was an enterprise-driven mobile movement in the ‘90s, and soon after the Internet boom, consumer mobility platforms took over. We now see a parallel cross-integration between the consumer- and enterprise-driven mobile solutions in the workforce. This trend tells us that the chance of employees utilizing their own devices but conducting work-related activities will, in due time, result in a major financial loss, legal or governmental issues, or reputational risk because of the loss of a mobile device or data due to insecure mobile technology. Read More >>

Indicates Online-Exclusive Content

 

 


What's New for Nonmembers

IS Audit Basics Articles

Elements of an IS/IT Audit Strategy, Part 1

Auditing IS/IT Risk Management, Part 3

Auditing IS/IT Risk Management, Part 2

Auditing IS/IT Risk Management, Part 1

Is There Such a Thing as a Bad IS Auditor? Part 2

Is There Such a Thing as a Bad IS Auditor? Part 1

 

Full Journal Issues

Volume 4, 2015 Regulations & Compliance

Volume 3, 2015 Governance and Management of Enterprise IT (GEIT)

Volume 2, 2015 Opportunities and Challenges of New Technology

Volume 1, 2015 Analytics and Risk Intelligence

Volume 6, 2014 Cybersecurity

Volume 5, 2014 Mobile Devices