journal header

Volume 3, 2015

This Week's Online-Exclusive Feature

Book Review: Information Governance: Concepts, Strategies and Best Practices
13 May 2015
Upesh Parekh, CISA

“By 2016, one in five chief information officers in regulation industries will be fired from their job for a failed information governance (IG) initiative.” If this quote does not jolt the reader of Information Governance: Concepts, Strategies and Best Practices out of any doubt about the importance of information governance, then what will?

Like many predictions made in this dynamic information era, some may challenge this as an exaggeration. But the information provided in Information Governance: Concepts, Strategies and Best Practices may make this suggestion appear to be an understatement. Read More

Indicates Online-Exclusive Content

 

 


Podcast  New!
ISACA Journal Volume 2 Podcast:  Cyberwhatsit

This Week's Featured Author Blog

APT and Social Engineering: With New Threats Come New Assessment Methodologies
18 May 2015
Roberto Puricelli

During the last few years, companies have evolved exponentially through the adoption of new technologies, devices and habits that allow them to improve the business from one side, but also to be more vulnerable to cyberattacks from the other. As the attack surface expands and cyberattacks evolve using different techniques and vectors, companies need to adapt their assessment methodologies, going beyond the traditional vulnerability and malware identification or data loss prevention.

For example, consider advanced persistent threats (APT). They are probably the most dangerous threats. They target specific companies and rely on social engineering as the main vector to gain access to inner information and communications technology (ICT) systems. In order to face these threats, companies should start considering possible tools or methodologies to evaluate their risk and the real extent of their exposure. Read More

Indicates Online-Exclusive Content

 

 


What's New for Nonmembers

IS Audit Basics Articles

The Soft Skills Challenge

Successful Audits Do Not Just Happen

Perspectives From a Seasoned Practitioner

The Core of IT Auditing

What Every IT Auditor Should Know About Computer-generated Reports

Beyond the IT in IT Audit (Part 2)

 

Full Journal Issues

Volume 3, 2014 Big Data

Volume 2, 2014 The IS Audit Transformation

Volume 1, 2014 Data Privacy

Volume 6, 2013 Security and Compliance

Volume 5, 2013 Integrated Business Solutions

Volume 4, 2013 Language of Cybersecurity