journal header

Volume 5, 2016

This Week's Online-Exclusive Feature

Preparing Financial Firms for Cybersecurity Threats and Protecting Their Reputations
19 October 2016
Peter Tessin, CISA, CRISC, CGEIT

It is difficult to deny the impact of cyber security threats on businesses worldwide. In 2015, the average total cost of a data breach (including customer turnover, reputation losses and damaged goodwill) was US $3.79 million, up from US $3.52 million in 2014. In the first five months of 2016, nearly 320 million records were breached; among those breaches, 11.37 percent occurred in financial firms. Although 23 percent of the breaches that occurred through the first five months of 2016 were due to accidental loss, those are far outweighed by malicious acts by outsiders (58 percent), insiders (14 percent), and nation-states and hacktivists (2 percent each). Read More >>

Indicates Online-Exclusive Content



Podcast  New!
ISACA Journal Volume 5 Podcasts

This Week's Featured Blog

Practical Considerations in Planning an Open-source Security Monitoring Infrastructure
17 October 2016
Furkan Caliskan, CISA

It is not a trivial job to deploy a large-scale, open-source security monitoring infrastructure. Although you can use an easy-to-install open source solution, e.g., Security Onion, planning and knowing what to do is still an essential part of the project.

There are several considerations that need to go into this planning... Read More >>

Indicates Online-Exclusive Content



What's New for Nonmembers

IS Audit Basics Articles

The Soft Skills Challenge, Part 5

The Soft Skills Challenge, Part 4

Elements of an IS/IT Audit Strategy, Part 2

Elements of an IS/IT Audit Strategy, Part 1

Auditing IS/IT Risk Management, Part 3

Auditing IS/IT Risk Management, Part 2

Auditing IS/IT Risk Management, Part 1


Full Journal Issues

Volume 5, 2015 Cybersecurity

Volume 4, 2015 Regulations & Compliance

Volume 3, 2015 Governance and Management of Enterprise IT (GEIT)

Volume 2, 2015 Opportunities and Challenges of New Technology

Volume 1, 2015 Analytics and Risk Intelligence

Volume 6, 2014 Cybersecurity