ISACA Journal: 2014-15 Editorial Calendar 

 

 
2014
For Authors For Advertisers
Issue Date Theme Drafts
Due*
Articles**
Due
Insertion
Due
Art Due Mail Date

Volume 4
Jul/Aug

Governance and Management of Enterprise IT (GEIT)
- COBIT 5’s role in the sustainable business
- Information architecture
- Role of the board and the audit committee in GEIT
- Metrics around IT governance—How does the enterprise measure the initiative?

20 Mar 14

21 Apr 14

22 May 14

29 May 14

1 July 14

Volume 5
Sep/Oct

Mobile Devices
- BYOD
- BYOD- and mobile-related regulations
- What should be the internal audit concerns around BYOD?
- Corporate policies around BYOD
- Endpoint security
- Risk of mobile devices—securing data, linking to PCs, replacing PCS, etc.
- Risk and security implications of using mobile apps for business
- Risk and security implications of developing mobile apps for consumer use
- Increased consumerization of technology

21 May 14

19 Jun 14

23 Jul 14

30 Jul 14

2 Sep 14

Volume 6
Nov/Dec

Upcoming Issues of the Year
- Internet availability threat
- Risk factors around SCADA systems and attacks
- Integrated automation
- New compliance issues
- New regulations
- Other new, innovative industry-related topics as they come to light

21 Jul 14

20 Aug 14

22 Sep 14

30 Sep 14

3 Nov 14

2015
For Authors For Advertisers
Issue Date Theme Drafts
Due*
Articles**
Due
Insertion
Due
Art Due Mail Date

Volume 1
Jan/Feb

Analytics and Risk Intelligence
- How analytics is affecting auditing
- Visualization
- Auditing in In-memory
- Risk intelligence analytics
- Risk metrics
- Knowledge and risk management and education
- Dissemination of knowledge
- Threat actors and threat intelligence
- Entire life cycle of risk and how assumed risk adds value
- Big data
- Data analytics
- People perspective/the human factor related to analytics and risk intelligence
- What can be learned from ethical hacking

22 Sep 14

20 Oct 14

20 Nov 14

26 Nov 14

2 Jan 15

Volume 2
Mar/Apr

Internet of Things
- What is the Internet of Things?
- What is the potential risk of Internet of Things? What are the solutions?
- Privacy issues related to Internet of Things
- Why is Internet of Things an issue?
- Securing a connected business/home
- Security of software on devices
- Insecurity of Bluetooth, Wi-Fi, etc.—how does an enterprise protect itself?
- How to better protect the enterprise —disconnecting is not an option
- Dangers of connected appliances—how to protect one’s information
- Auditing Internet of Things
- People perspective/the human factor related to Internet of Things

20 Nov 14

18 Dec 14

21 Jan 15

28 Jan 15

2 Mar 15

Volume 3
May/Jun

Governance and Management of Enterprise IT (GEIT)
- Using COBIT 5 with COSO 2013
- Empowering audit committees when it coming to IT
- Obligations for governance
- COBIT 5’s role in the sustainable business
- Role of the board and the audit committee in GEIT
- Knowledge management
- Metrics around IT governance—How does the enterprise measure the initiative?
- People perspective/the human factor related to GEIT

21 Jan 15

20 Feb 15

23 Mar 15

30 Mar 15

1 May 15

Volume 4
Jul/Aug

Regulations and Compliance
- COSO
- Distributed controls
- Breakdown by industries
- EMV Chip-and-PIN system—reducing fraud at PoS
- Replacement of EU Data Direction Protective
- Privacy laws
- Ensuring the accuracy of what one is auditing for compliance
- PCI DSS compliance
- Compliance from the perspective of the PCI Security Standards Council
- Case studies related to compliance
- Case studies on lessons learned from recent breaches
- How regulations are changing the way we do business
- Audits relationship to compliance
- People perspective/the human factor related to regulations and/or compliance

19 Mar 15

20 Apr 15

20 May 15

27 May 15

1 July 15

Volume 5
Sep/Oct

Cybersecurity
- What is cybersecurity?
- Risk assessment of cybersecurity
- Potential controls
- Litigation related to cybersecurity issues—why controls are needed
- Philosophy of cybersecurity
- Simulating cyberattacks/incident response
- Assessment perspective—where are we now? Where do we want to be?
- Response to an incident
- Resolving cybersecurity issues
- High-level remediation
- Low-level remediation
- Auditing cybersecurity
- Cybersecurity professional from cradle to grave
- People perspective/the human factor related to cybersecurity

20 May 15

22 Jun 15

22 Jul 15

29 Jul 15

1 Sep 15

Volume 6
Nov/Dec

Upcoming Issues of the Year
- New, innovative industry-related topics as they come to light
- New issues related to the human factor
- New compliance issues
- New regulations

21 Jul 15

20 Aug 15

23 Sep 15

30 Sep 15

2 Nov 15

* Drafts Due date refers to the date by which all pending articles for the issue must be received for peer review. These drafts should be in what the author considers final form.
** Articles Due date is the date upon which all final revisions requested by the review committee/ISACA must be completed and submitted to the Journal staff. To learn more about the peer-review processs, please see the author guidelines.

Columns and Features in Every Issue:

  • Information Security Matters
  • IS Audit Basics
  • Cloud Computing
  • The Network
  • HelpSource Q&A
  • CPE Quiz
  • Crossword Puzzle