ISACA Journal: 2015 Editorial Calendar 

 

2015
For Authors For Advertisers
Issue Date Theme Drafts
Due*
Articles**
Due
Insertion
Due
Art Due Mail Date

Volume 1
Jan/Feb

Analytics and Risk Intelligence
- How analytics is affecting auditing
- Visualization
- Auditing in In-memory
- Risk intelligence analytics
- Risk metrics
- Knowledge and risk management and education
- Dissemination of knowledge
- Threat actors and threat intelligence
- Entire life cycle of risk and how assumed risk adds value
- Big data
- Data analytics
- People perspective/the human factor related to analytics and risk intelligence
- What can be learned from ethical hacking

22 Sep 14

20 Oct 14

20 Nov 14

26 Nov 14

2 Jan 15

Volume 2
Mar/Apr

Internet of Things
- What is the Internet of Things?
- What is the potential risk of Internet of Things? What are the solutions?
- Privacy issues related to Internet of Things
- Why is Internet of Things an issue?
- Securing a connected business/home
- Security of software on devices
- Insecurity of Bluetooth, Wi-Fi, etc.—how does an enterprise protect itself?
- How to better protect the enterprise —disconnecting is not an option
- Dangers of connected appliances—how to protect one’s information
- Auditing Internet of Things
- People perspective/the human factor related to Internet of Things

20 Nov 14

18 Dec 14

21 Jan 15

28 Jan 15

2 Mar 15

Volume 3
May/Jun

Governance and Management of Enterprise IT (GEIT)
- Using COBIT 5 with COSO 2013
- Empowering audit committees when it coming to IT
- Obligations for governance
- COBIT 5’s role in the sustainable business
- Role of the board and the audit committee in GEIT
- Knowledge management
- Metrics around IT governance—How does the enterprise measure the initiative?
- People perspective/the human factor related to GEIT

21 Jan 15

20 Feb 15

23 Mar 15

30 Mar 15

1 May 15

Volume 4
Jul/Aug

Regulations and Compliance
- COSO
- Distributed controls
- Breakdown by industries
- EMV Chip-and-PIN system—reducing fraud at PoS
- Replacement of EU Data Direction Protective
- Privacy laws
- Ensuring the accuracy of what one is auditing for compliance
- PCI DSS compliance
- Compliance from the perspective of the PCI Security Standards Council
- Case studies related to compliance
- Case studies on lessons learned from recent breaches
- How regulations are changing the way we do business
- Audits relationship to compliance
- People perspective/the human factor related to regulations and/or compliance

19 Mar 15

20 Apr 15

20 May 15

27 May 15

1 July 15

Volume 5
Sep/Oct

Cybersecurity
- What is cybersecurity?
- Risk assessment of cybersecurity
- Potential controls
- Litigation related to cybersecurity issues—why controls are needed
- Philosophy of cybersecurity
- Simulating cyberattacks/incident response
- Assessment perspective—where are we now? Where do we want to be?
- Response to an incident
- Resolving cybersecurity issues
- High-level remediation
- Low-level remediation
- Auditing cybersecurity
- Cybersecurity professional from cradle to grave
- People perspective/the human factor related to cybersecurity

20 May 15

22 Jun 15

22 Jul 15

29 Jul 15

1 Sep 15

Volume 6
Nov/Dec

Upcoming Issues of the Year
- New, innovative industry-related topics as they come to light
- New issues related to the human factor
- New compliance issues
- New regulations

21 Jul 15

20 Aug 15

23 Sep 15

30 Sep 15

2 Nov 15

* Drafts Due date refers to the date by which all pending articles for the issue must be received for peer review. These drafts should be in what the author considers final form.
** Articles Due date is the date upon which all final revisions requested by the review committee/ISACA must be completed and submitted to the Journal staff. To learn more about the peer-review processs, please see the author guidelines.

Columns and Features in Every Issue:

  • Information Security Matters
  • IS Audit Basics
  • Cloud Computing
  • The Network
  • HelpSource Q&A
  • CPE Quiz
  • Crossword Puzzle