ISACA Journal: 2014 Editorial Calendar 

 

 
2014
For Authors For Advertisers
Issue Date Theme Drafts
Due*
Articles**
Due
Insertion
Due
Art Due Mail Date

Volume 1
Jan/Feb

Data Privacy
- Data protection laws and regulations globally
- Changes in data privacy law
- Enterprise’s responsibility around privacy
- Effect of mobile on privacy
- Privacy and data security in the cloud

19 Sep 13

21 Oct 13

20 Nov 13

27 Nov 13

2 Jan 14

Volume 2
Mar/Apr

The IT Audit Transformation
- Approaches to integrated audit—what to consider
- What enterprise areas lend themselves to good integrated audits?
- Risk of integrated audit
- Advisory services and IT’s role
- Data analytics and fraud
- Audit approach using COBIT 5
- Using automated audit tools, manual controls and/or automated controls

19 Nov 13

18 Dec 13

23 Jan 14

30 Jan 14

3 Mar 14

Volume 3
May/Jun

Big Data
- Use of analytics
- Case studies on what enterprises are finding as they tackle big data
- Ethical and compliance issues of big data
- Risk and compliance challenges of big data; audit of big data collectors and processing centers
- Legal issues, data ownership and custody of big data
- Why big data can also be “big junk.” How do you recognize what big data means for your company? Guidance on how to tackle this before getting into analytics, case studies, etc.

21 Jan 14

20 Feb 14

20 Mar 14

27 Mar 14

1 May 14

Volume 4
Jul/Aug

Governance and Management of Enterprise IT (GEIT)
- COBIT 5’s role in the sustainable business
- Information architecture
- Role of the board and the audit committee in GEIT
- Metrics around IT governance—How does the enterprise measure the initiative?

20 Mar 14

21 Apr 14

22 May 14

29 May 14

1 July 14

Volume 5
Sep/Oct

Mobile Devices
- BYOD
- BYOD- and mobile-related regulations
- What should be the internal audit concerns around BYOD?
- Corporate policies around BYOD
- Endpoint security
- Risk of mobile devices—securing data, linking to PCs, replacing PCS, etc.
- Risk and security implications of using mobile apps for business
- Risk and security implications of developing mobile apps for consumer use
- Increased consumerization of technology

21 May 14

19 Jun 14

23 Jul 14

30 Jul 14

2 Sep 14

Volume 6
Nov/Dec

Upcoming Issues of the Year
- Internet availability threat
- Risk factors around SCADA systems and attacks
- Integrated automation
- New compliance issues
- New regulations
- Other new, innovative industry-related topics as they come to light

21 Jul 14

20 Aug 14

22 Sep 14

30 Sep 14

3 Nov 14

* Drafts Due date refers to the date by which all pending articles for the issue must be received for peer review. These drafts should be in what the author considers final form.
** Articles Due date is the date upon which all final revisions requested by the review committee/ISACA must be completed and submitted to the Journal staff. To learn more about the peer-review processs, please see the author guidelines.

Columns and Features in Every Issue:

  • Information Security Matters
  • IS Audit Basics
  • Cloud Computing
  • Five Questions With…
  • HelpSource Q&A
  • CPE Quiz
  • Crossword Puzzle