ISACA Now Blog


 ‭(Hidden)‬ Admin Links

Knowledge & Insights > ISACA Now

Look Back at ISACA’s First Half-Century – and Into the Future

Rob Clyde, CISM, Vice-Chair of ISACA Board of Directors, Executive Chair, White Cloud Security
Posted: 2/19/2018 3:36:00 PM | Category: ISACA | Permalink | Email this post

Rob ClydeConsider the year 1969. The Beatles played their last concert. The Godfather was a best-seller. Astronaut Neil Armstrong became the first human to set foot on the moon. The microprocessor was invented – although it would be another two years before the Intel 4004 processor helped launch the personal computer revolution.

While technology had come a long way by 1969, “state of the art” was primitive by today’s standards. In the mid-1960s, punch cards, batch systems and 7.5-megabyte removable disks were still used to operate mainframe systems. Given the vast benefits of computerization, however, businesses and governments were wholeheartedly investing in technology. The number of computers installed in US-based companies increased fourfold between 1962 and 1967.


Organizations Outside the EU Must Not Overlook GDPR Requirements

Dragan Jovicic, CISA, CIA, CRMA, Information Security Audit Manager, Serbia
Posted: 2/15/2018 3:00:00 PM | Category: Privacy | Permalink | Email this post

Dragan JovicicWith less than 100 days to 25 May, many organizations outside the European Union have the same question: “Does the General Data Protection Regulation (GDPR) apply to my organization?”

The answer has to be “it depends” – although this is an answer that no one likes. You cannot immediately say yes or no. Instead, you need to take a step-by-step approach to identify the requirements of GDPR, the organization’s connection with the personal data of EU citizens and consult an attorney specializing in GDPR as needed. The answer to this question can only be given based on an analysis of the organization’s operations and usage of personal data, based on Article 3, which defines territorial scope. This article is really important for organizations outside of the EU to determine whether they need to adhere to GDPR. The article states that organizations must comply with GDPR if they offer goods or services to EU citizens, even without payment, or monitor behavior of EU citizens (data subjects). In today’s digital world, these practices are not rare.


Representing Australia, SheLeadsTech and ISACA at United Nations a Dream Come True

Jo Stewart-Rattray, CISA, CISM, CGEIT, CRISC, FACS CP, board director of ISACA, chair of ISACA’s Women’s Leadership Council and director of information security and IT assurance at BRM Holdich
Posted: 2/15/2018 9:15:00 AM | Category: ISACA | Permalink | Email this post

Jo Stewart-RattrayGrowing up as a girl from the Australian bush, the United Nations was a long distance away, physically speaking, but not as far from my thoughts as one might think.

You see, I was a big Audrey Hepburn fan, and Hepburn’s service as a goodwill ambassador for the United Nations International Children’s Emergency Fund placed UN participation on my radar as a worthy, albeit improbable, dream to which I should aspire.

I am blown away that this dream is about to come true.

I will soon be part of the official Australian government delegation to the 62nd session of the UN Commission on the Status of Women. The session, which will take place 12 March to 23 March at UN headquarters in New York, will focus on how technology can help empower rural girls and women. It will be an honor to collaborate with Gillian Bird, the Australian ambassador to the UN, the Honourable Kelly O’Dwyer, Australia’s Minister for Women, and several other distinguished Australians to address a topic about which I am extraordinarily passionate. I will serve as one of only two members of the Australian delegation who work outside government.


The 6 Most Important Qualities of a SAP Implementation Partner

Larry Alton, Writer,
Posted: 2/14/2018 3:05:00 PM | Category: Risk Management | Permalink | Email this post

Larry AltonIf you’re not seeing the results you want, you may need to switch SAP implementation partners. SAP implementation is becoming more important than ever, with revenues from enterprise resource planning (ERP) software expected to reach $84.1 billion by 2020, according to Apps Run the World. Not only does this technology help your organization become more efficient, but your top competitors are following suit – so you’ll need to increase your pace and attention if you want to keep up.


When it Comes to Cyber Risk, Execute or Be Executed!

Brigadier General, USAF (ret) Gregory Touhill, CISSP, CISM, Former US CISO, President, Cyxtera Federal Group
Posted: 2/12/2018 3:07:00 PM | Category: Security | Permalink | Email this post

Gregory TouhillNestled in William Craig’s book Enemy at the Gates, which recounts World War II’s epic Battle of Stalingrad, is the story about a Soviet division that was plagued by failure in the face of the enemy. Desertions were rising, officers’ orders were not being followed, and the invading enemy was making gains. Faced with this calamitous condition, the regimental commander called the troops into formation and let them know that collectively, they were failing and would be held responsible. Then, in an outrageously cold manner, he walked through the ranks and summarily executed every 10th soldier until six soldiers lay dead on the field. He got their attention, and the unit was instrumental in the subsequent Soviet counterattack that led to victory against the Nazi invaders.

<< First   < Previous     Page: 1 of 181     Next >   Last >>

 About This Blog


This blog is intended to offer a way for ISACA leaders, constituents and staff to exchange information of interest pertinent to the association, the business environment and/or the profession.

The comments on this site are the author’s own and do not necessarily represent ISACA’s opinions or plans. ISACA does not endorse, monitor or control any links to external sites offered in this blog, and makes no warranty or statement regarding the content on those external sites.

Anyone posting comments on this site should ensure that the content remains on-topic and steers well clear of any statements that could be considered insensitive, offensive or threatening. Given ISACA’s global nature, the need to communicate in a way that is accessible and acceptable to many cultures should be taken into account. ISACA retains the right, at its sole discretion, to refuse content that is considered inappropriate.


To volunteer to write a blog or suggest a topic send an email here.