ISACA Now Blog


 ‭(Hidden)‬ Admin Links

Knowledge Center > ISACA Now

Detroit Chapter Hosts Student Cybersecurity Competition

Michael Talamonti, Graduate Student, Lawrence Technological University
Posted: 9/22/2016 1:48:00 PM | Category: Security | Permalink | Email this post

Editor’s note: ISACA’s Detroit Chapter recently sponsored its third annual Cybersecurity Scholarship Case Competition, which saw 25 students vying for $13,500 in prize money at the University of Detroit Mercy. Michael Talamonti, a Lawrence Technological University Masters of Science in IT student, was part of a winning team for the second consecutive year. Here is Talamonti’s account of the competition:

Participants in the ISACA Detroit Chapter’s Cybersecurity Scholarship Case Competition were presented with a case positioned around a general security theme and had 42 hours to investigate and prepare a presentation for a panel of judges. The judges were comprised of industry professionals specializing in cybersecurity. This year’s theme: social media.


Top Scorer Asks: Are You Ready for the CISM Exam?

Brian K. Johnson, CISA, CISM, CPA, CPIM, Senior Vice President, Technology Services, Allen, Gibbs & Houlik, L.C.
Posted: 9/21/2016 3:01:00 PM | Category: Certification | Permalink | Email this post

Are you interested in becoming a Certified Information Security Manager (CISM)? If so, are you ready for the exam?

The CISM exam is demanding, and it will be difficult to pass without adequate preparation. But realistic expectations and a reasonable plan can help.

I recently earned a CISM Worldwide Excellence Award for achieving the highest score in the world on the December 2015 CISM examination, and this is my advice based on that experience:


CSI: Cyber Creator Suggests Solutions to Skills Gap

Anthony Zuiker, Author, Creator, CSI Television Phenomenon
Posted: 9/20/2016 3:00:00 PM | Category: Security | Permalink | Email this post

ISACA Now recently talked to Anthony Zuiker, creator of the global television phenomenon CSI, including CSI: Cyber. Zuiker will present a 2016 CSX North America keynote address at the conference, which takes place in Las Vegas from 17-19 October. 

Zuiker is one of the most creative and multifaceted storytellers today. Bridging the gap between Silicon Valley and Hollywood, he entertains and educates global audiences on the threat of cybercrime through a major online storytelling experience, Cybergeddon. He also creates multiplatform “digi-novels” through his New York Times best-selling books Level 26, and has written the autobiography Mr. CSI. He will sign books after his presentation.


Krebs: Ransomware Getting More Targeted, Expensive

Brian Krebs, Investigative Journalist, Author, Krebs on Security
Posted: 9/16/2016 11:07:00 AM | Category: Security | Permalink | Email this post

Editor’s note:  The following is an excerpt of a recent blog by Brian Krebs that first appeared in Krebs is an investigative journalist, founder of Krebs on Security, and a former Washington Post reporter with a passion for computer security. He will be the opening keynote speaker at CSX 2016 North America, which takes place in Las Vegas 17-19 October. Krebs will share unique insights gained from years of research and writing, as well as his unprecedented access to some of the smartest and most innovative cyber minds on the planet. He shares how it is important to take risks, make mistakes and learn from them. After the presentation, Krebs will autograph copies of his book Spam Nation, a New York Times best seller.


Always Check the Boxes!

Subramanian Annaswamy, CISA, CAMS, CSQA
Posted: 9/15/2016 3:03:00 PM | Category: Audit-Assurance | Permalink | Email this post

“Don’t just check the box!” Chances are you have said or heard this phrase at some point in your career. In case you are not familiar with the term, it refers to a mechanical, “bare minimum” way of doing things. Sometimes it means simply not being creative in your approach. As I will explain, checking the box can actually be a very good strategy to uncover problems, especially if you are in a control assurance function. More precisely, I will call my strategy “Check the boxes.”

Let me take you back to the late ’90s when I was a novice IT auditor in a multinational organization. I had just made the switch to the audit profession after having been a systems developer for a few years.

<< First   < Previous     Page: 1 of 131     Next >   Last >>

 About This Blog


This blog is intended to offer a way for ISACA leaders, constituents and staff to exchange information of interest pertinent to the association, the business environment and/or the profession.

The comments on this site are the author’s own and do not necessarily represent ISACA’s opinions or plans. ISACA does not endorse, monitor or control any links to external sites offered in this blog, and makes no warranty or statement regarding the content on those external sites.

Anyone posting comments on this site should ensure that the content remains on-topic and steers well clear of any statements that could be considered insensitive, offensive or threatening. Given ISACA’s global nature, the need to communicate in a way that is accessible and acceptable to many cultures should be taken into account. ISACA retains the right, at its sole discretion, to refuse content that is considered inappropriate.


To volunteer to write a blog or suggest a topic send an email here.