Listen to experts in cybersecurity, audit, governance and more as they explain the latest trends and issues facing professionals. Subscribe to the ISACA Podcast on iTunes, Google Play or SoundCloud.
 

Podcast Featured Podcast

New!  IoT, Machine Learning and Artificial Intelligence: Nothing to Fear
When some people think of machine learning and artificial intelligence, their thoughts go immediately to Skynet or devices taking over humankind. But machine learning and artificial intelligence can significantly improve the quality of everyone’s life, whether it be through applications at home or during medical procedures. In this security series podcast, we discuss machine learning and artificial intelligence and the benefits and challenges they pose.

 

Podcast 2018 Podcasts


IoT, Machine Learning and Artificial Intelligence: Nothing to Fear
SheLeadsTech Volume 2: How Women Can Capitalize on Opportunities in the Tech Workforce
ISACA Journal Volume 4:  The Promises and Jeopardies of Blockchain Technology  (View Article)
The State of Cybersecurity
ISACA 50th Anniversary Series: The Impact of Automation and Robotics
SheLeadsTech Volume 1: Mentors and Role Models in the Tech Workforce
ISACA Journal Volume 2:  Applying a Technological Integration Decision Framework to Innovation Governance  (View Article)
Reasonable Software Security Engineering  (View Perspectives Article)
ISACA Journal Volume 2:  Disaster Recovery Management in the Multimodal Era  (View Article)
ISACA Journal Volume 1:  Managing Availability in the Multi-Modal Era  (View Article)
ISACA Journal Volume 1:  Mistakes Happen—Mitigating Unintentional Data Loss  (View Article)
Meltdown and Spectre Vulnerabilities


Podcast 2017 Podcasts


ISACA Journal Volume 6:  Governance, Risk, Compliance and a Big Data Case Study  (View Article)
ISACA Journal Volume 5:  Anatomy of an IoT DDoS Attack and Potential Policy Responses  (View Article)
ISACA Journal Volume 5:  Information Security in the Multi-Modal Era  (View Article)
ISACA Journal Volume 4:  Social Media Rewards and Risk  (View Article)
Sustainability (View White Paper)
Implementing the NIST Cyber Security Framework (View White Paper)
COBIT 5 Principles: Where Did They Come From? (View White Paper)
ISACA Journal Volume 1:  The Automation Conundrum  (View Article)


Podcast 2016 Podcasts


ISACA Journal Volume 6:  Performance Measurement Metrics for IT Governance  (View Article)
ISACA Journal Volume 6:  The G7 and Cyber Security  (View Article)
ISACA Journal Volume 5:  Unsung Security Heroes  (View Article)
ISACA Journal Volume 5:  Balancing the Cybersecurity Battlefield  (View Article)
ISACA Journal Volume 4:  Chief Cyber Officer  (View Article)
ISACA Journal Volume 4:  Benefits and the Security Risk of Software-defined Networking  (View Article)
ISACA Journal Volume 3:  Challengeable Truths  (View Article)
ISACA Journal Volume 3:  Protecting Information—Practical Strategies for CIOs and CISOs  (View Article)
ISACA Journal Volume 2:  Weary Willie’s Guide to Cyberrisk Management  (View Article)
ISACA Journal Volume 2:  Auditing Agile—A Brave New World Podcast  (View Article)
ISACA Journal Volume 1:  Why Everyone Dislikes the IT Auditor and How to Change It  (View Article)
ISACA Journal Volume 1:  Cyber/Privacy  (View Article)


Podcast 2015 Podcasts


ISACA Journal Volume 6:  Cybersecurity for a “Simple” Auditor   (View Article)
ISACA Journal Volume 6:  The Criticality of Security in the Internet of Things  (View Article)
ISACA Journal Volume 5:  Stanley Baldwin’s Bomber  (View Article)
ISACA Journal Volume 5:  Addressing Cybersecurity Vulnerabilities  (View Article)
ISACA Journal Volume 4:  Are Software Flaws a Security Problem?  (View Article)
ISACA Journal Volume 4:  Three Ways to Simplify Auditing Software Security Requirements and Design  (View Article)
ISACA Journal Volume 3:  Frameworkers of the World, Unite II  (View Article)
ISACA Journal Volume 2:  Cyberwhatsit  (View Article)
ISACA Journal Volume 1:  Microwave Software  (View Article)