Check back often for updates in the knowledge center and for newly added presentations in the archives!
Posted by syras 18 hours ago | 0 comments
When a substantive audit is being performed where application controls are not being relied upon, could there be risk that needs to be tested, or at least identified, by an IT auditor even if application controls are not playing a role?
Jeffrey T. Hare, CISA, CIA, CPA 5 days ago | 0 comments
Conditions are changing faster. Governance roles must react quickly when they evaluate more conflicting issues and stakeholders must select appropriate options and solutions.
Graciela Braga, CGEIT 5 days ago | 0 comments
Digital advancements fuel innovative ways of doing things, spawn new industries and radically transform how people interact on a global scale.
Gregory J. Touhill, CISM, CISSP 7 days ago | 0 comments
Today’s ever-increasing legal and regulatory requirements place more onus on organizations to exercise due care in protecting and controlling the Agile development process.
Michael Bergman, CRISC, CISSP 12 days ago | 0 comments
You must log in to view Knowledge Center Topic updates.
Content coming soon!
March 2018 - Jennifer Mak, Chris Olson, EY
2018 Top Cybersecurity Risks and Areas of Focus
November 2017 - Chris Covell, Absolute Software
Building an Effective Endpoint Risk Program
Cost of Insecure Endpoints
September 2017 - Amie Searly, University of Washington
Malicious Insider Threats and Conduct Risk
May 2017 - Eva Benn & Swarnika Mehta, KPMG LLP
Cyber & GRC Metrics That Tell a Story
2/16/16 ISACA PSC Luncheon
IAM Intelligence Overview
10/18/2016 Luncheon Presentation
Simulated Cybersecurity Incident
9/20/2016 Luncheon Presentation by Vanessa Pegueros
Lessons Learned from Treating Trauma
5/17/2016 Luncheon Presentation by Jody Cedola and Robert Kaler
Identifying Cybersecurity Threats and Evaluating IT Controls
2016 Spring Seminar Presentation by Kevin Tam
2016 Spring Seminar Presentation by Daniel Hansen
Protiviti Breach Kill Chain Model
2016 Spring Seminar Presentation by Jack Jones
Getting Serious About Cyber Security
2016 Spring Seminar Presentation by Sean P. Murphy
Cybersecurity in Healthcare
2016 Spring Seminar Presentation by Michael C. Boyd
3/15/16 ISACA PSC Luncheon: Microsoft Retail
The Security and Privacy Story
IAM Intelligence Overview
9/16/15 ISACA PSC Luncheon
Institutional Considerations for Managing IoT Risk
5/19/15 ISACA PSC Luncheon Migrating Applications to the Cloud
3/23/15 ISACA PSC Seminar Houston We Have Several Problems
3/23/15 ISACA PSC SeminarSensitive Data in the AWS Cloud
3/24/15 ISACA PSC Seminar Privacy and Measurement
3/24/15 ISACA PSC Seminar Why Do We Care
10/20/15 ISACA PSC LuncheonWhy We are Failing