News & Trends

Establishing a Triumvirate—Understanding the Interests for Enhancing Collaboration Between the CISO, the CIO and the CRO
Practically Speaking | View blog

Key Takeaways from a Recent Cloud Training
ISACA Now | View blog

Perceptions of Risk Owners and Risk Assessment
@ISACA | Subscribe

Never Waste a Good Information Security Incident
ISACA Journal | Subscribe

GEIT Framework at Work, Part 1: Identifying the Problem
COBIT Focus | Subscribe

PKI Explained: Why It Is Necessary and Relevant Now More Than Evere
The Nexus | Subscribe


State of Cyber Security 2018
> More on Cyber Security

Internal Control Using COBIT 5 video
> More on Governance/COBIT

Understanding Smart Contracts
> More on Research/Emerging Technologies

Highlights From RSA Conference 2018 
> View all white papers

Implementing a Privacy Protection Program: Using COBIT 5 Enablers With the ISACA Privacy Principles
> More on Privacy


Implementing the General Data Protection Regulation
Maintaining Data Protection and Privacy Beyond GDPR Implementation 
> View GDPR resources

Incident Response: Obfuscated JavaScript and Evil Adware Recognition

Bring Your Own Device (BYOD) Security Audit/Assurance Program

CIS Controls Audit/Assurance Program

Microsoft® SQL Server® 2016 Audit/Assurance Program 
> View all Audit/Assurance programs

Information Systems Auditing: Tools and Techniques — Creating Audit Programs
> More on Audit/Assurance

Infographic: What is Geolocation and How Does It Work?
> View Geolocation resources



Inspire IT innovation and fuel business success with COBIT 5,
the framework for the governance and management
of enterprise IT. More >>


Discover the latest jobs,
top-of-mind industry news, events and employment trends. Navigating a successful career in the IS industry made easy. More >>


Take advantage of ISACA member-exclusive, gold-standard insights from content partners. More >>


Find resources and connect
with members on topics
that interest you. Browse
more than 100 topics or
view the featured ones. More >> 


Explore research that results
in products that IT governance,
control, audit, risk and security professionals can use to add value to their enterprises. More >>


Study for certification
examinations or simply learn
new industry definitions
and phrases with ISACA's
interactive glossary. More >>