Miami, Florida, 2-5 March 2020
Improve audit quality and risk assessment with the latest in-demand know-how.
Earn up to 32 CPEs!
Master foundational skills vital to any technical cybersecurity role in 12 hands-on instructional labs.
Stay ahead of trends and tools across your professional landscape.
SAVE US$250 NOW
That's right, YOU are awesome. To prove it get certified with ISACA's credentials.
ISACA is Your Career
Make a name for yourself. Stand out. Grow. All with the support of your family at ISACA.
Resumés/CVs may list your experience and knowledge, but an ISACA certification designation after your name proves it.
ISACA is Community
As a member you get more than just discounts, you get family. A family of like minds to share ideas successes and passion for IT Audit, Risk, Security and Governance.
Be one with a membership community more than 145,000 strong and growing every year. ISACA’s member network extends globally, and with over 220 local ISACA chapters around the world, meets you where you are. Become our community
Be a part of ISACA’s community. Gain the insights of like-minded professionals. Share your know-how, enthusiasm and volunteer spirit. Explore upcoming events. Engage with a world of people and exciting possibilities for professional and personal growth. Begin engagement
ISACA is Enterprise
ISACA’s Enterprise Solutions not only builds stronger teams and organizations, we offer smart solutions — designed and delivered by certified experts!
Build your team’s know-how and skills with customized training
ISACA has been helping IS/IT professionals and the enterprises they serve for 50 years and counting. Our Corporate Training helps build team effectiveness and stakeholder confidence in enterprises worldwide.Start Training
Affirm your employees’ expertise, elevate stakeholder confidence
More than 200,000 practitioners and managers have earned ISACA certifications that affirm them among the world’s most trusted information systems and cybersecurity professionals.Certify your Team
Assess and improve your enterprise performance
Whether you’re talking about protecting your organization from growing cyber threats or ensuring a new medical device works optimally and safely—the best first step starts with self-assessment using ISACA®’s CMMI® Institute models.Assess your organization
Get ahead of the knowledge, skills, networking and career curve. Discover opportunities galore with all that’s new from ISACA.
Capability Counts 2020 | 21-22 April | ISACA | CMMI
Build Capability. Drive Performance. Deliver Results.
Julia Kanouse Joins ISACA Leadership Team as Senior Vice President of Membership
Bringing a rich tech background and executive experience in the association sector, Julia Kanouse has joined the leadership team at ISACA as senior vice president of membership.16 January 2020
Another Buzzword Demystified Zero Trust Architecture
I recently attended a security conference with multiple speakers covering a wide variety of topics – one of the topics, “Zero-Trust Architecture” (ZTA), was being addressed by one of the vendors, and I decided to sit-in to listen.14 January 2020
CCPA’s Do Not Sell: It’s Here, But What Does It Mean?
So, the California Consumer Privacy Act (CCPA) went into effect – and, the world didn’t burn. Companies have many issues to contend with, but one in particular has presented challenges to businesses that sell personal information.22 January 2020
Address the Challenges of SD-WAN
Software-defined wide area networking (SD-WAN) is a useful tool to view an organization’s network architecture. But while it can be useful, its lack of security
A New Rubric for IT Retention and Recruiting
Most organizations know how to respond to malicious outsiders who may try to steal sensitive data. But what about the insider threat? In this podcast, we discuss ways to protect against the insider threat, and we use the example of a distillery to show the steps you can take to protect your data.14 May 2019
IA Data Analytics & Automation Training Week | ISACA
Training Week - IA Data Analytics & Automation. Utilize Digital Internal Audit (analytics, robotic automation, and cognitive intelligence) to improve audit quality.
Encrypted Things – Network Detection & Response in an Encrypted World
There has been tremendous growth in the percentage of network traffic that is encrypted over the last decade. With this comes many challenges for incident responders. Decrypting the traffic is often hard. The rise in encrypted traffic has increased privacy for users but we know that threat actors take advantage of it. As network defenders our visibility is impacted, and traditional network monitoring detection will not always work. Learn about the problem of encrypted traffic as it pertains to network detection and response, review new developments in SSL/TLS, and see how you can hunt and detect badness in encrypted traffic.Archived: 17 December 2019
Every year, enterprises collect, process and accumulate a massive amount of data from a variety of internal and external sources. The data constitute both an asset (for decision making) and a risk (in e-discovery). In the wake of legislative action at both the (US) federal and state levels and to mitigate risk, enterprises are looking to technology to help them search, classify, preserve and present discoverable electronically stored information.
The Future of IT Audit
Since 1969, ISACA has helped auditors navigate the technology shifts impacting the profession. In its 50th anniversary year, ISACA has conducted a global survey of more than 4,000 auditors to take their pulse on the changes impacting their roles, their career paths and their organizations. By and large, auditors are optimistic—but there is no question that significant changes are coming their way: from the encouraging (earlier involvement in major tech projects) to the daunting (a potential decline in jobs due to increasing use of AI). Download the survey resources on this page to get a sense of the changes coming and how auditors can future-proof their careers.
Advanced Persistent Threats: How to Manage the Risk to Your Business
This book explains the nature of the security phenomenon known as the advanced persistent threat (APT). It also provides helpful advice on how to assess the risk of an APT to the organization and recommends practical measures that can be taken to prevent, detect and respond to such an attack. In addition, it highlights key differences between the controls needed to counter the risk of an APT attack and those commonly used to mitigate everyday information security risk.FREE MEMBER PREVIEW