journal header

Volume 5, 2017

This Week's Online-Exclusive Feature

The AREM Window

The AREM Window
27 September 2017
Jeimy J. Cano, Ph.D., CFC, CFE, CMAS

Businesses seeking to establish themselves in privileged positions in a digitally modified society must anticipate the competition and explore new opportunities in unstable environments. In this state, companies are aware that they are exposed to known and unknown risk and to issues that must be resolved in real time, and they must overcome their fears and knowledge limitations to drive the changes required in this context.

Considering this requirement, it is necessary to have a detailed understanding of the structural uncertainty of the environment. This will help to establish concrete alternatives to prevent key risk from materializing. Read More >>

Indicates Online-Exclusive Content



Podcast  New!
ISACA Journal Volume 5 Podcast

Information Security in the Multi-Modal Era

This Week's Featured Blog

Sudhakar SathiyamurthyThe Darkest Moments of a Cybereclipse Are Best Examined Through a Quantitative Lens
16 October 2017
Sudhakar Sathiyamurthy, CISA, CRISC, CGEIT, CIPP, ITIL (Expert)

Having experienced the excitement of a total solar eclipse, I now have an improved awareness of picking the right lens to make the experience worthwhile. Eclipses in the cyber landscape (cyberrisk and cyberevents) are analogous to solar eclipses—picking the right lenses to view a solar eclipse is similar to examining cyberrisk through a quantitative risk-based approach.

Today, decision makers rarely choose a course of action without clear insights into the values at risk—when it comes to a cyberrisk response, understanding the risk exposures in quantitative terms is mostly sought after. Read More >>

Indicates Online-Exclusive Content



What's New for Nonmembers

IS Audit Basics Articles

Doing More With Less

Audit Programs

The Soft Skills Challenge, Part 7

Data Management Body of Knowledge—A Summary for Auditors

Risk-based Audit Planning for Beginners

The Auditors, IS/IT Policies and Compliance


Full Journal Issues

Volume 5, 2016 Cybersecurity

Volume 4, 2016 Mobile Apps

Volume 3, 2016 Data Privacy

Volume 2, 2016 Project Management: Methodologies and Associated Risk

Volume 1, 2016 Transforming the Auditor

Volume 6, 2015 The Internet of Things