journal header

Volume 1, 2018

This Week's Online-Exclusive Feature

Data Loss Prevention—Next Steps

Data Loss Prevention—Next Steps
21 February 2018
Larry G. Wlosinski, CISA, CRISC, CISM, CAP, CBCP, CCSP, CDP, CIPM, CISSP, ITIL V3, PMP

Around 2007, it became obvious that the information security defenses that were implemented by the government and businesses to prevent data loss were not totally effective. Malware and malicious individuals and organizations were wreaking havoc for many enterprises by capturing their sensitive data. These events became known as data breaches.

To help shore up deficient cyberdefenses, the security industry decided it was time to protect information at the data layer. This effort is now known as data loss prevention or data loss protection, DLP for short. Read More >>

Indicates Online-Exclusive Content

 

 


This Week's Featured Blog

Leveraging Artificial Intelligence
19 February 2018
Larry Marks, CISA, CRISC, CISM, CGEIT, CFE, CISSP, CRVPM, CSTE, ITIL, PMP

ISACA has provided guidance on the definition and use of threat intelligence and the sources of threat intelligence. These sources range from ISACA feeds, consulting firms, open source threat information and existing tools. ISACA had indicated in this guidance that the use of artificial intelligence (AI) would be expected to extract insight from the information and monitoring systems on a more effective basis. As organizations look to improve their threat intelligence and mitigate existing and potential risk, they tend to ask what skills and resources are required to support such an initiative. Given resource constraints, organizations are exploring the use of AI to better understand the intelligence, since it can consume and more efficiently analyze large volumes of data. The enterprise must be equipped with skilled individuals capable of designing, implementing, supporting and maintaining AI technology. Read More >>

Indicates Online-Exclusive Content

 

 


What's New for Nonmembers

IS Audit Basics Articles

Backup and Recovery

Auditing Mobile Devices

Doing More With Less

Audit Programs

The Soft Skills Challenge, Part 7

Data Management Body of Knowledge—A Summary for Auditors

 

Full Journal Issues

Volume 1, 2017 Cognitive Technology

Volume 6, 2016 Governance, Risk and Compliance

Volume 5, 2016 Cybersecurity

Volume 4, 2016 Mobile Apps

Volume 3, 2016 Data Privacy

Volume 2, 2016 Project Management: Methodologies and Associated Risk