journal header

Volume 5, 2018

This Week's Online-Exclusive Feature

It’s Time to Stop Today’s Cybersecurity Insanity

It’s Time to Stop Today’s Cybersecurity Insanity
15 October 2018
Gregory J. Touhill, CISM, CISSP

You may have heard the adage, “Insanity is doing the same thing over and over again and expecting different results.” Often misattributed to Albert Einstein or other geniuses, its genesis was a 1981 Narcotics Anonymous pamphlet. How apropos, as most of today’s cybersecurity programs rely on concepts developed in the 1980s and early 1990s. To use a 1980’s phrase, “You’d have to be delusional” to believe a 20th century approach to cybersecurity would be effective in today’s 21st century hyperconverged cyber environment!

Sadly, many organizations continue to practice their own special version of cyber insanity, investing heavily in revamped versions of stale technologies and then wondering why they continue to be the victims of cyber attacks and incidents. Read More >>

Indicates Online-Exclusive Content



This Week's Featured Blog

Board Involvement in Digital Strategy and Oversight
15 October 2018
Steven De Haes, Ph.D., Laura Caluwe, Anant Joshi, Ph.D., and Tim Huygh

In light of digital transformation, boards of directors (BoD) often recognize the need for more engagement in digital strategy and oversight. At the same time, many of them are seeking advice on how to realize this type of involvement. Our goal is to enable board members to learn from their peers and translate best practices of other organizations to their own context. To inspire them, we discuss the board IT governance mechanisms that were established at the University of Antwerp (Belgium).

The University of Antwerp: The Context
Like many organizations, the University of Antwerp has become increasingly dependent on IT. No central business forum existed to decide which projects would be executed and which not, swamping the IT department with many requests they could not deliver against. This situation often led to frustration on the business side, a tension that was also reported to and known by some board members. Read More >>

Indicates Online-Exclusive Content



What's New for Nonmembers

IS Audit Basics Articles

Auditing the IoT

Add Value to What Is Valued

Auditing Data Privacy

Innovation in the IT Audit Process

Backup and Recovery

Auditing Mobile Devices


Full Journal Issues

Volume 5, 2017 Enabling the Speed of Business

Volume 4, 2017 Mobile Workforce

Volume 3, 2017 The Internet of Things

Volume 2, 2017 The Evolution of Audit

Volume 1, 2017 Cognitive Technology

Volume 6, 2016 Governance, Risk and Compliance

Sponsored Feature Articles

Innovating Internal Audit to Unlock Value

Centralized, Model-Driven Visibility Key to IT-OT Security Management

The AICPA’s New Cybersecurity Attestation Reporting Framework Will Benefit a Variety of Key Stakeholders

Indicators of Exposure and Attack Surface Visualization