The New Normal: The Learning OrganizationJournal22012/3/2018 3:07 PMSecurity0
A Healthy Way to Think of MetricsJournal22011/26/2018 3:01 PMSecurity3
Optimism and the Audit ProfessionJournal22011/19/2018 3:05 PMAudit-Assurance0
Leveraging Employee Resource Groups to Build Diverse IT Audit TeamsJournal22011/12/2018 3:13 PMAudit-Assurance1
A Career in Artificial IntelligenceJournal22011/8/2018 3:07 PMSecurity2
Board Involvement in Digital Strategy and OversightJournal22010/15/2018 3:03 PMCOBIT-Governance of Enterprise IT 1
The Potential Impacts of Blockchain on the Auditing ProfessionJournal22010/8/2018 2:51 PMAudit-Assurance1
If Digital Transformation Is Hard, Your Board May Be Lacking Key Skills and ExperiencesJournal22010/1/2018 11:00 AMCOBIT-Governance of Enterprise IT 2
Privileged Access Management and Implementing It Smartly Journal2209/24/2018 3:10 PMSecurity0
The Growing Scope of the IoTJournal2209/17/2018 3:07 PMAudit-Assurance0
Adding Audit ValueJournal2209/10/2018 3:02 PMAudit-Assurance0
How to Implement MFT for Data ProtectionJournal2209/4/2018 3:18 PMGovernment-Regulatory2
Decision Analysis of Ransomware Incidents Journal2208/30/2018 3:31 PMSecurity1
Key Steps in a Risk Management Metrics ProgramJournal2208/27/2018 2:50 PMRisk Management3
The Benefits and Risk of Blockchain TechnologyJournal2208/20/2018 3:11 PMRisk Management0
Knowing What to ProtectJournal2208/16/2018 2:38 PMSecurity0
SWIFT Infrastructure Needs to Be Secured in a Structured MannerJournal2208/13/2018 2:47 PMSecurity0
Love Them or Loathe Them, Good IT Business Cases Are of Inestimable Value to Good IT Portfolio ManagersJournal2208/6/2018 3:16 PMRisk Management0
Managing Technology Innovation EfficacyJournal2208/2/2018 3:06 PMCOBIT-Governance of Enterprise IT 0
Privacy Matters MatterJournal2207/26/2018 3:05 PMPrivacy0
Skills You Will Not Find on a ResumeJournal2206/25/2018 3:08 PMAudit-Assurance1
The Assessment Will Help Your Organization Tackle Any Security ObstacleJournal2206/18/2018 3:03 PMSecurity0
Formalizing the Cybersecurity Role in MDMJournal2206/11/2018 3:08 PMSecurity0
Understanding the Threat LandscapeJournal2206/4/2018 3:06 PMSecurity0
Establishing a Triumvirate—Understanding the Interests for Enhancing Collaboration Between the CISO, the CIO and the CROJournal2205/21/2018 4:00 PMSecurity0
Leveraging SOC Use CasesJournal2205/17/2018 3:17 PMSecurity0
How Blockchain Technology Will Revolutionize the Global Workforce and Education SystemJournal2205/7/2018 3:03 PM0
Security of CurrenciesJournal2204/23/2018 3:08 PMCOBIT-Governance of Enterprise IT 0
Performing Cyberinsurance “CPR”Journal2204/16/2018 3:03 PMRisk Management0
IT Innovation Governance: From International Policy to Company OversightJournal2204/9/2018 3:07 PMCOBIT-Governance of Enterprise IT 1
Working With Access Certification DataJournal2204/2/2018 3:14 PMSecurity0
How, Not WhatJournal2203/26/2018 3:10 PMAudit-Assurance0
Innovating Innovation GovernanceJournal2203/19/2018 8:22 AMCOBIT-Governance of Enterprise IT 0
How to Prioritize Security Controls ImplementationJournal2203/12/2018 3:01 PMSecurity1
First Steps for Automating Your IOC Provision SourcesJournal2203/8/2018 3:03 PMSecurity0
Cryptographically Protecting Databases Against Data BreachesJournal2203/5/2018 3:23 PMSecurity0
Developing a DLP ProgramJournal2202/26/2018 3:17 PMSecurity1
Leveraging Artificial IntelligenceJournal2202/19/2018 3:36 PMRisk Management2
Working With Big DataJournal2202/15/2018 2:18 PMSecurity0
Big Data in OrganizationsJournal2202/12/2018 3:08 PMSecurity0
Updating the COBIT Process Assessment ModelJournal2202/8/2018 3:09 PMCOBIT-Governance of Enterprise IT 0
Putting Machine Learning in PerspectiveJournal2202/5/2018 3:30 PMRisk Management0
Cloudifying Malware: Understanding Cloud App ThreatsJournal2202/1/2018 4:09 PMSecurity0
Auditing Data SecurityJournal2201/29/2018 3:08 PMAudit-Assurance1
Prepare Your Substitutes Journal2201/22/2018 3:14 PMAudit-Assurance0
Evolving Appreciation for Data PrivacyJournal2201/16/2018 3:11 PMPrivacy0
Twelve IoT ControlsJournal22012/28/2017 8:43 AMAudit-Assurance0
Krack Attack—Exploiting Wi-Fi Networks Journal22012/21/2017 3:06 PMSecurity0
A Different Approach to AssuranceJournal22012/19/2017 3:18 PMAudit-Assurance1
Calculating Cloud ROIJournal22012/11/2017 3:08 PMCloud Computing0
My First Mobile DeviceJournal22012/4/2017 9:00 AMAudit-Assurance2
Caught in the Act: Targeting Ransomware on the WireJournal22011/20/2017 3:04 PMSecurity0
The Role of Certifications in the Hiring ProcessJournal22011/13/2017 3:10 PMCertification1
The Risk of Third PartiesJournal22011/6/2017 3:09 PMRisk Management0
Steps to Enforcing Information Governance and Security ProgramsJournal22010/23/2017 3:06 PMSecurity1
The Darkest Moments of a Cybereclipse Are Best Examined Through a Quantitative LensJournal22010/16/2017 3:06 PMRisk Management0
Why Privacy by Design Is a Stride Toward Consumercentric DesignJournal22010/9/2017 3:05 PMPrivacy0
Examining the “Compliant, Yet Breached” PhenomenonJournal22010/2/2017 8:53 AMSecurity2
The Future Looks Promising for Blockchain Technology Journal2209/25/2017 3:14 PMSecurity0
SSH: Why You Need to CareJournal2209/21/2017 3:02 PMSecurity0
Tracking Vulnerability Fixes to ProductionJournal2209/18/2017 1:53 PMSecurity0
Equifax: Too Soon for Lessons Learned?Journal2209/8/2017 2:54 PMSecurity1
Stuck in the Middle With YouJournal2209/5/2017 8:51 AMAudit-Assurance0
ESA: What Is It and How Does it Work?Journal2208/28/2017 3:48 PMSecurity4
Developing an Information Privacy PlanJournal2208/14/2017 3:13 PMPrivacy0
Questions to Ask When Selecting an ITIL Automation ToolJournal2207/24/2017 3:26 PMSecurity0
The Absence of IT Governance CodesJournal2207/17/2017 3:03 PMGovernment-Regulatory3
Obtaining Accurate HTTPS Posture InformationJournal2207/3/2017 8:20 AMSecurity0
Strengthening Risk Management in the Wake of Petya Ransomware OutbreakJournal2206/28/2017 2:17 PMRisk Management2
Using Hackers’ Own Tools Against Them Journal2206/26/2017 3:11 PMSecurity0
Emotional Labor Journal2206/22/2017 3:05 PMAudit-Assurance0
The Key for Evaluating IT Asset, Risk Impact and Control GapJournal2206/19/2017 3:43 PMRisk Management2
Leverage Enterprise Data Management Investments to Facilitate Data Breach Reporting RequirementsJournal2206/5/2017 8:17 AMGovernment-Regulatory0
Securing Connected DevicesJournal2205/15/2017 3:13 PMSecurity0
Holistic View of Addressing IoT Risk by Leveraging a Decomposition StrategyJournal2205/8/2017 3:08 PMRisk Management0
Securing Mobile AppsJournal2205/1/2017 3:40 PM0
Agile Audit PracticeJournal2204/10/2017 3:07 PMAudit-Assurance1
How to Manage Third-party RiskJournal2204/3/2017 8:31 AMRisk Management1
The Value of Risk ComparisonJournal2203/27/2017 3:10 PMRisk Management0
Going for the ATOJournal2203/13/2017 3:04 PMGovernment-Regulatory0
SSH: A Useful but Potentially Risky Tool Journal2202/27/2017 3:01 PMSecurity0
A Framework to Evaluate PAM ImplementationJournal2202/21/2017 9:11 AMRisk Management0
EU GDPR: Embracing Privacy RequirementsJournal2202/13/2017 3:11 PMGovernment-Regulatory0
The Risk Associated With AIJournal2202/6/2017 9:40 AMRisk Management3
Mitigating the Insider ThreatJournal2201/30/2017 3:06 PMRisk Management2
Dispelling Concerns Regarding Quantitative AnalysisJournal2201/23/2017 3:18 PMRisk Management1
Governance and City DevelopmentJournal2201/17/2017 3:01 PMCOBIT-Governance of Enterprise IT 1
Phishing Attacks: Organizations in Troubled Waters Year After Year?Journal2201/9/2017 4:02 PMRisk Management1
The Decision to Adopt Machine Learning for Telemedicine Journal2201/2/2017 8:20 AMCOBIT-Governance of Enterprise IT 0
The Hexa-dimension Metric: Not Just for Data Privacy ProtectionJournal22012/29/2016 3:08 PMPrivacy0
Ethics and Data Protection LawsJournal22012/29/2016 3:08 PMPrivacy0
The Keys to Using Analytic TechniquesJournal22011/14/2016 12:45 PMAudit-Assurance2
Follow-up to Ensure That All Is WellJournal22011/7/2016 11:07 AMAudit-Assurance0
Conduct a More Accurate Risk AssessmentJournal22011/3/2016 3:03 PMRisk Management0
Reducing the Gender Disparity in Cyber SecurityJournal22010/24/2016 3:13 PM2
Practical Considerations in Planning an Open-source Security Monitoring InfrastructureJournal22010/17/2016 3:13 PM0
Why Do IT Governance and Information Security Governance Practices Fail? Journal22010/10/2016 3:55 PM0
Leveraging the NIST 800-53 ControlsJournal22010/3/2016 8:43 AM1
Framework for Protecting Your Valuable IT AssetsJournal2209/26/2016 3:11 PM1
Move From Good to Great With These 7 Tips for Your Awareness ProgramJournal2209/19/2016 3:06 PM0
1 - 100 Next